Профили пользователей по запросу "Kui Ren"
Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE Fellow Подтвержден адрес электронной почты в домене zju.edu.cn Цитируется: 54369 |
Privacy-preserving public auditing for data storage security in cloud computing
Cloud Computing is the long dreamed vision of computing as a utility, where users can
remotely store their data into the cloud so as to enjoy the on-demand high quality applications …
remotely store their data into the cloud so as to enjoy the on-demand high quality applications …
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …
current cloud computing scenario. The majority of the existing techniques are focusing on …
Algorithm for solving the equation of radiative transfer in the frequency domain
K Ren, GS Abdoulaev, G Bal, AH Hielscher - Optics letters, 2004 - opg.optica.org
We present an algorithm that provides a frequency-domain solution of the equation of
radiative transfer (ERT) for heterogeneous media of arbitrary shape. Although an ERT is more …
radiative transfer (ERT) for heterogeneous media of arbitrary shape. Although an ERT is more …
Privacy-preserving multi-keyword ranked search over encrypted cloud data
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …
data management systems from local sites to the commercial public cloud for great flexibility …
Fuzzy keyword search over encrypted data in cloud computing
As Cloud Computing becomes prevalent, more and more sensitive information are being
centralized into the cloud. For the protection of data privacy, sensitive data usually have to be …
centralized into the cloud. For the protection of data privacy, sensitive data usually have to be …
Ensuring security and privacy preservation for cloud data services
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …
starting to outsource local data to the cloud servers. However, under open networks and not …
Achieving secure, scalable, and fine-grained data access control in cloud computing
Cloud computing is an emerging computing paradigm in which resources of the computing
infrastructure are provided as services over the Internet. As promising as it is, this paradigm …
infrastructure are provided as services over the Internet. As promising as it is, this paradigm …
[HTML][HTML] Adversarial attacks and defenses in deep learning
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques,
it is critical to ensure the security and robustness of the deployed algorithms. Recently, the …
it is critical to ensure the security and robustness of the deployed algorithms. Recently, the …
Privacy-preserving public auditing for secure cloud storage
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality
applications and services from a shared pool of configurable computing resources, …
applications and services from a shared pool of configurable computing resources, …
Enabling public auditability and data dynamics for storage security in cloud computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise.
It moves the application software and databases to the centralized large data centers, where …
It moves the application software and databases to the centralized large data centers, where …