-
2
-
-
76049115282
-
Multiscale mobility networks and the spatial spreading of infectious diseases
-
D. Balcan, V. Colizza, B. Gonçalves, H. Hu, J. J. Ramasco, and A. Vespignani, "Multiscale mobility networks and the spatial spreading of infectious diseases, " Proc. Nat. Academy Sci. United States America, vol. 106, no. 51, pp. 21 484-21 489, 2009.
-
(2009)
Proc. Nat. Academy Sci. United States America
, vol.106
, Issue.51
, pp. 21484-21489
-
-
Balcan, D.1
Colizza, V.2
Gonçalves, B.3
Hu, H.4
Ramasco, J.J.5
Vespignani, A.6
-
3
-
-
84954165159
-
LINKAGE: An approach for comprehensive risk prediction for care management
-
Z. Sun, F. Wang, and J. Hu, "LINKAGE: An approach for comprehensive risk prediction for care management, " in Proc. SIGKDD, 2015, pp. 1145-1154.
-
(2015)
Proc. SIGKDD
, pp. 1145-1154
-
-
Sun, Z.1
Wang, F.2
Hu, J.3
-
4
-
-
79952600976
-
Role of social networks in shaping disease transmission during a community outbreak of 2009 H1N1 pandemic influenza
-
S. Cauchemez, et al., "Role of social networks in shaping disease transmission during a community outbreak of 2009 H1N1 pandemic influenza, " Proc. Nat. Academy Sci. United States America, vol. 108, no. 7, pp. 2825-2830, 2011.
-
(2011)
Proc. Nat. Academy Sci. United States America
, vol.108
, Issue.7
, pp. 2825-2830
-
-
Cauchemez, S.1
-
5
-
-
84940523433
-
Security and privacy for mobile healthcare networks-from quality-of-pro-tection perspective
-
Aug.
-
K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. Luo, "Security and privacy for mobile healthcare networks-from quality-of-pro-tection perspective, " IEEE Wireless Commun., vol. 22, no. 4, pp. 104-112, Aug. 2015.
-
(2015)
IEEE Wireless Commun.
, vol.22
, Issue.4
, pp. 104-112
-
-
Zhang, K.1
Yang, K.2
Liang, X.3
Su, Z.4
Shen, X.5
Luo, H.6
-
6
-
-
85049730824
-
Dependable structural health monitoring using wireless sensor networks
-
to be published
-
M. Bhuiyan, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang, "Dependable structural health monitoring using wireless sensor networks, " IEEE Trans. Dependable Secure Comput., to be published.
-
IEEE Trans. Dependable Secure Comput
-
-
Bhuiyan, M.1
Wang, G.2
Wu, J.3
Cao, J.4
Liu, X.5
Wang, T.6
-
7
-
-
84975297765
-
A trust-based privacy-preserving friend recommendation scheme for online social networks
-
Jul./Aug.
-
L. Guo, C. Zhang, and Y. Fang, "A trust-based privacy-preserving friend recommendation scheme for online social networks, " IEEE Trans. Dependable Secure Comput., vol. 12, no. 4, pp. 413-427, Jul./Aug. 2015.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.12
, Issue.4
, pp. 413-427
-
-
Guo, L.1
Zhang, C.2
Fang, Y.3
-
8
-
-
85049751876
-
Security and privacy in smart city applications: Challenges and solutions
-
to be published
-
K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen, "Security and privacy in smart city applications: Challenges and solutions, " IEEE Commun. Mag., to be published.
-
IEEE Commun. Mag
-
-
Zhang, K.1
Ni, J.2
Yang, K.3
Liang, X.4
Ren, J.5
Shen, X.6
-
9
-
-
84896982446
-
Exploiting multimedia services in mobile social network from security and privacy perspectives
-
Mar.
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting multimedia services in mobile social network from security and privacy perspectives, " IEEE Commun. Mag., vol. 52, no. 3, pp. 58-65, Mar. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.3
, pp. 58-65
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
10
-
-
84962579256
-
MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
-
Jan./Feb.
-
R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang, and S. Gjessing, "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks, " IEEE Trans. Dependable Secure Comput., vol. 13, no. 1, pp. 93-105, Jan./Feb. 2016.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, vol.13
, Issue.1
, pp. 93-105
-
-
Yu, R.1
Kang, J.2
Huang, X.3
Xie, S.4
Zhang, Y.5
Gjessing, S.6
-
11
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Jan.
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
12
-
-
33845989821
-
Can machine learning be secure?
-
M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. Tygar, "Can machine learning be secure?" in Proc. ASIACCS, 2006, pp. 16-25.
-
(2006)
Proc. ASIACCS
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.4
Tygar, J.5
-
13
-
-
79957974657
-
Implementing gentry's fully-homomor-phic encryption scheme
-
C. Gentry and S. Halevi, "Implementing gentry's fully-homomor-phic encryption scheme, "in Proc. EUROCRYPT, 2011, pp. 129-148.
-
(2011)
Proc. EUROCRYPT
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
14
-
-
84907495049
-
Quality-of-experience (QoE) in emerging mobile social networks
-
M. Dong, T. Kimata, K. Sugiura, and K. Zettsu, "Quality-of-experience (QoE) in emerging mobile social networks, " IEICE Trans. Inf. Syst., vol. E97-D, no. 10, pp. 2606-2612, 2014.
-
(2014)
IEICE Trans. Inf. Syst.
, vol.E97-D
, Issue.10
, pp. 2606-2612
-
-
Dong, M.1
Kimata, T.2
Sugiura, K.3
Zettsu, K.4
-
15
-
-
84937425876
-
CAMF: Context-aware message forwarding in mobile social networks
-
Aug.
-
K. Wei, M. Dong, K. Ota, and K. Xu, "CAMF: Context-aware message forwarding in mobile social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 8, pp. 2178-2187, Aug. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.8
, pp. 2178-2187
-
-
Wei, K.1
Dong, M.2
Ota, K.3
Xu, K.4
-
16
-
-
84963815241
-
Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification
-
Mar.
-
X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, "Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification, " IEEE J. Biomed. Health Informat., vol. 2, no. 20, pp. 1261-1273, Mar. 2016.
-
(2016)
IEEE J. Biomed. Health Informat.
, vol.2
, Issue.20
, pp. 1261-1273
-
-
Liu, X.1
Lu, R.2
Ma, J.3
Chen, L.4
Qin, B.5
-
17
-
-
84948821062
-
Machine learning classification over encrypted data
-
R. Bost, R. Popa, S. Tu, and S. Goldwasser, "Machine learning classification over encrypted data, " in Proc. Nat. Academy Sci. Armenia, 2015, pp. 1-14.
-
(2015)
Proc. Nat. Academy Sci. Armenia
, pp. 1-14
-
-
Bost, R.1
Popa, R.2
Tu, S.3
Goldwasser, S.4
-
18
-
-
0034244889
-
Learning patterns of activity using real-time tracking
-
Aug.
-
C. Stauffer and W. Grimson, "Learning patterns of activity using real-time tracking, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 8, pp. 747-757, Aug. 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.22
, Issue.8
, pp. 747-757
-
-
Stauffer, C.1
Grimson, W.2
-
19
-
-
5044228350
-
Detecting unusual activity in video
-
H. Zhong, J. Shi, and M. Visontai, "Detecting unusual activity in video, " in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recog-nit., 2004, pp. 819-826.
-
(2004)
Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recog-nit.
, pp. 819-826
-
-
Zhong, H.1
Shi, J.2
Visontai, M.3
-
20
-
-
33745127418
-
Semi-supervised adapted HMMs for unusual event detection
-
D. Zhang, D. Gatica-Perez, S. Bengio, and I. McCowan, "Semi-supervised adapted HMMs for unusual event detection, " in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., 2005, pp. 611-618.
-
(2005)
Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit.
, pp. 611-618
-
-
Zhang, D.1
Gatica-Perez, D.2
Bengio, S.3
McCowan, I.4
-
21
-
-
84940533844
-
Exploiting mobile social behaviors for sybil detection
-
K. Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting mobile social behaviors for sybil detection, " in Proc. IEEE INFO-COM, 2015, pp. 271-279.
-
(2015)
Proc. IEEE INFO-COM
, pp. 271-279
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Yang, K.4
Shen, X.5
-
22
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
D. Boneh, E. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts, " in Proc. 2nd Int. Conf. Theory Cryptography, 2005, vol. 2, pp. 325-341.
-
(2005)
Proc. 2nd Int. Conf. Theory Cryptography
, vol.2
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
23
-
-
84856466374
-
(Leveled) fully homomorphic encryption without bootstrapping
-
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, "(Leveled) fully homomorphic encryption without bootstrapping, " in Proc. 3rd Innovations Theoretical Comput. Sci. Conf., 2012, pp. 309-325.
-
(2012)
Proc. 3rd Innovations Theoretical Comput. Sci. Conf.
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
24
-
-
84881251369
-
ML confidential: Machine learning on encrypted data
-
T. Graepel, K. Lauter, and M. Naehrig, "ML confidential: Machine learning on encrypted data, " in Proc. 15th Int. Conf. Inf. Secur. Cryptology, 2012, pp. 1-21.
-
(2012)
Proc. 15th Int. Conf. Inf. Secur. Cryptology
, pp. 1-21
-
-
Graepel, T.1
Lauter, K.2
Naehrig, M.3
-
25
-
-
79957487964
-
Privacy-preserving ECG classification with branching programs and neural networks
-
Jun.
-
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, "Privacy-preserving ECG classification with branching programs and neural networks, " IEEE Trans. Inf. Forensics Secur., vol. 6, no. 2, pp. 452-468, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.-R.4
Schneider, T.5
-
26
-
-
84926628839
-
K-nearest neighbor classification over semantically secure encrypted relational data
-
May
-
B. K. Samanthula, Y. Elmehdwi, and W. Jiang, "k-nearest neighbor classification over semantically secure encrypted relational data, " IEEE Trans. Knowl. Data Eng., vol. 27, no. 5, pp. 1261-1273, May 2015.
-
(2015)
IEEE Trans. Knowl. Data Eng.
, vol.27
, Issue.5
, pp. 1261-1273
-
-
Samanthula, B.K.1
Elmehdwi, Y.2
Jiang, W.3
-
28
-
-
84901924319
-
Privacy preserving back-propagation neural network learning made practical with cloud computing
-
Feb.
-
J. Yuan and S. Yu, "Privacy preserving back-propagation neural network learning made practical with cloud computing, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 212-221, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 212-221
-
-
Yuan, J.1
Yu, S.2
-
29
-
-
84555206096
-
Privacy preserving decision tree learning using unrealized data sets
-
P. Fong and J. Weber-Jahnke, "Privacy preserving decision tree learning using unrealized data sets, " IEEE Trans. Knowl. Data Eng., vol. 24, no. 2, pp. 353-364, 2012.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.2
, pp. 353-364
-
-
Fong, P.1
Weber-Jahnke, J.2
-
30
-
-
84942246854
-
PPDM: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems
-
J. Zhou, Z. Cao, X. Dong, and X. Lin, "PPDM: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems, " IEEE J. Select. Topics Signal Process., vol. 9, no. 7, pp. 1332-1344, 2015.
-
(2015)
IEEE J. Select. Topics Signal Process.
, vol.9
, Issue.7
, pp. 1332-1344
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
-
31
-
-
84929376476
-
PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system
-
Jun.
-
J. Zhou, X. Lin, X. Dong, and Z. Cao, "PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1693-1703, Jun. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.6
, pp. 1693-1703
-
-
Zhou, J.1
Lin, X.2
Dong, X.3
Cao, Z.4
-
32
-
-
84897800670
-
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
-
Nov./Dec.
-
A. Mohaien, D. Kune, E. Vasserman, M. Kim, and Y. Kim, "Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs, " IEEE Trans. Dependable Secure Comput., vol. 10, no. 6, pp. 380-393, Nov./Dec. 2013.
-
(2013)
IEEE Trans. Dependable Secure Comput.
, vol.10
, Issue.6
, pp. 380-393
-
-
Mohaien, A.1
Kune, D.2
Vasserman, E.3
Kim, M.4
Kim, Y.5
-
33
-
-
1942501653
-
Factors that make an infectious disease outbreak controllable
-
C. Fraser, S. Riley, R. Anderson, and N. Ferguson, "Factors that make an infectious disease outbreak controllable, " Proc. Nat. Academy Sci. United States America, vol. 101, no. 16, pp. 6146-6151, 2004.
-
(2004)
Proc. Nat. Academy Sci. United States America
, vol.101
, Issue.16
, pp. 6146-6151
-
-
Fraser, C.1
Riley, S.2
Anderson, R.3
Ferguson, N.4
-
34
-
-
23844436610
-
Strategies for containing an emerging influenza pandemic in southeast Asia
-
N. Ferguson, et al., "Strategies for containing an emerging influenza pandemic in southeast asia, " Nature, vol. 437, no. 7056, pp. 209-214, 2005.
-
(2005)
Nature
, vol.437
, Issue.7056
, pp. 209-214
-
-
Ferguson, N.1
-
35
-
-
84963747681
-
PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks
-
Sep.
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks, " IEEE Trans. Comput. Social Syst., vol. 2, no. 3, pp. 41-52, Sep. 2015.
-
(2015)
IEEE Trans. Comput. Social Syst.
, vol.2
, Issue.3
, pp. 41-52
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
36
-
-
77951164538
-
-
Jan.
-
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, "CRAWDAD trace cambridge/haggle/imote/infocom (v. 2006-01-31), " Jan. 2006, http://crawdad.org/cambridge/haggle/20060131
-
(2006)
CRAWDAD Trace Cambridge/haggle/imote/infocom (V. 2006-01-31)
-
-
Scott, J.1
Gass, R.2
Crowcroft, J.3
Hui, P.4
Diot, C.5
Chaintreau, A.6
-
37
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu. ACM Symp. Theory Comput.
, pp. 169-178
-
-
Gentry, C.1
-
38
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms, " in Proc. Advances Cryptology, 1985, pp. 10-18.
-
(1985)
Proc. Advances Cryptology
, pp. 10-18
-
-
ElGamal, T.1
-
40
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1-30, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
42
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information, " in Proc. 14th Annu. ACM Symp. Theory Comput., 1982, pp. 365-377.
-
(1982)
Proc. 14th Annu. ACM Symp. Theory Comput.
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
43
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
I. Damgard, M. Geisler, and M. Kroigard, "Homomorphic encryption and secure comparison, " Int. J. Appl. Cryptography, vol. 1, pp. 22-31, 2008.
-
(2008)
Int. J. Appl. Cryptography
, vol.1
, pp. 22-31
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
44
-
-
85049739073
-
-
[Online].
-
Acute inflammations data set, 2009. [Online].: https://archive.ics.uci.edu/ml/datasets/Acute+Inflammations
-
(2009)
Acute Inflammations Data Set
-
-
-
45
-
-
85049757567
-
-
HELib, 2013. [Online].
-
HELib, 2013. [Online].: http://shaih.github.io/HElib/index.html
-
-
-
-
46
-
-
85049727791
-
-
Crypto++, 2015. [Online].
-
Crypto++, 2015. [Online].: https://www.cryptopp. com/
-
-
-
|