Privacy-preserving voice-based search over mHealth data
暂无分享,去创建一个
[1] D. Ceer. Pervasive medical devices: less invasive, more productive , 2006, IEEE Pervasive Computing.
[2] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[3] Gerhard Nussbaum. People with Disabilities: Assistive Homes and Environments , 2006, ICCHP.
[4] Michel Vacher,et al. On-line human activity recognition from audio and home automation sensors: Comparison of sequential and non-sequential models in realistic Smart Homes , 2016, J. Ambient Intell. Smart Environ..
[5] Xiaohui Liang,et al. SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing , 2014, Secur. Commun. Networks.
[6] Tuomas Virtanen,et al. Context-dependent sound event detection , 2013, EURASIP Journal on Audio, Speech, and Music Processing.
[7] Thomas R. Ioerger,et al. Precision and Disclosure in Text and Voice Interviews on Smartphones , 2015, PloS one.
[8] Geeta Nijhawan,et al. ISOLATED SPEECH RECOGNITIONUSING MFCC AND DTW , 2013 .
[9] D. Keltner,et al. The voice conveys emotion in ten globalized cultures and one remote village in Bhutan. , 2016, Emotion.
[10] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[11] Xiaohui Liang,et al. Proxy re-encryption with keyword search , 2010, Inf. Sci..
[12] Nidhika Birla,et al. VOICE COMMAND RECOGNITION SYSTEM BASED ON MFCC AND DTW , 2010 .
[13] Ruixuan Li,et al. Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..
[14] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[15] Xiaohui Liang,et al. Fully Anonymous Profile Matching in Mobile Social Networks , 2013, IEEE Journal on Selected Areas in Communications.