[1] |
杨海滨, 李瑞峰, 易铮阁, 等. 无双线性对的高效云存储数据审计方案[J]. 西安电子科技大学学报, 2022, 49(1):47-54.
|
|
YANG Haibin, LI Ruifeng, YI Zhengge, et al. Efficient Cloud Storage Data Auditing Scheme without Bilinear Pairing[J]. Journal of Xidian University, 2022, 49(1):47-54.
|
[2] |
ZHANG M, CAI Y, ZHANG Y, et al. A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing[C]//2021 3rd International Conference on Big Data and Security.Heidelberg:Springer, 2022:312-325.
|
[3] |
WENG W, YAKIMENK Y, LIN Y, et al. Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval[J]. IEEE Transactions on Information Forensics and Security, 2022, 17:3495-3510.
doi: 10.1109/TIFS.2022.3203320
|
[4] |
闫玺玺, 赵强, 汤永利, 等. 支持灵活访问控制的多关键字搜索加密方案[J]. 西安电子科技大学学报, 2022, 49(1):55-66.
|
|
YAN Xixi, ZHAO Qiang, TANG Yongli, et al. Multi-Keyword Search Encryption Scheme Supporting Flexible Access Control[J]. Journal of Xidian University, 2022, 49(1):55-66.
|
[5] |
LI Y, MA J, MIAO Y, et al. Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings[J]. IEEE Transactions on Cloud Computing, 2022, 10(4):2936-2948.
doi: 10.1109/TCC.2020.3034232
|
[6] |
LI Y, MA J, MIAO Y, et al. DVREI:Dynamic Verifiable Retrieval Over Encrypted Images[J]. IEEE Transactions on Computers, 2022, 71(8):1755-1769.
|
[7] |
DONG X, ZHANG W, SHAH M, et al. Watermarking-Based Secure Plaintext Image Protocols for Storage,Show,Deletion and Retrieval in the Cloud[J]. IEEE Transactions on Services Computing, 2022, 15(3):1678-1692.
doi: 10.1109/TSC.2020.3008957
|
[8] |
SONG L, MIAO Y, WENG J, et al. Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(15):13598-13611.
doi: 10.1109/JIOT.2022.3142933
|
[9] |
XIA Z, JIANG L, LIU D, et al. BOEW:A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing[J]. IEEE Transactions on Services Computing, 2022, 15(1):202-214.
doi: 10.1109/TSC.2019.2927215
|
[10] |
宋甫元, 秦拯, 张吉昕, 等. 基于访问控制安全高效的多用户外包图像检索方案[J]. 网络与信息安全学报, 2021, 7(5):29-39.
|
|
SONG Fuyuan, QIN Zheng, ZHANG Jixin, et al. Efficient and Secure Multi-User Outsourced Image Retrieval Scheme with Access Control[J]. Chinese Journal of Network and Information Security, 2021, 7(5):29-39.
|
[11] |
DING Y, TAN F, QIN Z, et al. DeepKeyGen:A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption[J]. IEEE Transactions on Neural Networks and Learning Systems, 2022, 33(9):4915-4929.
doi: 10.1109/TNNLS.2021.3062754
|
[12] |
LI F, SHUGUROV I, BUSAM B, et al. WS-OPE:Weakly Supervised 6-D Object Pose Regression Using Relative Multi-Camera Pose Constraints[J]. IEEE Robotics and Automation Letters, 2022, 7(2):3703-3710.
doi: 10.1109/LRA.2022.3146924
|
[13] |
LI S, ZHAO S, MIN G, et al. Lightweight Privacy-Preserving Scheme Using HomomorphicEncryption in Industrial Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(16):14542-14550.
doi: 10.1109/JIOT.2021.3066427
|
[14] |
IIDA K, KIYA H. A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images[C]//2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech).Piscataway:IEEE, 2022:183-186.
|
[15] |
WONG W K, CHEUNG D W, KAO B, et al. Secure kNN Computation on Encrypted Databases[C]//Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2009:139-152.
|
[16] |
YUAN J, TIAN Y. Practical Privacy-Preserving Mapreduce Based k-Means Clustering over Large-Scale Dataset[J]. IEEE Transactions on Cloud Computing, 2017, 7(2):568-579.
doi: 10.1109/TCC.6245519
|
[17] |
SONG F, QIN Z, ZHANG J, et al. Efficient and Privacy-Preserving Outsourced Image Retrieval in Public Clouds[C]//GLOBECOM 2020-2020 IEEE Global Communications Conference.Piscataway:IEEE, 2020:1-6.
|
[18] |
LI Y, MA J, MIAO Y, et al. Similarity Search for Encrypted Images in Secure Cloud Computing[J]. IEEE Transactions on Cloud Computing, 2022, 10(2):1142-1155.
doi: 10.1109/TCC.2020.2989923
|
[19] |
LI X, XUE Q, CHUAH M C. Casheirs:Cloud Assisted Scalable Hierarchical Encrypted Based Image Retrieval System[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications. Piscataway:IEEE, 2017:1-9.
|