Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
暂无分享,去创建一个
[1] Jun Ma,et al. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage , 2013, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).
[2] Keke Gai,et al. Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.
[3] Nikos Komninos,et al. Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).
[4] Zhiqiang Du,et al. An Improved Brain Storm Optimization with Dynamic Clustering Strategy , 2017 .
[5] Wendy Hui Wang,et al. Privacy-Preserving Data Sharing in Cloud Computing , 2010, Journal of Computer Science and Technology.
[6] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Jian An,et al. A retrievable data perturbation method used in privacy-preserving in cloud computing , 2014 .
[8] Tianrui Li,et al. A New Hypernetwork Model Based on Matrix Operation , 2015, 2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE).
[9] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[10] Ung-Mo Kim,et al. A Data Sanitization Method for Privacy Preserving Data Re-publication , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[11] Yuhui Shi,et al. Brain Storm Optimization Algorithm , 2011, ICSI.
[12] Tung-Shou Chen,et al. Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining , 2015 .
[13] Yixian Yang,et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing , 2013 .
[14] Andrew Lewis,et al. The Whale Optimization Algorithm , 2016, Adv. Eng. Softw..
[15] Seyed Mohammad Mirjalili,et al. Whale optimization approaches for wrapper feature selection , 2018, Appl. Soft Comput..
[16] Xiaohua Jia,et al. Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms” , 2019, PloS one.
[17] B. Sivakumar,et al. Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET , 2018, Cluster Computing.
[18] Zahir Tari,et al. PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..
[19] Gui Xiaolin,et al. A retrievable data perturbation method used in privacy-preserving in cloud computing , 2014, China Communications.
[20] Vinod Kumar Jain,et al. Correlation feature selection based improved-Binary Particle Swarm Optimization for gene selection and cancer classification , 2018, Appl. Soft Comput..
[21] Majdi M. Mafarja,et al. Hybrid Whale Optimization Algorithm with simulated annealing for feature selection , 2017, Neurocomputing.
[22] Wenjing Lou,et al. A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications , 2017, J. Parallel Distributed Comput..
[23] R. Sugumar,et al. Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud , 2017, Cluster Computing.
[24] Philippe Pucheral,et al. MET𝔸P: revisiting Privacy-Preserving Data Publishing using secure devices , 2013, Distributed and Parallel Databases.
[25] R. Varatharajan,et al. Competent resource provisioning and distribution techniques for cloud computing environment , 2017, Cluster Computing.
[26] Ling Liu,et al. Privacy-Preserving Data Publishing in the Cloud: A Multi-level Utility Controlled Approach , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[27] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[28] Peng-Yu Wang,et al. Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[29] Zongda Wu,et al. An effective approach for the protection of privacy text data in the CloudDB , 2018, World Wide Web.
[30] W. Stewart,et al. The Kronecker product and stochastic automata networks , 2004 .
[31] Rong Hao,et al. A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).