Building in-the-cloud network functions: Security and privacy challenges

P Jiang, Q Wang, M Huang, C Wang, Q Li… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Network function virtualization (NFV) has been promising to improve the availability,
programmability, and flexibility of network function deployment and communication facilities …

Achieving efficient and privacy-preserving exact set similarity search over encrypted data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …

Towards private similarity query based healthcare monitoring over digital twin cloud platform

Y Zheng, R Lu, Y Guan, S Zhang… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
As the growing proportion of aging population, the demand for sustainable, high quality, and
timely healthcare services has become increasingly pressing, especially since the outbreak …

Efficient privacy-preserving similarity range query with quadsector tree in ehealthcare

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a consequence of advance in the Internet of Things (IoT) and big data technology, smart
eHealthcare has emerged and greatly enabled patients to enjoy high-quality healthcare …

Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud

J Shao, R Lu, Y Guan, G Wei - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
Due to the high demands of searchability over encrypted data, searchable encryption (SE)
has recently received considerable attention and been widely suggested in encrypted cloud …

PPSB: An open and flexible platform for privacy-preserving safe browsing

H Cui, Y Zhou, C Wang, X Wang, Y Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Safe Browsing (SB) is an important security feature in modern web browsers to help detect
new unsafe websites. Although useful, recent studies have pointed out that the widely …

Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes

J Yao, X Meng, Y Zheng, C Wang - IEEE Transactions on Cloud …, 2022 - ieeexplore.ieee.org
It is increasingly popular for cloud providers to offer middlebox service that supports content-
based similarity detection for enterprises. However, redirecting network traffic to the cloud for …

Near duplicate detection of images with area and proposed pixel‐based feature extraction

K Governor, P Ramanujam, SC Mana… - Concurrency and …, 2023 - Wiley Online Library
Efficient and accurate near‐duplicate recognition is the trendy research area. Identification
of invalid near‐duplicate images offers a wide range of applications, including digital picture …

Design of efficient and privacy-preserving similarity query over encrypted data in Cloud

Y Zheng - 2022 - unbscholar.lib.unb.ca
Similarity query, retrieving objects similar to a sample of interest, has enabled plentiful
customized services in a variety of applications, such as disease diagnosis, locationbased …

Privacy Preserving Over Encrypted Data And Urls Detection

V Dhivya, M Goudhaman - INTERNATIONAL JOURNAL OF …, 2021 - rjwave.org
Abstract Detect Malicious or Fake URLs which consider as social engineering sites
(phishing and deceptive sites) that host malware or unwanted software. Safe Browsing (SB) …