Privacy-preserving content-based image retrieval in edge environment
暂无分享,去创建一个
Zhiheng Wang | Zheheng Rao | Yanyan Xu | Yuejing Yan | Yiran Zhang | Zhiheng Wang | Yanyan Xu | Yuejing Yan | Yiran Zhang | Zheheng Rao
[1] Jiankun Hu,et al. Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation , 2018, Future Gener. Comput. Syst..
[2] I. Shatheesh Sam,et al. LSB Elimination based Feature Extraction for Outsourced Image Retrieval in Encrypted Images , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).
[3] Zhihua Xia,et al. An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing , 2020, IEEE Access.
[4] Jung-Shian Li,et al. Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality , 2020, IEEE Access.
[5] Zifeng Xu,et al. Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications , 2020, IEEE Access.
[6] Xiaoyu Zhang,et al. Non-interactive privacy-preserving neural network prediction , 2019, Inf. Sci..
[7] Siu-Ming Yiu,et al. Privacy-preserving verifiable elastic net among multiple institutions in the cloud , 2018, J. Comput. Secur..
[8] Myoungho Sunwoo,et al. Development of Autonomous Car—Part II: A Case Study on the Implementation of an Autonomous Driving System Based on Distributed Architecture , 2015, IEEE Transactions on Industrial Electronics.
[9] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[10] James Ze Wang,et al. Automatic Linguistic Indexing of Pictures by a Statistical Modeling Approach , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Wenliang Du,et al. Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.
[12] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[13] Yun Q. Shi,et al. A privacy-preserving content-based image retrieval method in cloud environment , 2017, J. Vis. Commun. Image Represent..
[14] Naixue Xiong,et al. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..
[15] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[16] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[17] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[18] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[19] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[20] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[21] Kai Huang,et al. Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2016, WAIM.
[22] Mehdi Berenjkoub,et al. Optimally Efficient Secure Scalar Product With Applications in Cloud Computing , 2019, IEEE Access.
[23] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[24] Laurent Amsaleg,et al. Privacy-Preserving Outsourced Media Search , 2016, IEEE Transactions on Knowledge and Data Engineering.
[25] Chang Wen Chen,et al. Prius: Hybrid Edge Cloud and Client Adaptation for HTTP Adaptive Streaming in Cellular Networks , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[26] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[27] Xiao Zhao,et al. A Privacy-preserving Image Retrieval Method Based on Improved BoVW Model in Cloud Environment , 2018, IETE Technical Review.
[28] Hitoshi Kiya,et al. A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images , 2020, 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[29] Marcel Worring,et al. Content-Based Image Retrieval at the End of the Early Years , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[30] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[31] Dongxi Liu,et al. Privacy-Preserving and Outsourced Multi-user K-Means Clustering , 2014, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).
[32] Zhenxing Qian,et al. New Advances of Privacy Protection and Multimedia Content Security for Big Data and Cloud Computing , 2018 .
[33] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[34] Xingming Sun,et al. MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing , 2020, Future Gener. Comput. Syst..
[35] Samiran Chattopadhyay,et al. A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme , 2019, IEEE Access.
[36] Nenghai Yu,et al. Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving , 2017, IEEE Transactions on Information Forensics and Security.
[37] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[38] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[39] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[40] Xuan Li,et al. Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.
[41] João Leitão,et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.
[42] Adi Shamir,et al. How to share a secret , 1979, CACM.
[43] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[44] Jian Weng,et al. A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing , 2021, IEEE Transactions on Network Science and Engineering.
[45] Yunhao Liu,et al. PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2017, IEEE Trans. Parallel Distributed Syst..
[46] Jing-Yu Yang,et al. Content-based image retrieval using computational visual attention model , 2015, Pattern Recognit..
[47] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[48] Zoe Lin Jiang,et al. Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks , 2020, IEEE Access.
[49] Jin Li,et al. Privacy-preserving edge-assisted image retrieval and classification in IoT , 2018, Frontiers of Computer Science.
[50] Simon Haykin,et al. The maximum entropy method applied to the spectral analysis of radar clutter (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[51] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[52] Hai Jin,et al. Secure biometric image retrieval in IoT-cloud , 2016, 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).
[53] Yan Zhang,et al. A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.
[54] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[55] Ximeng Liu,et al. A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing , 2019, IEEE Transactions on Dependable and Secure Computing.
[56] X. Shen,et al. Efficient and Privacy-preserving Outsourced Image Retrieval in Public Clouds , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.
[57] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[58] Anderson C. A. Nascimento,et al. Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols , 2015, ProvSec.