Based on secure kNN computation, this method is made to evaluate similarity measure for the user's search keyword while allowing encryption. The method includes encryption of documents before outsourcing to the
Cloud computing has been one of the critical solutions to reduce heavy storage and computation burden of biometric identification. To protect the privacy o
Deep learning-based semantic search (DLSS) aims to bridge the gap between experts and non-experts in search. Experts can create precise queries due to their prior knowledge, while non-experts struggle with specific terms and concepts, making their queries less precise. Cloud infrastructure offers a...
Finally, the performance of TraVel is evaluated based on BC parameters (SC deployment cost, data feeds storage cost, transactions cost in terms of gas) simulated on REMIX IDE and IPFS. Besides, the efficacy of the TL-based learning model is evaluated on parameters, for instance, accuracy, los...
This research work presents several significant contributions to the field of intrusion detection in cloud storage: i) A novel intrusion detection method using the K-Nearest Neighbor (KNN) classification algorithm has been introduced. This method analyzes the unusual patterns of activity in the network...
简介:网安顶刊IEEE Transactions on Dependable and Secure Computing 写在最前面 为了给自己找论文方向,看了看安全的顶刊最近都发了哪些论文 不过后面找到了另一篇博客,感觉更有用hh 指路: CSDN博主「riusksk」https://blog.csdn.net/riusksk/article/details/131278262 ...
Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing. IEEE Access , 2020 , 8: 37632 -37644 CrossRef Google Scholar [26] He K, Sun J. Convolutional neural networks at constrained time cost. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVP...
This leads to a trend that users authorize the cloud to perform computation on stored data, such as keyword search, equality test, and outsourced data clustering. In outsourced data clustering, the cloud classifies users’ data into groups according to their similarities. Considering the sensitive ...
Additionally, we compare the proposed scheme with various machine learning classifiers, including Artificial Neural Networks (ANN), Support Vector Machines (SVM), k-Nearest Neighbors (KNN), and Decision Trees (DT). The evaluation includes the computation of the confusion matrix as well as multiple ...
A quantum secure multiparty computation protocol for least common multiple. 2022. Preprint. https:// doi.org/10.48550/arXiv.2210.08165. 31. Liu WJ, Yang Q, Li ZX. Quantum multi-party private set union protocol based on least common multiple and shor's algorithm. Int J Quantum Inf. 2023;...