Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud
Y Liu, H Dai, Q Zhou, P Li, X Yi, G Yang - Future Generation Computer …, 2024 - Elsevier
Traditional privacy-preserving search schemes have commonly used the TF-IDF model,
which relies on keyword frequency statistics but neglects the semantic relationships …
which relies on keyword frequency statistics but neglects the semantic relationships …
Forward/backward and content private DSSE for spatial keyword queries
Spatial keyword queries are attractive techniques that have been widely deployed in real-life
applications in recent years, such as social networks and location-based services. However …
applications in recent years, such as social networks and location-based services. However …
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data
Boolean range query, as one typical spatial keyword query, has received more and more
attention and been widely deployed in many applications. To release the storage and …
attention and been widely deployed in many applications. To release the storage and …
Enabling Efficient Privacy-Preserving Spatiotemporal Location-Based Services for Smart Cities
GPS-enabled Internet of Things devices, which can obtain the location and temporal
information of installed objects to promote location-based service, are completely changing …
information of installed objects to promote location-based service, are completely changing …
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
As cloud computing and Internet of Things (IoT) are becoming more and more deeply
integrated, the new secure challenge for IoT data has attracted great attention. Privacy …
integrated, the new secure challenge for IoT data has attracted great attention. Privacy …
VPRQ: Verifiable and privacy-preserving range query over encrypted cloud data
Cloud has scalable storage and massive computing power, attracting data owners to
outsource their data. However, owing to privacy concerns, data is typically encrypted prior to …
outsource their data. However, owing to privacy concerns, data is typically encrypted prior to …
Range search over encrypted multi-attribute data
This work addresses expressive queries over encrypted data by presenting the first
systematic study of multi-attribute range search on a symmetrically encrypted database …
systematic study of multi-attribute range search on a symmetrically encrypted database …
[HTML][HTML] Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme
The rapid progress in the field of IoT and its wide-ranging applications emphasize the
criticality of robust security measures for effectively sharing, storing, and managing sensitive …
criticality of robust security measures for effectively sharing, storing, and managing sensitive …
Privacy-preserving Spatial Dataset Search in Cloud
The development of cloud computing has met the growing demand for dataset search in the
era of massive data. In the field of spatial dataset search, the high prevalence of sensitive …
era of massive data. In the field of spatial dataset search, the high prevalence of sensitive …
Semantic‐Based Multi‐Keyword Ranked Search Schemes over Encrypted Cloud Data
Z Hu, H Dai, G Yang, X Yi… - Security and …, 2022 - Wiley Online Library
Traditional searchable encryption schemes construct document vectors based on the term
frequency‐inverse document frequency (TF‐IDF) model. Such vectors are not only high …
frequency‐inverse document frequency (TF‐IDF) model. Such vectors are not only high …