A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Searchable encryption for healthcare clouds: A survey

R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …

Efficient similarity search over encrypted data

M Kuzu, MS Islam… - 2012 IEEE 28th …, 2012 - ieeexplore.ieee.org
In recent years, due to the appealing features of cloud computing, large amount of data have
been stored in the cloud. Although cloud based services offer many advantages, privacy and …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …

T-recsys: A novel music recommendation system using deep learning

F Fessahaye, L Perez, T Zhan, R Zhang… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
A recommendation system is a program that utilizes techniques to suggest to a user items
that they would likely prefer. This paper focuses on an approach to improving music …

Key-policy attribute-based encryption with keyword search in virtualized environments

Y Yu, J Shi, H Li, Y Li, X Du… - IEEE Journal on Selected …, 2020 - ieeexplore.ieee.org
Cloud computing is a model for convenient, on-demand network access to virtualized
environments of configurable computing resources. It is challenging to search data …

Machine learning models for paraphrase identification and its applications on plagiarism detection

E Hunt, R Janamsetty, C Kinares, C Koh… - … Conference on Big …, 2019 - ieeexplore.ieee.org
Paraphrase Identification or Natural Language Sentence Matching (NLSM) is one of the
important and challenging tasks in Natural Language Processing where the task is to …

Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture

H Wu, B Düdder, L Wang, Z Cao, J Zhou… - ACM Computing …, 2023 - dl.acm.org
Secure keyword search is a prevailing search service offered in outsourced environments.
However, with the increasingly severe security vulnerabilities of conventional centralized …

Cryptography for Big Data Security.

A Hamlin, N Schear, E Shen, M Varia… - … Cryptol. ePrint Arch …, 2016 - api.taylorfrancis.com
With the amount of data generated, collected, and analyzed by computing systems growing
at an amazing rate, big data processing has become crucial to most enterprise and …

A study of ensemble methods for cyber security

N Lower, F Zhan - 2020 10th Annual Computing and …, 2020 - ieeexplore.ieee.org
Ensemble methods for machine learning serve to increase the predictive power of
preexisting models by applying a meta-algorithm on top of the underlying workings of one or …