A data corruption detection scheme based on ciphertexts in cloud environment |
Guo, Sixu
(China Mobile Communication Research Institute)
He, Shen (China Mobile Communication Research Institute) Su, Li (China Mobile Communication Research Institute) Zhang, Xinyue (China Mobile Communication Research Institute) Geng, Huizheng (China Mobile Communication Research Institute) Sun, Yang (China Mobile Communication Research Institute) |
1 | Birra T, Li T, Daniel B et al., "Detection of Isocitrate Dehydrogenase Mutated Glioblastomas Through Anomaly Detection Analytics: A Pilot Study," Neurosurgery, vol. 89, no, 2, pp, 323-328, Apr, 2021. DOI |
2 | Meng L, Zhang J, "Process Design of Laser Powder Bed Fusion of Stainless Steel Using a Gaussian Process-Based Machine Learning Model," JOM, vol. 72, no. 1, pp. 420-428, Mar, 2020. DOI |
3 | Velupillai S, Dalianis H, Hassel M et al., "Developing a standard for de-identifying electronic patient records written in Swedish: Precision, recall and F-measure in a manual and computerized annotation trial," International Journal of Medical Informatics, vol. 78, no. 12, pp. e19-e26, Dec, 2009. DOI |
4 | Biswas S, Babu RV, "Real time anomaly detection in H. 264 compressed videos," in Proc. of the fourth National Conference on Computer Vision, Pattern Recognition., Image Processing and Graphics, pp. 1-4, Dec, 2013. |
5 | A Ouafa Amira, "Weighted-capsule routing via a fuzzy gaussian model - ScienceDirect," Pattern Recognition Letters, vol. 138, no. 1, pp. 424-430, Aug, 2020. DOI |
6 | Lu Q, Yao X, "Clustering and learning Gaussian distribution for continuous optimization," IEEE Transactions on Systems Man & Cybernetics Part C Applications & Reviews, vol. 35, no. 2, pp. 195-204, May, 2000. |
7 | D. Chen, S. L. Sain, and K. Guo, "Data mining for the online retail industry: a case study of RFM model-based customer segmentation using data mining," Journal of Database Marketing & Customer Strategy Management, vol. 19, no. 3, pp. 197-208, 2012. DOI |
8 | J. Wang, Z. Xu, "Spatio-temporal texture modeling for real-time crowd anomaly detection," Comput.Vis. Image Underst., vol. 144, pp. 177-187, Mar, 2009. |
9 | Mahadevan V, Li W X, Bhalodia V et al., "Anomaly detection in crowded scenes," Computer Vision & Pattern Recognition, IEEE, pp. 13-18, Jun, 2010. |
10 | Chandola V, Banerjee A, Kumar V, "Anomaly Detection for Discrete Sequences: A Survey," IEEE Transactions on Knowledge & Data Engineering, vol. 24, no.5, pp. 823-839, 2012. DOI |
11 | Daniel Barbara, Goel R, Jajodia S, "Using Checksums to Detect Data Corruption," Lecture Notes in Computer Science, vol. 1777, no. 1, pp. 136-149, Mar, 2000. |
12 | Chen C L P, Zhang C Y, "Data-intensive applications, challenges, techniques and technologies: A survey on big data," Information Sciences, vol. 275, no. 8, pp. 314-347, Aug, 2014. DOI |
13 | A. Amin, F. Al-Obeidat, B. Shah, A. Adnan, J. Loo, and S. Anwar, "Customer churn prediction in telecommunication industry using data certainty," Journal of Business Research, vol. 94, pp. 290-301, Jun, 2019. DOI |
14 | Tahir S, Rajarajan M, "Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks," in Proc. of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1628-1633, Jun, 2019. |
15 | Park E, Jeong J, Han W S et al., "Estimation of Groundwater Level Based on the Robust Training of Recurrent Neural Networks Using Corrupted Data," Journal of Hydrology, vol. 582, no. 1, pp. 124512, Mar, 2020. DOI |
16 | J. Liu, Y. Feng, W. Liu, D. Orlando and H. Li, "Training Data Assisted Anomaly Detection of Multi-Pixel Targets In Hyperspectral Imagery," IEEE Transactions on Signal Processing, vol. 68, pp. 3022-3032, Apr, 2020. DOI |
17 | Shehab D, Ammar H, "Statistical detection of a panic behavior in crowded scenes," Machine Vision and Applications, vol. 30, no. 5, pp. 919-931, Jul, 2019. DOI |
18 | Yue G, Jun ping D, Meiyu, "Abnormal event detection in tourism video based on salient spatio-temporal features and sparse combination learning," World Wide Web, vol. 22, no. 2, pp. 689-715, Mar, 2019. DOI |
19 | Pan, X., S. Tang, and Z. Zhu, "Privacy-Preserving Multilayer In-Band Network Telemetry and Data Analytics," in Proc. of IEEE/CIC International Conference on Communications in China (ICCC) 2020 IEEE, Jul, 2020. |
20 | Nick Iliev, Alberto Gianelli, Amit Ranjan Trivedi, "Low Power Speaker Identification by Integrated Clustering and Gaussian Mixture Model Scoring," Embedded Systems Letters IEEE., vol. 12, no. 1, pp. 9-12, May, 2020. DOI |
21 | Jun Wu, Li Shi, Wen-Pin Lin, Sang-Bing Tsai, Yuanyuan Li, Liping Yang, Guangshu Xu, "An Empirical Study on Customer Segmentation by Purchase Behaviors Using a RFM Model and K-Means Algorithm," Mathematical Problems in Engineering, vol. 2020, Article ID 8884227, p. 7, Nov, 2020. |
22 | Y. Zhang, "An adaptive flow counting method for anomaly detection in SDN," in Proc. of the ninth ACM conference on Emerging networking experiments and technologies, pp. 25-30, Dec, 2013. |
23 | C. Lu, J. Shi, J. Jia, "Abnormal event detection at 150 fps in matlab," in Proc. of the 2013 IEEE International Conference on Computer Vision, pp. 2720-2727, Oct, 2013. |
24 | M. Bertini, A. Bimbo, L. Seidenari, "Multi-scale and real-time non-parametric approach for anomaly detection and localization," Comput. Vis. Image Underst., vol. 116, no. 3, pp. 320-329, Oct, 2012. DOI |
25 | L. Huang, Z. Zhao, K. Xing, "Web data extraction based on edit distance," Journal of Computer Applications, vol. 32, no. 6, pp. 1662 - 1665, 2012. DOI |
26 | Moscoso M, Novikov A, Papanicolaou G et al., "Imaging with highly incomplete and corrupted data," Inverse Problems, vol. 36, no. 3, pp. 035010, Feb, 2020. DOI |
27 | R. Leyva, V. Sanchez, C. T. Li, "Video anomaly detection with compact feature sets for online performance," IEEETrans. Image Process, vol. 26, no. 7, pp. 3463-3478, Jul, 2017. DOI |
28 | Qu J, Du Q, Li Y et al., "Anomaly Detection in Hyperspectral Imagery Based on Gaussian Mixture Model," IEEE Transactions on Geoscience and Remote Sensing, pp.1-14, Dec, 2020. |
29 | Liang J M, Shen S Q, Li M et al., "Quantum Anomaly Detection with Density Estimation and Multivariate Gaussian Distribution," Physical Review A, vol. 99, no. 5, pp. 52310-52310, 2019. DOI |
30 | Cao N, Wang C, Li M et al., "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, Jan, 2014. DOI |
31 | Zarezadeh M, Mala H, Ashouri-Talouki M, "Multi-keyword ranked searchable encryption scheme with access control for cloud storage," Peer-to-Peer Networking and Applications, vol. 13, no. 1, pp. 207-218, Jun, 2020. DOI |
![]() |