|
[1] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space,” Proceedings of International Conference on Learning Representations (ICLR), 2013. [2] E.-J. Goh, “Secure indexes.,” IACR Cryptology ePrint Archive, 2003. [3] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011. [4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, pp. 222– 233, 2014. [5] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proceedings of IEEE INFOCOM, pp. 1–5, 2010. [6] B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud,” in Proceedings of IEEE INFOCOM, pp. 2112–2120, 2014. [7] H. Li, D. Liu, Y. Dai, and T. H. Luan, “Engineering searchable encryption of mobile cloud networks: when qoe meets qop,” IEEE Wireless Communications, vol. 22, no. 4, pp. 74–80, 2015. [8] H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, “Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312–325, 2016. [9] Z. Xia, Y. Zhu, X. Sun, and L. Chen, “Secure semantic expansion based search over encrypted cloud data supporting similarity ranking,” Journal of Cloud Computing, vol. 3, no. 1, p. 8, 2014. [10] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Theory of Cryptography Conference, pp. 535–554, Springer, 2007. [11] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in IEEE Symposium on Security and Privacy, pp. 44–55, 2000. [12] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proceedings of International Conference on Distributed Computing Systems (ICDCS), pp. 253–262, 2010. [13] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522, Springer, 2004. [14] W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, “Secure knn computation on encrypted databases,” in Proceedings of the 35th SIGMOD international conference on Management of data, pp. 139–152, ACM, 2009. [15] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 71–82, ACM, 2013. [16] M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search over encrypted data,” in IEEE 28th International Conference on Data Engineering (ICDE), pp. 1156–1167, 2012. [17] X. Sun, Y. Zhu, Z. Xia, and L. Chen, “Privacy-preserving keyword-based semantic search over encrypted cloud data,” International journal of Security and its Applications, vol. 8, no. 3, pp. 9–20, 2014. [18] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality,” in Advances in neural information processing systems, pp. 3111–3119, 2013. [19] B. Xue, C. Fu, and Z. Shaobin, “A study on sentiment computing and classification of sina weibo with word2vec,” in IEEE International Congress on Big Data (BigData Congress), pp. 358–363, IEEE, 2014. [20] Z. Su, H. Xu, D. Zhang, and Y. Xu, “Chinese sentiment classification using a neural network tool —word2vec,” in International Conference on Multisensor Fusion and Information Integration for Intelligent Systems (MFI), pp. 1–6, IEEE, 2014. [21] D. Rahmawati and M. L. Khodra, “Word2vec semantic representation in multilabel classification for indonesian news article,” in 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), pp. 1–6, IEEE, 2016. [22] P.-C. Wen, Y.-L. Tsai, and R. T.-H. Tsai, “基於word2vec 詞向量的網路情緒文和流行音樂媒合 方法之研究(matching internet mood essays with pop-music based on word2vec)[in chinese],” The 2015 Conference on Computational Linguistics and Speech Processing (ROCLING 2015), p. 167. [23] S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra, “Zerber: r-confidential indexing for distributed documents,” in Proceedings of the 11th international conference on Extending database technology: Advances in database technology (EDBT), pp. 287–298, ACM, 2008. [24] G. Fu, C. B. Jones, and A. I. Abdelmoty, “Ontology-based spatial query expansion in information retrieval,” in OTM Confederated International Conferences, pp. 1466–1482, Springer, 2005. [25] “Pubmed.” https://www.ncbi.nlm.nih.gov/pubmed. [26] “gensim: models.word2vec - deep learning with word2vec.” https://radimrehurek.com/ gensim/models/word2vec.html.
|