Topology hiding routing based on learning with errors

[1]  Hammad Afzal,et al.  ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System , 2019, IEEE Access.

[2]  Yuling Xi,et al.  Stimulus-driven and concept-driven analysis for image caption generation , 2020, Neurocomputing.

[3]  Kim-Kwang Raymond Choo,et al.  Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..

[4]  Jiguo Yu,et al.  Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..

[5]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[6]  Shaohua Wan,et al.  Faster R-CNN for multi-class fruit detection using a robotic vision system , 2020, Comput. Networks.

[7]  Qiang He,et al.  Service recommendation based on quotient space granularity analysis and covering algorithm on Spark , 2018, Knowl. Based Syst..

[8]  Xuyun Zhang,et al.  An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..

[9]  Zvika Brakerski,et al.  Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.

[10]  Craig Gentry,et al.  (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.

[11]  D. Mcgoldrick,et al.  Ischaemic necrosis of the tongue , 2015, BMJ Case Reports.

[12]  Yu Hu,et al.  A post-quantum light weight 1-out-n oblivious transfer protocol , 2019, Comput. Electr. Eng..

[13]  Jianping Fan,et al.  iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Yueshen Xu,et al.  QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..

[15]  Xuyun Zhang,et al.  A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.

[16]  Chen Wang,et al.  Classifying transportation mode and speed from trajectory data via deep multi-scale learning , 2019, Comput. Networks.

[17]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[18]  Zvika Brakerski,et al.  Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts , 2016, CRYPTO.

[19]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.

[20]  Lianyong Qi,et al.  Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[21]  Brent Waters,et al.  Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.

[22]  Toniann Pitassi,et al.  The Hardness of Being Private , 2012, 2012 IEEE 27th Conference on Computational Complexity.

[23]  Yu Zhao,et al.  Knowledge-Aided Convolutional Neural Network for Small Organ Segmentation , 2019, IEEE Journal of Biomedical and Health Informatics.

[24]  Shaobo Zhang,et al.  A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..

[25]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[26]  Kim-Kwang Raymond Choo,et al.  Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition , 2019, IEEE Internet of Things Journal.

[27]  Qiang Ni,et al.  Cognitive computing and wireless communications on the edge for healthcare service robots , 2020, Comput. Commun..

[28]  Xuyun Zhang,et al.  Spatial-temporal data-driven service recommendation with privacy-preservation , 2020, Inf. Sci..

[29]  Chen Wang,et al.  ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.

[30]  Chris Peikert,et al.  Faster Bootstrapping with Polynomial Error , 2014, CRYPTO.

[31]  Chen Wang,et al.  Recent advances in consensus protocols for blockchain: a survey , 2019, Wireless Networks.

[32]  Jun Tang,et al.  Formation of Autapse Connected to Neuron and Its Biological Function , 2017, Complex..

[33]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[34]  Mohammed Atiquzzaman,et al.  Automated Colorization of a Grayscale Image With Seed Points Propagation , 2020, IEEE Transactions on Multimedia.

[35]  Chao Yan,et al.  Link prediction in paper citation network to construct paper correlation graph , 2019, EURASIP J. Wirel. Commun. Netw..

[36]  Jianqiu Cao,et al.  Oblivious Transfer Based on NTRUEncrypt , 2018, IEEE Access.

[37]  Ron Steinfeld,et al.  Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.

[38]  Xuyun Zhang,et al.  BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing , 2020, IEEE Transactions on Industrial Informatics.

[39]  Zhiyuan Tan,et al.  SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application , 2019, J. Netw. Comput. Appl..

[40]  Fei Dai,et al.  Multi-objective computation offloading for Internet of Vehicles in cloud-edge computing , 2019, Wireless Networks.

[41]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.

[42]  Suresh Jagannathan,et al.  CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency , 2013, JACM.

[43]  Longfei Wu,et al.  Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..