Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing
暂无分享,去创建一个
Laurence T. Yang | Xiao-Yang Liu | Anwar Walid | Zhao Yang | Cai Fu | Jia Yang | L. Yang | Xiao-Yang Liu | A. Walid | Cai Fu | Zhao Yang | Jia Yang
[1] Meiko Jensen. Challenges of Privacy Protection in Big Data Analytics , 2013, 2013 IEEE International Congress on Big Data.
[2] Xiaodong Wang,et al. Fourth-order Tensors with Multidimensional Discrete Transforms , 2017, ArXiv.
[3] L. Latha,et al. An enhancement to SePeCloud with improved security and efficient data management , 2018, Cluster Computing.
[4] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[5] Xiaoshan Li,et al. Tucker Tensor Regression and Neuroimaging Analysis , 2018, Statistics in Biosciences.
[6] Zhenggang Huo,et al. Personal Privacy Security Management in the Era of Big Data , 2015 .
[7] Laurence T. Yang,et al. A Tensor-Based Approach for Big Data Representation and Dimensionality Reduction , 2014, IEEE Transactions on Emerging Topics in Computing.
[8] Xiaodong Wang,et al. Low-Tubal-Rank Tensor Completion Using Alternating Minimization , 2016, IEEE Transactions on Information Theory.
[9] Misha Elena Kilmer,et al. Third-Order Tensors as Operators on Matrices: A Theoretical and Computational Framework with Applications in Imaging , 2013, SIAM J. Matrix Anal. Appl..
[10] Nathan Halko,et al. Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions , 2009, SIAM Rev..
[11] Misha Elena Kilmer,et al. Novel Methods for Multilinear Data Completion and De-noising Based on Tensor-SVD , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[12] Xin Yi. Generalized trace of matrix , 2007 .
[13] T. Kolda. Multilinear operators for higher-order decompositions , 2006 .
[14] Ngai Wong,et al. Computing low-rank approximations of large-scale matrices with the Tensor Network randomized SVD , 2018, SIAM J. Matrix Anal. Appl..
[15] Laurence T. Yang,et al. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.
[16] Tamara G. Kolda,et al. MATLAB tensor classes for fast algorithm prototyping. , 2004 .
[17] Ce Zhu,et al. Tensor rank learning in CP decomposition via convolutional neural network , 2019, Signal Process. Image Commun..
[18] Peng Li,et al. An Adaptive Dropout Deep Computation Model for Industrial IoT Big Data Learning With Crowdsourcing to Cloud Computing , 2019, IEEE Transactions on Industrial Informatics.
[19] Keke Gai,et al. Advanced Fully Homomorphic Encryption Scheme Over Real Numbers , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[20] Nadia Kreimer,et al. A Tensor Higher-order Singular Value Decomposition (HOSVD) For Pre-stack Simultaneous Noise-reduction And Interpolation , 2011 .
[21] Misha Elena Kilmer,et al. Novel Factorization Strategies for Higher Order Tensors: Implications for Compression and Recovery of Multi-linear Data , 2013, ArXiv.
[22] M. Kilmer,et al. Factorization strategies for third-order tensors , 2011 .
[23] Ahmed El-Yahyaoui,et al. A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security , 2018, ArXiv.
[24] Craig Gentry,et al. Ring Switching in BGV-Style Homomorphic Encryption , 2012, SCN.
[25] Tamara G. Kolda,et al. Tensor Decompositions and Applications , 2009, SIAM Rev..