Efficient and Privacy-Preserving Voice-Based Search over mHealth Data
暂无分享,去创建一个
Wei Li | Xiaohui Liang | Mohammad Hadian | Thamer Altuwaiyan | Wei Li | Xiaohui Liang | M. Hadian | Thamer Altuwaiyan
[1] Xiaohui Liang,et al. Fully Anonymous Profile Matching in Mobile Social Networks , 2013, IEEE Journal on Selected Areas in Communications.
[2] Donald F. Towsley,et al. Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Donald F. Towsley,et al. Covert communications on Poisson packet channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[4] Ian McGraw,et al. Personalized speech recognition on mobile devices , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] Geeta Nijhawan,et al. ISOLATED SPEECH RECOGNITIONUSING MFCC AND DTW , 2013 .
[6] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[7] Carl A. Gunter,et al. Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[9] Donald F. Towsley,et al. Covert communications on renewal packet channels , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Wen Hu,et al. Talos: Encrypted Query Processing for the Internet of Things , 2015, SenSys.
[11] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[12] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[13] Gerhard Nussbaum. People with Disabilities: Assistive Homes and Environments , 2006, ICCHP.
[14] Günter Fahrnberger,et al. SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Thomas R. Ioerger,et al. Precision and Disclosure in Text and Voice Interviews on Smartphones , 2015, PloS one.
[16] Saikat Guha,et al. Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.
[17] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[18] Markus Forsberg. Why is Speech Recognition Difficult? , 2003 .
[19] D. Ceer. Pervasive medical devices: less invasive, more productive , 2006, IEEE Pervasive Computing.
[20] I. Elamvazuthi,et al. Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques , 2010, ArXiv.
[21] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[22] Oliver Chiu-sing Choy,et al. An efficient MFCC extraction method in speech recognition , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[23] Héctor M. Pérez Meana,et al. Speaker recognition using Mel frequency Cepstral Coefficients (MFCC) and Vector quantization (VQ) techniques , 2012, CONIELECOMP 2012, 22nd International Conference on Electrical Communications and Computers.
[24] Song Ci,et al. A remote markerless human gait tracking for e-healthcare based on content-aware wireless multimedia communications , 2010, IEEE Wireless Communications.
[25] Clarence Goh,et al. Robust Computer Voice Recognition Using Improved MFCC Algorithm , 2009, 2009 International Conference on New Trends in Information and Service Science.
[26] Yilin Mo,et al. Privacy Preserving Maximum Consensus , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[27] A. Holopainen,et al. Use of Smart Phone Technologies to Offer Easy-to-Use and Cost-Effective Telemedicine Services , 2007, First International Conference on the Digital Society (ICDS'07).
[28] Nidhika Birla,et al. VOICE COMMAND RECOGNITION SYSTEM BASED ON MFCC AND DTW , 2010 .
[29] Ling He,et al. Using information theoretic vector quantization for inverted MFCC based speaker verification , 2009, 2009 2nd International Conference on Computer, Control and Communication.