暂无分享,去创建一个
Qi Gu | Jian Weng | Zhihua Xia | Lizhi Xiong | Wenhao Zhou
[1] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[2] Zhihua Xia,et al. BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing , 2019, IEEE Transactions on Services Computing.
[3] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[4] Ximeng Liu,et al. A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing , 2019, IEEE Transactions on Dependable and Secure Computing.
[5] K. Balaji,et al. Towards privacy preserving content based image retrieval in cloud computing , 2019 .
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] David G. Lowe,et al. Scalable Nearest Neighbor Algorithms for High Dimensional Data , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Koen E. A. van de Sande,et al. Selective Search for Object Recognition , 2013, International Journal of Computer Vision.
[9] Mikhail J. Atallah,et al. Secure and Private Outsourcing of Shape-Based Feature Extraction , 2013, ICICS.
[10] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[11] João Leitão,et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.
[12] Qian Wang,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.
[13] Anil K. Jain,et al. Image retrieval using color and shape , 1996, Pattern Recognit..
[14] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[15] David Stutz,et al. Neural Codes for Image Retrieval , 2015 .
[16] Deng Cai,et al. Satellite System Graph: Towards the Efficiency Up-Boundary of Graph-Based Approximate Nearest Neighbor Search , 2019, ArXiv.
[17] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[18] Qi Gu,et al. Efficient Privacy-Preserving Computation Based on Additive Secret Sharing , 2020, ArXiv.
[19] Yong Wang,et al. Intelligent and Secure Content-Based Image Retrieval for Mobile Users , 2019, IEEE Access.
[20] Thierry Pun,et al. Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..
[21] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[22] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[23] Sameer Wagh,et al. SecureNN: Efficient and Private Neural Network Training , 2018, IACR Cryptol. ePrint Arch..
[24] Shucheng Yu,et al. SEISA: Secure and efficient encrypted image search with access control , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[25] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[26] Robert H. Deng,et al. Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data , 2019, IEEE Internet of Things Journal.
[27] Cordelia Schmid,et al. Product Quantization for Nearest Neighbor Search , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Xinpeng Zhang,et al. Encrypted JPEG image retrieval using block-wise feature comparison , 2016, J. Vis. Commun. Image Represent..
[29] Qi Tian,et al. SIFT Meets CNN: A Decade Survey of Instance Retrieval , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[30] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[31] Rongmao Chen,et al. SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition , 2020, ACISP.
[32] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[33] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[34] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[35] David Nistér,et al. Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[36] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[37] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[38] Xinpeng Zhang,et al. Huffman-code based retrieval for encrypted JPEG images , 2019, J. Vis. Commun. Image Represent..
[39] Wilfred Ng,et al. Locality-sensitive hashing scheme based on dynamic collision counting , 2012, SIGMOD Conference.
[40] Victor S. Lempitsky,et al. Aggregating Local Deep Features for Image Retrieval , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[41] Xiu-Shen Wei,et al. Selective Convolutional Descriptor Aggregation for Fine-Grained Image Retrieval , 2016, IEEE Transactions on Image Processing.
[42] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[43] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[44] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.