PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud
暂无分享,去创建一个
Yunhao Liu | Xiang-Yang Li | Kebin Liu | Lan Zhang | Taeho Jung | Xuan Ding | Jiaxi Gu | Yunhao Liu | Xiangyang Li | Xuan Ding | Kebin Liu | Taeho Jung | Lan Zhang | Jiaxi Gu
[1] Bo Peng,et al. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds , 2012, NDSS.
[2] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[3] Christos Faloutsos,et al. Fast Nearest Neighbor Search in Medical Image Databases , 1996, VLDB.
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Jonathan Goldstein,et al. Contrast Plots and P-Sphere Trees: Space vs. Time in Nearest Neighbour Searches , 2000, VLDB.
[6] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[7] Yiwei Thomas Hou,et al. Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[8] Cordelia Schmid,et al. Improving Bag-of-Features for Large Scale Image Search , 2010, International Journal of Computer Vision.
[9] Patrick Pérez,et al. Reconstructing an image from its local descriptors , 2011, CVPR 2011.
[10] James S. Duncan,et al. Synthesis of Research: Medical Image Databases: A Content-based Retrieval Approach , 1997, J. Am. Medical Informatics Assoc..
[11] Mahadev Satyanarayanan,et al. Scalable crowd-sourcing of video from mobile devices , 2013, MobiSys '13.
[12] Pierre Vandergheynst,et al. Beyond bits: Reconstructing images from Local Binary Descriptors , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[13] Srdjan Capkun,et al. Home is safer than the cloud!: privacy concerns for consumer cloud storage , 2011, SOUPS.
[14] Laurent Amsaleg,et al. Indexing and searching 100M images with map-reduce , 2013, ICMR.
[15] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[16] Eli Upfal,et al. Finding near neighbors through cluster pruning , 2007, PODS '07.
[17] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[18] Moni Naor,et al. Rank aggregation methods for the Web , 2001, WWW '01.
[19] Cordelia Schmid,et al. Recent Advances in Large Scale Image Search , 2008, ETVC.
[20] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[21] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[22] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[23] Yuguang Fang,et al. PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[24] Laurent Amsaleg,et al. A large-scale performance study of cluster-based high-dimensional indexing , 2010, VLS-MCMR '10.
[25] Xiang-Yang Li,et al. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.
[26] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[27] Amit. Sangroya,et al. MRBS : A Comprehensive MapReduce Benchmark Suite , 2012 .
[28] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[29] Jiaqi Guo. Image Reconstruction based on Local feature Descriptors , 2011 .
[30] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[31] Ming Li,et al. Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[32] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[33] P. Sindhu,et al. Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems , 2017 .
[34] Yunhao Liu,et al. Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks , 2015, IEEE Transactions on Mobile Computing.
[35] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[36] Gene Tsudik,et al. Privacy-Preserving Cloud Database Querying , 2011, J. Internet Serv. Inf. Secur..
[37] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[38] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[39] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[40] David G. Lowe,et al. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.
[41] Shengshan Hu,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. , 2016, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[42] I-Ling Yen,et al. An Efficient Homomorphic Encryption Protocol for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..
[43] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[44] Sara Bouchenak,et al. Benchmarking Dependability of MapReduce Systems , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.
[45] Jie Yang,et al. Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing , 2014, 2014 IEEE Global Communications Conference.
[46] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[47] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[48] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[49] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[50] Cordelia Schmid,et al. A contextual dissimilarity measure for accurate and efficient image search , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[51] João Leitão,et al. Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).
[52] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[53] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[54] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[55] Yunhao Liu,et al. Privacy-friendly photo capturing and sharing system , 2016, UbiComp.
[56] Yunhao Liu,et al. Verifiable private multi-party computation: Ranging and ranking , 2013, 2013 Proceedings IEEE INFOCOM.
[57] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[58] Muthu Dayalan,et al. MapReduce : Simplified Data Processing on Large Cluster , 2018 .
[59] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[60] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[61] Jonathon S. Hare,et al. Privacy-aware image classification and search , 2012, SIGIR '12.
[62] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[63] Randy Yates,et al. Fixed-Point Arithmetic: An Introduction , 2013 .
[64] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.