Computer Science ›› 2023, Vol. 50 ›› Issue (9): 26-34.doi: 10.11896/jsjkx.230400033
• Data Security • Previous Articles Next Articles
LU Yuhan, CHEN Liquan, WANG Yu, HU Zhiyuan
CLC Number:
[1]LI X,YANG J,MA J.Recent developments of content-basedimage retrieval(CBIR)[J].Neurocomputing,2021,452:675-689. [2]HE Y,CHEN L,NI Y,et al.Privacy protection scheme for edge computing based on function encryption[C]//2021 International Conference on Networking and Network Applications(NaNA).IEEE,2021:131-135. [3]LIU W,WU D J.Research progress on privacy protection ofmedical information[J].Software,2020,41(5):74-79. [4]2020 Data Breach Incident Report in the U.S.Healthcare Industry [EB/OL].www.mchz.com.cn. [5]WANG H,XIA Z,FEI J,et al.An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing[J].IEEE Access,2020,8:61138-61147. [6]AGRAWAL R,KIERNAN J,SRIKANT R,et al.Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data.2004:563-574. [7]FURUKAWA J.Request-based comparable encryption[C]//European symposium on research in computer security.Berlin:Springer,2013:129-146. [8]CHEN P,YE J,CHEN X.Efficient request-based comparable encryption scheme based on sliding window method[J].Soft Computing,2016,20:4589-4596. [9]ZOU Q,WANG J,YE J,et al.Efficient and secure encryptedimage search in mobile cloud computing[J].Soft Computing,2017,21:2959-2969. [10]QIN Z,YAN J,REN K,et al.Towards efficient privacy-preserving image feature extraction in cloud computing[C]//Procee-dings of the 22nd ACM International Conference on Multimedia.2014:497-506. [11]FENG Q,LI P,LU Z,et al.DHAN:Encrypted JPEG image retrieval via DCT histograms-based attention networks[J].Applied Soft Computing,2023,133:109935. [12]ZHANG C,LI J,WANG S,et al.An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain[C]//2017 IEEE 15th International Conference on Software Enginee-ring Research,Management and Applications(SERA).IEEE,2017:135-141. [13]GILAD-BACHRACH R,DOWLIN N,LAINE K,et al.Cryp-tonets:Applying neural networks to encrypted data with high throughput and accuracy[C]//International Conference on Machine Learning.PMLR,2016:201-210. [14]CHOU E,BEAL J,LEVY D,et al.Faster cryptonets:Leveraging sparsity for real-world encrypted inference[J].arXiv:1811.09953,2018. [15]JUVEKAR C,VAIKUNTANATHAN V,CHANDRAKASAN A.{GAZELLE}:A low latency framework for secure neural network inference[C]//27th {USENIX} Security Symposium({USENIX} Security 18).2018:1651-1669. [16]PERETEANU G L,ALANSARY A,PASSERAT-PALMBACHJ.Split HE:Fast secure inference combining split lear-ning and homomorphic encryption[J].arXiv:2202.13351,2022. [17]CHEON J H,KIM A,KIM M,et al.Homomorphic encryption for arithmetic of approximate numbers[C]//Advances in Cryptology-ASIACRYPT 2017:23rd International Conference on the Theory and Applications of Cryptology and Information Security.Springer International Publishing,2017:409-437. [18]GALLEGO A J,RICO-JUAN J R,VALERO-MAS J J.Efficient k-nearest neighbor search based on clustering and adaptive k values[J].Pattern Recognition,2022,122:108356. [19]LI W,ZHANG Y,SUN Y,et al.Approximate nearest neighbor search on high dimensional data—experiments,analyses,and improvement[J].IEEE Transactions on Knowledge and Data Engineering,2019,32(8):1475-1488. [20]BELARBI M A,MAHMOUDI S,BELALEM G,et al.A NewComparative Study of Dimensionality Reduction Methods in Large-Scale Image Retrieval[J].Big Data and Cognitive Computing,2022,6(2):54. [21]THAKUR N,REIMERS N,LIN J.Domain adaptation for me-mory-efficient dense retrieval[J].arXiv:2205.11498,2022. [22]MALKOV Y A,YASHUNIN D A.Efficient and robust appro-ximate nearest neighbor search using hierarchical navigable small world graphs[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2018,42(4):824-836. [23]IOFFE S,SZEGEDY C.Batch normalization:Accelerating deep network training by reducing internal covariate shift[C]//International Conference on Machine Learning.PMLR,2015:448-456. [24]HESAMIFARD E,TAKABI H,GHASEMI M.Cryptodl:Deep neural networks over encrypted data[J].arXiv:1711.05189,2017. [25]WANG Y,CHEN L,WU G,et al.Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing[J].Computers & Security,2023,128:103163. [26]CHENG K,FU J,SHEN Y,et al.Manto:A Practical and Secure Inference Service of Convolutional Neural Networks for IoT[J].IEEE Internet of Things Journal,doi:10.1109/JIOT.2023.3251982. [27]SRINIVASAN W Z,AKSHAYARAM P,ADA P R.DELPHI:A cryptographic inference service for neural networks[C]//Proceedings of 29th USENIX Security.2019:2505-2522. [28]XIA Z,XIONG N N,VASILAKOS A V,et al.EPCBIR:An efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J].Information Sciences,2017,387:195-204. [29]WANG Z,QIN J,XIANG X,et al.A privacy-preserving andtraitor tracking content-based image retrieval scheme in cloud computing[J].Multimedia Systems,2021,27:403-415. [30]LEE J W,KANG H,LEE Y,et al.Privacy-preserving machine learning with fully homomorphic encryption for deep neural network[J].arXiv:2106.07229,2021. [31]RATHEE D,RATHEE M,KUMAR N,et al.CrypTFlow2:Practical 2-party secure inference[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:325-342. [32]HUANG Z,LU W,HONG C,et al.Cheetah:Lean and Fast Secure {Two-Party} Deep Neural Network Inference[C]//31st USENIX Security Symposium(USENIX Security 22).2022:809-826. [33]HASSAN A,LIU F,WANG F,et al.Secure content basedimage retrieval for mobile users with deep neural networks in the cloud[J].Journal of Systems Architecture,2021,116:102043. [34]WANG Z,QIN J,XIANG X,et al.A privacy-preserving andtraitor tracking content-based image retrieval scheme in cloud computing[J].Multimedia Systems,2021,27:403-415. [35]SHEN M,CHENG G,ZHU L,et al.Content-based multi-source encrypted image retrieval in clouds with privacy preservation[J].Future Generation Computer Systems,2020,109:621-632. |
[1] | HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang. Research Progress of Backdoor Attacks in Deep Neural Networks [J]. Computer Science, 2023, 50(9): 52-61. |
[2] | YI Qiuhua, GAO Haoran, CHEN Xinqi, KONG Xiangjie. Human Mobility Pattern Prior Knowledge Based POI Recommendation [J]. Computer Science, 2023, 50(9): 139-144. |
[3] | LI Haiming, ZHU Zhiheng, LIU Lei, GUO Chenkai. Multi-task Graph-embedding Deep Prediction Model for Mobile App Rating Recommendation [J]. Computer Science, 2023, 50(9): 160-167. |
[4] | ZHU Ye, HAO Yingguang, WANG Hongyu. Deep Learning Based Salient Object Detection in Infrared Video [J]. Computer Science, 2023, 50(9): 227-234. |
[5] | YI Liu, GENG Xinyu, BAI Jing. Hierarchical Multi-label Text Classification Algorithm Based on Parallel Convolutional Network Information Fusion [J]. Computer Science, 2023, 50(9): 278-286. |
[6] | HENG Hongjun, MIAO Jing. Fusion of Semantic and Syntactic Graph Convolutional Networks for Joint Entity and Relation Extraction [J]. Computer Science, 2023, 50(9): 295-302. |
[7] | TANG Shaosai, SHEN Derong, KOU Yue, NIE Tiezheng. Link Prediction Model on Temporal Knowledge Graph Based on Bidirectionally Aggregating Neighborhoods and Global Aware [J]. Computer Science, 2023, 50(8): 177-183. |
[8] | MA Weiwei, ZHENG Qinhong, LIU Shanshan. Study and Evaluation of Spiking Neural Network Model Based on Bee Colony Optimization [J]. Computer Science, 2023, 50(8): 221-225. |
[9] | LI Qiaojun, ZHANG Wen, YANG Wei. Fusion Neural Network-based Method for Predicting LncRNA-disease Association [J]. Computer Science, 2023, 50(8): 226-232. |
[10] | XIE Tonglei, DENG Li, YOU Wenlong, LI Ruilong. Analysis and Prediction of Cloud VM CPU Load Based on EMPC-BCGRU [J]. Computer Science, 2023, 50(8): 243-250. |
[11] | ZHAO Ran, YUAN Jiabin, FAN Lili. Medical Ultrasound Image Super-resolution Reconstruction Based on Video Multi-frame Fusion [J]. Computer Science, 2023, 50(7): 143-151. |
[12] | JIANG Linpu, CHEN Kejia. Self-supervised Dynamic Graph Representation Learning Approach Based on Contrastive Prediction [J]. Computer Science, 2023, 50(7): 207-212. |
[13] | ZHU Yuying, GUO Yan, WAN Yizhao, TIAN Kai. New Word Detection Based on Branch Entropy-Segmentation Probability Model [J]. Computer Science, 2023, 50(7): 221-228. |
[14] | LI Rongchang, ZHENG Haibin, ZHAO Wenhong, CHEN Jinyin. Data Reconstruction Attack for Vertical Graph Federated Learning [J]. Computer Science, 2023, 50(7): 332-338. |
[15] | XIONG Haojie, WEI Yi. Study on Multibeam Sonar Elevation Data Prediction Based on Improved CNN-BP [J]. Computer Science, 2023, 50(6A): 220100161-4. |
|