Topology hiding routing based on learning with errors
暂无分享,去创建一个
[1] Hammad Afzal,et al. ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System , 2019, IEEE Access.
[2] Yuling Xi,et al. Stimulus-driven and concept-driven analysis for image caption generation , 2020, Neurocomputing.
[3] Kim-Kwang Raymond Choo,et al. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..
[4] Jiguo Yu,et al. Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..
[5] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[6] Shaohua Wan,et al. Faster R-CNN for multi-class fruit detection using a robotic vision system , 2020, Comput. Networks.
[7] Qiang He,et al. Service recommendation based on quotient space granularity analysis and covering algorithm on Spark , 2018, Knowl. Based Syst..
[8] Xuyun Zhang,et al. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..
[9] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[10] Craig Gentry,et al. (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.
[11] D. Mcgoldrick,et al. Ischaemic necrosis of the tongue , 2015, BMJ Case Reports.
[12] Yu Hu,et al. A post-quantum light weight 1-out-n oblivious transfer protocol , 2019, Comput. Electr. Eng..
[13] Jianping Fan,et al. iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.
[14] Yueshen Xu,et al. QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..
[15] Xuyun Zhang,et al. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.
[16] Chen Wang,et al. Classifying transportation mode and speed from trajectory data via deep multi-scale learning , 2019, Comput. Networks.
[17] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[18] Zvika Brakerski,et al. Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts , 2016, CRYPTO.
[19] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[20] Lianyong Qi,et al. Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[21] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[22] Toniann Pitassi,et al. The Hardness of Being Private , 2012, 2012 IEEE 27th Conference on Computational Complexity.
[23] Yu Zhao,et al. Knowledge-Aided Convolutional Neural Network for Small Organ Segmentation , 2019, IEEE Journal of Biomedical and Health Informatics.
[24] Shaobo Zhang,et al. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..
[25] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[26] Kim-Kwang Raymond Choo,et al. Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition , 2019, IEEE Internet of Things Journal.
[27] Qiang Ni,et al. Cognitive computing and wireless communications on the edge for healthcare service robots , 2020, Comput. Commun..
[28] Xuyun Zhang,et al. Spatial-temporal data-driven service recommendation with privacy-preservation , 2020, Inf. Sci..
[29] Chen Wang,et al. ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.
[30] Chris Peikert,et al. Faster Bootstrapping with Polynomial Error , 2014, CRYPTO.
[31] Chen Wang,et al. Recent advances in consensus protocols for blockchain: a survey , 2019, Wireless Networks.
[32] Jun Tang,et al. Formation of Autapse Connected to Neuron and Its Biological Function , 2017, Complex..
[33] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[34] Mohammed Atiquzzaman,et al. Automated Colorization of a Grayscale Image With Seed Points Propagation , 2020, IEEE Transactions on Multimedia.
[35] Chao Yan,et al. Link prediction in paper citation network to construct paper correlation graph , 2019, EURASIP J. Wirel. Commun. Netw..
[36] Jianqiu Cao,et al. Oblivious Transfer Based on NTRUEncrypt , 2018, IEEE Access.
[37] Ron Steinfeld,et al. Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.
[38] Xuyun Zhang,et al. BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing , 2020, IEEE Transactions on Industrial Informatics.
[39] Zhiyuan Tan,et al. SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application , 2019, J. Netw. Comput. Appl..
[40] Fei Dai,et al. Multi-objective computation offloading for Internet of Vehicles in cloud-edge computing , 2019, Wireless Networks.
[41] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[42] Suresh Jagannathan,et al. CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency , 2013, JACM.
[43] Longfei Wu,et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..