搜索结果: 1-7 共查到“知识库 军事学 similarity”相关记录7条 . 查询时间(0.14 秒)
Graph Similarity and Its Applications to Hardware Security
Graph Similarity Hardware Reverse Engineering Hardware Trojan
2019/8/30
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements ...
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
Secure Approximation Protocol Secure Sketching Jaccard Similarity
2017/9/13
Computing similarity between data is a fundamental problem in information retrieval and data mining. To address the relevant performance and scalability challenges, approximation methods are employed ...
Multi-keyword Similarity Search Over Encrypted Cloud Data
searchable encryption secure cloud outsourcing
2016/1/4
Searchable encryption allows one to upload encrypted documents
on a remote honest-but-curious server and query that data at the server itself
without requiring the documents to be decrypted prior to...
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
mobile security Mobile application spoofing
2015/12/24
Mobile application spoofing is an attack where a malicious mobile application mimics the visual appearance of another one. If such an attack is successful, the integrity of what the user sees as well ...
Encrypting information has been regarded as one of the most substantial approaches to protect users’ sensitive information in radically changing internet technology era. In prior research, researchers...
Anonymous Fuzzy Identity-based Encryption for Similarity Search
predicate encryption anonymous fuzzy identity-based encryption inner-product encryption
2009/11/18
In this paper, we consider the problem of predicate encryption
and focus on the predicate for testing whether the hamming distance
between the attribute X of a data item and a target V is equal to (...
Secure Similarity Search
index keyword search over encrypted data similarity search hamming distance
2008/5/30
One of the most substantial ways to protect users’
sensitive information is encryption. This paper is about the
keyword index search system on encrypted documents.