Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (5): 156-165.doi: 10.19665/j.issn1001-2400.20230406
• Cyberspace Security • Previous Articles Next Articles
CAI Ying(),ZHANG Meng(),LI Xin(),ZHANG Yu(),FAN Yanfang()
Received:
2023-01-14
Online:
2023-10-20
Published:
2023-11-21
CLC Number:
CAI Ying,ZHANG Meng,LI Xin,ZHANG Yu,FAN Yanfang. Anti-collusion attack image retrieval privacy protection scheme for ASPE[J].Journal of Xidian University, 2023, 50(5): 156-165.
[1] | 杨海滨, 李瑞峰, 易铮阁, 等. 无双线性对的高效云存储数据审计方案[J]. 西安电子科技大学学报, 2022, 49(1):47-54. |
YANG Haibin, LI Ruifeng, YI Zhengge, et al. Efficient Cloud Storage Data Auditing Scheme without Bilinear Pairing[J]. Journal of Xidian University, 2022, 49(1):47-54. | |
[2] | ZHANG M, CAI Y, ZHANG Y, et al. A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing[C]//2021 3rd International Conference on Big Data and Security.Heidelberg:Springer, 2022:312-325. |
[3] |
WENG W, YAKIMENK Y, LIN Y, et al. Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval[J]. IEEE Transactions on Information Forensics and Security, 2022, 17:3495-3510.
doi: 10.1109/TIFS.2022.3203320 |
[4] | 闫玺玺, 赵强, 汤永利, 等. 支持灵活访问控制的多关键字搜索加密方案[J]. 西安电子科技大学学报, 2022, 49(1):55-66. |
YAN Xixi, ZHAO Qiang, TANG Yongli, et al. Multi-Keyword Search Encryption Scheme Supporting Flexible Access Control[J]. Journal of Xidian University, 2022, 49(1):55-66. | |
[5] |
LI Y, MA J, MIAO Y, et al. Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings[J]. IEEE Transactions on Cloud Computing, 2022, 10(4):2936-2948.
doi: 10.1109/TCC.2020.3034232 |
[6] | LI Y, MA J, MIAO Y, et al. DVREI:Dynamic Verifiable Retrieval Over Encrypted Images[J]. IEEE Transactions on Computers, 2022, 71(8):1755-1769. |
[7] |
DONG X, ZHANG W, SHAH M, et al. Watermarking-Based Secure Plaintext Image Protocols for Storage,Show,Deletion and Retrieval in the Cloud[J]. IEEE Transactions on Services Computing, 2022, 15(3):1678-1692.
doi: 10.1109/TSC.2020.3008957 |
[8] |
SONG L, MIAO Y, WENG J, et al. Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(15):13598-13611.
doi: 10.1109/JIOT.2022.3142933 |
[9] |
XIA Z, JIANG L, LIU D, et al. BOEW:A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing[J]. IEEE Transactions on Services Computing, 2022, 15(1):202-214.
doi: 10.1109/TSC.2019.2927215 |
[10] | 宋甫元, 秦拯, 张吉昕, 等. 基于访问控制安全高效的多用户外包图像检索方案[J]. 网络与信息安全学报, 2021, 7(5):29-39. |
SONG Fuyuan, QIN Zheng, ZHANG Jixin, et al. Efficient and Secure Multi-User Outsourced Image Retrieval Scheme with Access Control[J]. Chinese Journal of Network and Information Security, 2021, 7(5):29-39. | |
[11] |
DING Y, TAN F, QIN Z, et al. DeepKeyGen:A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption[J]. IEEE Transactions on Neural Networks and Learning Systems, 2022, 33(9):4915-4929.
doi: 10.1109/TNNLS.2021.3062754 |
[12] |
LI F, SHUGUROV I, BUSAM B, et al. WS-OPE:Weakly Supervised 6-D Object Pose Regression Using Relative Multi-Camera Pose Constraints[J]. IEEE Robotics and Automation Letters, 2022, 7(2):3703-3710.
doi: 10.1109/LRA.2022.3146924 |
[13] |
LI S, ZHAO S, MIN G, et al. Lightweight Privacy-Preserving Scheme Using HomomorphicEncryption in Industrial Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(16):14542-14550.
doi: 10.1109/JIOT.2021.3066427 |
[14] | IIDA K, KIYA H. A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images[C]//2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech).Piscataway:IEEE, 2022:183-186. |
[15] | WONG W K, CHEUNG D W, KAO B, et al. Secure kNN Computation on Encrypted Databases[C]//Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2009:139-152. |
[16] |
YUAN J, TIAN Y. Practical Privacy-Preserving Mapreduce Based k-Means Clustering over Large-Scale Dataset[J]. IEEE Transactions on Cloud Computing, 2017, 7(2):568-579.
doi: 10.1109/TCC.6245519 |
[17] | SONG F, QIN Z, ZHANG J, et al. Efficient and Privacy-Preserving Outsourced Image Retrieval in Public Clouds[C]//GLOBECOM 2020-2020 IEEE Global Communications Conference.Piscataway:IEEE, 2020:1-6. |
[18] |
LI Y, MA J, MIAO Y, et al. Similarity Search for Encrypted Images in Secure Cloud Computing[J]. IEEE Transactions on Cloud Computing, 2022, 10(2):1142-1155.
doi: 10.1109/TCC.2020.2989923 |
[19] | LI X, XUE Q, CHUAH M C. Casheirs:Cloud Assisted Scalable Hierarchical Encrypted Based Image Retrieval System[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications. Piscataway:IEEE, 2017:1-9. |
[1] | WANG Bo,LI Hongtao,WANG Jie,GUO Yina. Federated learning scheme for privacy-preserving of medical data [J]. Journal of Xidian University, 2023, 50(5): 166-177. |
[2] | SONG Cheng,CHENG Daochen,PENG Weiping. Efficient federated learning privacy protection scheme [J]. Journal of Xidian University, 2023, 50(5): 178-187. |
[3] | CAO Laicheng,WU Wentao,FENG Tao,GUO Xian. Privacy preserving multi-classification LR scheme for data quality [J]. Journal of Xidian University, 2023, 50(5): 188-198. |
[4] | LI Haiyang,GUO Jingjing,LIU Jiuzun,LIU Zhiquan. Privacy preserving byzantine robust federated learning algorithm [J]. Journal of Xidian University, 2023, 50(4): 121-131. |
[5] | YANG Xiaohui,ZHUANG Haijing. Anonymous communication model with dynamic negotiation of identifiers [J]. Journal of Xidian University, 2023, 50(4): 100-110. |
[6] | DING Hongfa,TANG Mingli,LIU Hai,JIANG Heling,FU Peiwang,YU Yingying. Model for protection of k-degree anonymity privacy under neighbor subgraph disturbance [J]. Journal of Xidian University, 2023, 50(4): 180-193. |
[7] | LI Huadong,ZHANG Xueliang,WANG Xiaolei,LIU Hui,WANG Pengcheng,DU Junzhao. Multi-node cooperative game load balancing strategy in the Kubernetes cluster [J]. Journal of Xidian University, 2021, 48(6): 16-22. |
[8] | YAN Jia,CAO Yudong,REN Jiaxing,CHEN Donghao,LI Xiaohui. Deep asymmetric compression Hashing algorithm [J]. Journal of Xidian University, 2021, 48(5): 212-221. |
[9] | LIU Daohua,CUI Yushuang,ZHAO Yansong,SONG Yuting,WANG Jinghui. Method for retrieving the teaching image based on the improved convolutional neural network [J]. Journal of Xidian University, 2019, 46(3): 52-58. |
[10] | LIU Wanling,XIAO Chengzhi,FU Yanggeng. Extended belief rule base inference method based on the Hash index [J]. Journal of Xidian University, 2019, 46(2): 145-151. |
[11] | WANG Yan. Enhanced multi-objective evolutionary algorithm for workflow scheduling on the cloud platform [J]. Journal of Xidian University, 2019, 46(1): 130-136. |
[12] | HAN Kun;ZHANG Hailin;XIN Dan;WU Bo;KANG Yuanji. Design method of an identity-based fully homomorphic encryption library [J]. Journal of Xidian University, 2017, 44(4): 56-61. |
[13] | YANG Yuan;ZHA Yufei;QIN Bing;LIANG Bingbing;YANG Liwei;LI Yunqiang. Image retrieval based on kernel trick and iterative quantization [J]. Journal of Xidian University, 2017, 44(1): 165-170. |
[14] | JING Weipeng;HUO Shuaiqi;CHEN Guangsheng;LIU Yaqiu. Novel mixed-criticality reliability scheduling strategy and schedulability test [J]. Journal of Xidian University, 2016, 43(6): 158-163. |
[15] | HUANG Chunshui;REN Yanli;CAI Jianxing. Verifiable outsourcing scheme for batch modular exponentiations [J]. Journal of Xidian University, 2016, 43(4): 135-140. |
|