共 19 条
[12]
A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners
[J].
CLOUD COMPUTING AND SECURITY, PT II,
2018, 11064
:484-495
[13]
Guttman A., 1984, SIGMOD Record, V14, P47, DOI 10.1145/971697.602266
[14]
Mikolov T., 2013, P 1 INT C LEARN REPR, DOI [DOI 10.48550/ARXIV.1301.3781, 10.48550/arXiv.1301.3781]
[15]
Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance
[J].
CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT,
2018,
:1835-1838
[16]
Song Dawn Xiaodong, 2000, P 2000 IEEE S SEC PR, V44
[17]
Sun W., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, P71, DOI [10.1145/2484313.2484322, DOI 10.1145/2484313.2484322]
[19]
YIANILOS PN, 1993, PROCEEDINGS OF THE FOURTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P311