Secure binary embeddings for privacy preserving nearest neighbors (original) (raw)

Secure nearest neighbor revisited

Feifei Li

2013 IEEE 29th International Conference on Data Engineering (ICDE), 2013

View PDFchevron_right

Privacy preserving nearest neighbor search

vipin Kumar

2009

View PDFchevron_right

Secure and efficient approximate nearest neighbors search

Teddy Furon

Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13, 2013

View PDFchevron_right

Enhancing Privacy Preserving Query Retrieval Using Locality Sensitive Hashing

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019

View PDFchevron_right

Beyond Locality-Sensitive Hashing

Huy Nguyễn

Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013

View PDFchevron_right

Efficient Similarity Search over Encrypted Data

love dead

View PDFchevron_right

Nearest neighbour search over encrypted data using intel SGX

Wasif Ahmed

Journal of Information Security and Applications, 2020

View PDFchevron_right

Fast locality-sensitive hashing

Ankam Ravi Kumar

Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '11, 2011

View PDFchevron_right

Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation

Osmar R. Zaiane

Proceedings of the 2004 ICDM Workshop on …, 2004

View PDFchevron_right

Lattice-based Locality Sensitive Hashing is Optimal

Elena Grigorescu

ArXiv, 2018

View PDFchevron_right

Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns

Alexandra Boldyreva

Proceedings on Privacy Enhancing Technologies, 2021

View PDFchevron_right

Privacy-Preserving near Neighbor Search via Sparse Coding with Ambiguation

Behrooz Razeghi

ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

View PDFchevron_right

A Survey on Privacy Preserving Technique Using K- Nearest Neighbor Classification

karuna bagde

International Journal of Engineering Sciences and Research Technology, 2016

View PDFchevron_right

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection

Elisa Bertino

2011

View PDFchevron_right

Locality-Sensitive Hashing for Chi2 Distance

david gorisse

IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012

View PDFchevron_right

Fast and secure similarity search in high dimensional space

Teddy Furon

2013 IEEE International Workshop on Information Forensics and Security (WIFS), 2013

View PDFchevron_right

EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

Carlo Blundo

Lecture Notes in Computer Science, 2013

View PDFchevron_right

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

rohan wadmare

IEEE Transactions on Knowledge and Data Engineering, 2015

View PDFchevron_right

Secure Metric-Based Index for Similarity Cloud

Pavel Zezula

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Locality-Sensitive Hashing with Margin Based Feature Selection

Yui Noma

2012

View PDFchevron_right

Ijesrt International Journal of Engineering Sciences & Research Technology a Survey on Privacy Preserving Technique Using K-Nearest Neighbor Classification

karuna bagde

View PDFchevron_right

Secure semi-supervised vector quantization for dissimilarity data

F.-m. Schleif

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013

View PDFchevron_right

A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms

Aryya Gangopadhyay

The VLDB Journal, 2006

View PDFchevron_right

Secure Nearest Neighbor Query on Crowd-Sensing Data

Ke Cheng

Sensors (Basel, Switzerland), 2016

View PDFchevron_right

A privacy preserving technique for distance-based classification with worst case privacy guarantees

Aryya Gangopadhyay

Data & Knowledge Engineering, 2008

View PDFchevron_right

Privacy-preserving k-NN interpolation over two encrypted databases

Murat osmanoğlu

PeerJ, 2022

View PDFchevron_right

Privacy-preserving k-NN for small and large data sets

vladimir castro

Proceedings - IEEE International Conference on Data Mining, ICDM, 2007

View PDFchevron_right

Frequent grams based embedding for privacy preserving record linkage

Benjamin C. M. Fung

Proceedings of the 21st ACM international conference on Information and knowledge management, 2012

View PDFchevron_right

Privacy Preserving Record Linkage via grams Projections

Benjamin Fung

2012

View PDFchevron_right

Location Oblivious Privacy Protection for Group Nearest Neighbor Queries

rahman khan

Lecture Notes in Computer Science, 2014

View PDFchevron_right