4.7 Article

Geometric Searchable Encryption for Privacy-Preserving Location-Based Services

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Efficient side-channel attacks beyond divide-and-conquer strategy

Shan Jin et al.

Summary: Side channel attacks exploit physical information to extract secret keys, using a divide-and-conquer strategy, but are limited by inaccurate leakage models and errors in subkey recovery.

COMPUTER NETWORKS (2021)

Article Dermatology

Development of a light-weight deep learning model for cloud applications and remote diagnosis of skin cancers

Hsin-Wei Huang et al.

Summary: A lightweight skin cancer classification model based on deep learning methods was developed to assist in medical care. The model demonstrated high accuracy in diagnosing skin cancers and benign tumors, showing great potential for clinical diagnosis and early identification.

JOURNAL OF DERMATOLOGY (2021)

Article Engineering, Mechanical

Optimization of continuous sensor placement for modal analysis: Application to an optical backscatter reflectometry strain sensor

G. Cazzulani et al.

Summary: The methods and sensors used in experimental modal analysis have been consolidated. Commonly used sensors are discrete and independent, but may present challenges in complex structures or high modal density. Recently developed dynamic sensors based on optical fibers, such as Fiber Bragg grating sensors and Optical Backscatter Reflectometry sensors, provide new options for modal analysis applications.

MECHANICAL SYSTEMS AND SIGNAL PROCESSING (2021)

Article Engineering, Mechanical

Establishing correction solutions for scanning laser Doppler vibrometer measurements affected by sensor head vibration

Ben J. Halkon et al.

Summary: This paper presents practical correction schemes for Scanning laser Doppler vibrometer (SLDV) measurements affected by sensor head vibrations. Utilizing accelerometers positioned on the sensor head or along the optical axis behind the final steering mirror effectively reduces measurement errors according to theoretical analysis and experimental results.

MECHANICAL SYSTEMS AND SIGNAL PROCESSING (2021)

Article Engineering, Electrical & Electronic

Heart-Rate Monitoring With an Ethyl Alpha-Cyanoacrylate Based Fiber Fabry-Perot Sensor

Yang Li et al.

Summary: The sensor utilizes EtCNA binder to fix the fiber F-P sensor, allowing it to detect low-frequency vibrations with high sensitivity. It accurately monitors heart rate by monitoring laser intensity variation, and can be used for heart rate measurement in different body positions.

IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS (2021)

Article Computer Science, Information Systems

SE-PPFM: A Searchable Encryption Scheme Supporting Privacy-Preserving Fuzzy Multikeyword in Cloud Systems

Mingwu Zhang et al.

Summary: This study proposes a searchable encryption scheme that supports privacy-preserving fuzzy multikeyword search in cloud systems. By utilizing the machine learning primitive Word2vec, it enhances efficiency and accuracy.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Artificial Intelligence

Multi-lane traffic flow monitoring and detection system based on video detection

Xue Liu et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2020)

Article Computer Science, Information Systems

Road network simplification for location-based services

Abdeltawab Hendawi et al.

GEOINFORMATICA (2020)

Article Computer Science, Artificial Intelligence

HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches

Song Dat Phuc Tran et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

On Physical-Social-Aware Localness Inference by Exploring Big Data from Location-Based Services

Chao Huang et al.

IEEE TRANSACTIONS ON BIG DATA (2020)

Article Computer Science, Hardware & Architecture

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

Boyang Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data

Guowen Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Proceedings Paper Computer Science, Information Systems

Towards Usability on Reverse Top-k Geo-Social Keyword Query Results

Pengfei Jin

2019 20TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2019) (2019)

Article Engineering, Multidisciplinary

Will Scale-Free Popularity Develop Scale-Free Geo-Social Networks?

Dong Liu et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2019)

Article Computer Science, Hardware & Architecture

Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks

Ruben Lumbiarres-Lopez et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Artificial Intelligence

Efficient kNN Classification With Different Numbers of Nearest Neighbors

Shichao Zhang et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)

Article Computer Science, Theory & Methods

Geometric Range Search on Encrypted Spatial Data

Boyang Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Wenhai Sun et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Engineering, Electrical & Electronic

An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud

Hui Zhu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Information Systems

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

Lichun Li et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Information Systems

Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

Hongwei Li et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2015)

Article Computer Science, Hardware & Architecture

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

Peng Xu et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

Inner-product encryption under standard assumptions

Jong Hwan Park

DESIGNS CODES AND CRYPTOGRAPHY (2011)

Article Engineering, Electrical & Electronic

Secure searchable public key encryption scheme against keyword guessing attacks

Hyun Sook Rhee et al.

IEICE ELECTRONICS EXPRESS (2009)