An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm
暂无分享,去创建一个
[1] Guandong Xu,et al. A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval , 2023, ACM Trans. Asian Low Resour. Lang. Inf. Process..
[2] Jiangping Hu,et al. Safe consensus control of cooperative-competitive multi-agent systems via differential privacy , 2022, Kybernetika.
[3] Xiaoxia Zhou,et al. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach , 2022, Inf. Sci..
[4] Surya Nepal,et al. ANS-based compression and encryption with 128-bit security , 2022, International Journal of Information Security.
[5] Zongda Wu,et al. How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective , 2022, Comput. Biol. Medicine.
[6] Huxiong Li,et al. A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection , 2021, J. Organ. End User Comput..
[7] Schahram Dustdar,et al. A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs , 2021, IEEE/ACM Transactions on Networking.
[8] Zongda Wu,et al. An effective approach for the protection of user commodity viewing privacy in e-commerce website , 2021, Knowl. Based Syst..
[9] Houbing Song,et al. Industrial Security Solution for Virtual Reality , 2021, IEEE Internet of Things Journal.
[10] M. Sardaraz,et al. SCA-NGS: Secure compression algorithm for next generation sequencing data using genetic operators and block sorting , 2021, Science progress.
[11] Bong Jun Choi,et al. Analysis of Using Blockchain to Protect the Privacy of Drone Big Data , 2021, IEEE Network.
[12] Imran Razzak,et al. An efficient secure data compression technique based on chaos and adaptive Huffman coding , 2020, Peer-to-Peer Networking and Applications.
[13] Alistair Moffat,et al. Large-Alphabet Semi-Static Entropy Coding Via Asymmetric Numeral Systems , 2020, ACM Trans. Inf. Syst..
[14] Zongda Wu,et al. Constructing dummy query sequences to protect location privacy and query privacy in location-based services , 2020, World Wide Web.
[15] Zongda Wu,et al. A dummy-based user privacy protection approach for text information retrieval , 2020, Knowl. Based Syst..
[16] Bruce F. Cockburn,et al. High-Throughput FPGA-Based Hardware Accelerators for Deflate Compression and Decompression Using High-Level Synthesis , 2020, IEEE Access.
[17] Xiaonan Luo,et al. A Parameter-Selection-Based Chaotic System , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.
[18] Sebastian Deorowicz,et al. FQSqueezer: k-mer-based compression of sequencing data , 2019, Scientific Reports.
[19] Jonggun Kim,et al. A novel bit-level color image encryption using improved 1D chaotic map , 2018, Multimedia Tools and Applications.
[20] Armando J. Pinho,et al. Cryfa: a secure encryption tool for genomic data , 2018, Bioinform..
[21] Yiran Chen,et al. An image encryption algorithm based on chaotic system and compressive sensing , 2018, Signal Process..
[22] Bruno Carpentieri,et al. Efficient Compression and Encryption for Digital Data Transmission , 2018, Secur. Commun. Networks.
[23] Yong Li,et al. Complementary Contextual Models with FM-Index for DNA Compression , 2017, 2017 Data Compression Conference (DCC).
[24] Ataul Aziz Ikram,et al. SeqCompress: an algorithm for biological sequence compression. , 2014, Genomics.
[25] J. K. Mandal,et al. A General Session Based Bit Level Block Encoding Technique Using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission , 2012 .
[26] Lung-Jen Lee,et al. $2^{n}$ Pattern Run-Length for Test Data Compression , 2012, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[27] Mukesh Sharma,et al. Compression and Encryption: An Integrated Approach , 2012 .
[28] Oscar C. Au,et al. Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.
[29] Hyungjin Kim,et al. Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.
[30] Yansong Gao,et al. APMSA: Adversarial Perturbation Against Model Stealing Attacks , 2023, IEEE Transactions on Information Forensics and Security.
[31] Lu Lv,et al. Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers , 2021, IEEE Transactions on Information Forensics and Security.
[32] J. Pieprzyk,et al. Compcrypt–Lightweight ANS-Based Compression and Encryption , 2021, IEEE Transactions on Information Forensics and Security.
[33] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[34] D. J. Wheeler,et al. A Block-sorting Lossless Data Compression Algorithm , 1994 .