AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers
暂无分享,去创建一个
Xiang-Yang Li | Wenchao Huang | Taeho Jung | Jianwei Qian | Junze Han | Jiahui Hou | Linlin Chen | Zhongying Qiao
[1] Xiang-Yang Li,et al. Graph-based privacy-preserving data publication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[2] M. B. Chandak,et al. KEY FRAME EXTRACTION METHODOLOGY FOR VIDEO ANNOTATION , 2013 .
[3] Pierre Baldi,et al. Mathematical Correction for Fingerprint Similarity Measures to Improve Chemical Retrieval , 2007, J. Chem. Inf. Model..
[4] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[5] Yunhao Liu,et al. PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Jens Lehmann,et al. Quality assessment for Linked Data: A Survey , 2015, Semantic Web.
[7] Jianzhong Li,et al. Efficient Subgraph Matching on Billion Node Graphs , 2012, Proc. VLDB Endow..
[8] V. Akhil. SALIENT REGION DETECTION via HIGH-DIMENSIONAL COLOR TRANSFORM AND LOCAL SPATIAL SUPPORT , 2018 .
[9] Geoffrey Zweig,et al. Syntactic Clustering of the Web , 1997, Comput. Networks.
[10] Yang Xiao. Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.
[11] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[12] Xiang-Yang Li,et al. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.
[13] Richard Chbeir,et al. An overview on XML similarity: Background, current trends and future directions , 2009, Comput. Sci. Rev..
[14] Xiang-Yang Li,et al. PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups , 2013, IEEE Transactions on Dependable and Secure Computing.
[15] Siani Pearson,et al. Accountability for Data Governance in Cloud Ecosystems , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[16] Siu-Ming Yiu,et al. An efficient and scalable algorithm for clustering XML documents by structure , 2004, IEEE Transactions on Knowledge and Data Engineering.
[17] Xiang-Yang Li,et al. AccountTrade: Accountable protocols for big data trading against dishonest consumers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[18] Heejo Lee,et al. OMAP: One-Way Memory Attestation Protocol for Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[19] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[20] Andreas Haeberlen,et al. Accountable Virtual Machines , 2010, OSDI.
[21] Yi Liu,et al. Large-scale image annotation using visual synset , 2011, 2011 International Conference on Computer Vision.
[22] Hector Garcia-Molina,et al. Copy detection mechanisms for digital documents , 1995, SIGMOD '95.
[23] Michael Isard,et al. General Theory , 1969 .
[24] Andrei Z. Broder,et al. On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).
[25] Ralf Küsters,et al. Accountability: definition and relationship to verifiability , 2010, CCS '10.
[26] Andreas Haeberlen,et al. PeerReview: practical accountability for distributed systems , 2007, SOSP.
[27] Michael Isard,et al. Partition Min-Hash for Partial Duplicate Image Discovery , 2010, ECCV.
[28] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[29] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[30] Rajkumar Buyya,et al. Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT) - MQTT-SN protocols , 2018, Future Gener. Comput. Syst..
[31] Cordelia Schmid,et al. An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering , 2010, IEEE Transactions on Multimedia.
[32] Bruno Blanchet,et al. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif , 2013, FOSAD.
[33] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[34] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[35] Thomas Brox,et al. A Unified Video Segmentation Benchmark: Annotation, Metrics and Analysis , 2013, 2013 IEEE International Conference on Computer Vision.
[36] James Heather,et al. The Append-Only Web Bulletin Board , 2008, Formal Aspects in Security and Trust.
[37] Peter Steenkiste,et al. Balancing accountability and privacy in the network , 2014, SIGCOMM.
[38] K. J. Ray Liu,et al. An iterative auction mechanism for data trading , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[39] Tao Liu,et al. Effective and scalable video copy detection , 2010, MIR '10.
[40] Jacques Traoré,et al. A practical and secure coercion-resistant scheme for remote elections , 2007, Frontiers of Electronic Voting.