A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword Based Book Retrieval
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword Based Book Retrieval
Authors
Keywords
-
Journal
ACM Transactions on Asian and Low-Resource Language Information Processing
Volume -, Issue -, Pages -
Publisher
Association for Computing Machinery (ACM)
Online
2023-01-17
DOI
10.1145/3571731
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Synchronized Provable Data Possession Based on Blockchain for Digital Twin
- (2022) Tian Li et al. IEEE Transactions on Information Forensics and Security
- Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination
- (2022) Yizhou Shen et al. Journal of Information Security and Applications
- Location Privacy-preserving Mechanisms in Location-based Services
- (2021) Hongbo Jiang et al. ACM COMPUTING SURVEYS
- An effective approach for the protection of user commodity viewing privacy in e-commerce website
- (2021) Zongda Wu et al. KNOWLEDGE-BASED SYSTEMS
- Privacy and Security in Cognitive Cities: A Systematic Review
- (2021) Juvenal Machin et al. Applied Sciences-Basel
- Privacy Laws and Privacy by Design Schemes for the Internet of Things
- (2021) Atheer Aljeraisy et al. ACM COMPUTING SURVEYS
- Contextualized query expansion via unsupervised chunk selection for text retrieval
- (2021) Zhi Zheng et al. INFORMATION PROCESSING & MANAGEMENT
- Similarity measures based on the generalized distance of neutrosophic Z-number sets and their multi-attribute decision making method
- (2021) Jun Ye SOFT COMPUTING
- Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey
- (2021) Kai Peng et al. IEEE Internet of Things Journal
- FedCPF: An Efficient-Communication Federated Learning Approach for Vehicular Edge Computing in 6G Communication Networks
- (2021) Su Liu et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Edge computing enabled video segmentation for real-time traffic monitoring in internet of vehicles
- (2021) Shaohua Wan et al. PATTERN RECOGNITION
- Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles
- (2021) Leila Benarous et al. Peer-to-Peer Networking and Applications
- Modeling, Detecting, and Mitigating Threats Against Industrial Healthcare Systems: A Combined Software Defined Networking and Reinforcement Learning Approach
- (2021) Panagiotis Radoglou-Grammatikis et al. IEEE Transactions on Industrial Informatics
- A dummy-based user privacy protection approach for text information retrieval
- (2020) Zongda Wu et al. KNOWLEDGE-BASED SYSTEMS
- A Location Privacy-Preserving System Based on Query Range Cover-Up or Location-Based Services
- (2020) Zongda Wu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Book search using social information, user profiles and query expansion with Pseudo Relevance Feedback
- (2019) Ritesh Kumar et al. APPLIED INTELLIGENCE
- Neural Chinese word segmentation with dictionary
- (2019) Junxin Liu et al. NEUROCOMPUTING
- A contextual approach to information privacy research
- (2019) Philip Fei Wu et al. Journal of the Association for Information Science and Technology
- Graph representation learning with encoding edges
- (2019) Qi Li et al. NEUROCOMPUTING
- Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval
- (2019) Karim Banawan et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- An Ultra-Low Complexity and High Efficiency Approach for Lossless Alpha Channel Coding
- (2019) Liping Zhao et al. IEEE TRANSACTIONS ON MULTIMEDIA
- Differential Privacy for Power Grid Obfuscation
- (2019) Ferdinando Fioretto et al. IEEE Transactions on Smart Grid
- A multi-objective adaptive evolutionary algorithm to extract communities in networks
- (2019) Qi Li et al. Swarm and Evolutionary Computation
- Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things
- (2019) Tian Wang et al. IEEE Internet of Things Journal
- Private Information Retrieval in Graph-Based Replication Systems
- (2019) Netanel Raviv et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds
- (2018) Jianhua Liu et al. IEEE Transactions on Information Forensics and Security
- Private Information Retrieval for Secure Distributed Storage Systems
- (2018) Heecheol Yang et al. IEEE Transactions on Information Forensics and Security
- Dummy Generation Based on User-Movement Estimation for Location Privacy Protection
- (2018) Shuhei Hayashida et al. IEEE Access
- Personalized Information Recommendation Model based on Context Contribution and Item Correlation
- (2018) Qibei Lu et al. MEASUREMENT
- Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications
- (2017) Hongjie Li et al. NEUROCOMPUTING
- A Dummy-Based Approach for Preserving Source Rate Privacy
- (2016) Abolfazl Diyanat et al. IEEE Transactions on Information Forensics and Security
- Quantum image encryption based on generalized affine transform and logistic map
- (2016) Hao-Ran Liang et al. Quantum Information Processing
- Versatile Query Scrambling for Private Web Search
- (2015) Avi Arampatzis et al. Information Retrieval Journal
- Versatile Query Scrambling for Private Web Search
- (2015) Avi Arampatzis et al. Information Retrieval Journal
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now