Acknowledgement
The research is supported by Basic Public Welfare Research Project of Zhejiang Province - Research on Cooperative Task Allocation Mechanism in Heterogeneous Multi - Mobile Robot System (No. LGG19F020009).
References
- Y. Li, J. H. Park, and B. S. Shin, "A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces," The Journal of Supercomputing, vol. 73, pp. 2867-2880, 2017. https://doi.org/10.1007/s11227-016-1650-x
- M. B. Karimi, A. Isazadeh, and A. M. Rahmani, "QoS-aware service composition in cloud computing using data mining techniques and genetic algorithm," The Journal of Supercomputing, vol. 73, pp. 1387-1415, 2017. https://doi.org/10.1007/s11227-016-1814-8
- A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, "A survey on homomorphic encryption schemes: theory and implementation," ACM Computing Surveys (CSUR), vol. 51, no. 4, article no. 79, 2018. https://doi.org/10.1145/3214303
- D. Porumbel, "Ray projection for optimizing polytopes with prohibitively many constraints in set-covering column generation," Mathematical Programming, vol. 155, pp. 147-197, 2016. https://doi.org/10.1007/s10107-014-0840-7
- A. M. Yakubu and Y. P. P. Chen, "Ensuring privacy and security of genomic data and functionalities," Briefings in Bioinformatics, vol. 21, no. 2, pp. 511-526, 2020. https://doi.org/10.1093/bib/bbz013
- A. Mittos, B. Malin, and E. De Cristofaro, "Systematizing genome privacy research: a privacy-enhancing technologies perspective," Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 1, pp. 87-107, 2019. https://doi.org/10.2478/popets-2019-0006
- M. Hosseini, D. Pratas, and A. J. Pinho, "Cryfa: a secure encryption tool for genomic data," Bioinformatics, vol. 35, no. 1, pp. 146-148, 2019. https://doi.org/10.1093/bioinformatics/bty645
- Z. Hu, S. Liu, and K. Chen, "Privacy-preserving location-based services query scheme against quantum attacks," IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 5, pp. 972-983, 2020. https://doi.org/10.1109/TDSC.2018.2831199
- M. N. Sadat, M. M. Al Aziz, N. Mohammed, F. Chen, X. Jiang, and S. Wang, "SAFETY: secure gwAs in federated environment through a hybrid solution," IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 16, no. 1, pp. 93-102, 2019. https://doi.org/10.1109/TCBB.2018.2829760
- T. Gao and F. Li, "PHDP: preserving persistent homology in differentially private graph publications," in Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 2019, pp. 2242-2250. https://doi.org/10.1109/INFOCOM.2019.8737584