![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
VeriDL: Integrity Verification of Outsourced Deep Learning Services
Deep neural networks (DNNs) are prominent due to their superior performance in many fields. The deep-learning-as-a-service (DLaaS) paradigm enables individuals and organizations (clients) to outsource their DN...
-
Chapter and Conference Paper
Efficient Authentication of Approximate Record Matching for Outsourced Databases
Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. A major security concern of the outsourcing paradigm is whether the ...
-
Chapter and Conference Paper
Result Integrity Verification of Outsourced Frequent Itemset Mining
The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...
-
Chapter and Conference Paper
AUDIO: An Integrity \(\underline{Audi}\) ting Framework of \(\underline{O}\) utlier-Mining-as-a-Service Systems
Spurred by developments such as cloud computing, there has been considerable recent interest in the data-mining-as-a-service paradigm. Users lacking in expertise or computational resources can outsource their ...
-
Chapter and Conference Paper
Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems
Data archiving has been commonly used in many fields for data backup and analysis purposes. Although comprehensive application software, new computing and storage technologies, and the Internet have made it ea...
-
Chapter
Privacy-Preserving Data Mining from Outsourced Databases
Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-service: a company (data owner) lacking in expertise or computational resources ca...
-
Article
Open AccessA Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks
Data-centric storage provides energy-efficient data dissemination and organization for the increasing amount of wireless data. One of the approaches in data-centric storage is that the nodes that collected dat...
-
Chapter and Conference Paper
Privacy-Preserving Publishing Data with Full Functional Dependencies
We study the privacy threat by publishing data that contains full functional dependencies (FFDs). We show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunate...
-
Chapter and Conference Paper
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to autho...