{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:11:17Z","timestamp":1750997477418,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319686363"},{"type":"electronic","value":"9783319686370"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68637-0_4","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T10:07:56Z","timestamp":1508148476000},"page":"57-73","source":"Crossref","is-referenced-by-count":0,"title":["Secure Multi-label Classification over Encrypted Data in Cloud"],"prefix":"10.1007","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xingxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Youwen","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"issue":"9","key":"4_CR1","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1016\/j.patcog.2004.03.009","volume":"37","author":"MR Boutell","year":"2004","unstructured":"Boutell, M.R., Luo, J., Shen, X., Brown, C.M.: Learning multi-label scene classification. Pattern Recognit. 37(9), 1757\u20131771 (2004)","journal-title":"Pattern Recognit."},{"issue":"2","key":"4_CR2","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.2017.1600522CM","volume":"55","author":"C Cheng","year":"2017","unstructured":"Cheng, C., Lu, R., Petzoldt, A., Takagi, T.: Securing the internet of things in a quantum world. IEEE Commun. Mag. 55(2), 116\u2013120 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/3-540-44794-6_4","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"A Clare","year":"2001","unstructured":"Clare, A., King, R.D.: Knowledge discovery in multi-label phenotype data. In: De Raedt, L., Siebes, A. (eds.) PKDD 2001. LNCS, vol. 2168, pp. 42\u201353. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44794-6_4"},{"key":"4_CR4","first-page":"681","volume":"14","author":"AE Elisseeff","year":"2002","unstructured":"Elisseeff, A.E., Weston, J.: A kernel method for multi-labelled classification. Adv. Neural Inf. Process. Syst. 14, 681\u2013687 (2002)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: 2014 IEEE 30th International Conference on Data Engineering (ICDE), pp. 664\u2013675. IEEE (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"4_CR6","first-page":"771","volume":"14","author":"Y Freund","year":"1999","unstructured":"Freund, Y., Schapire, R., Abe, N.: A short introduction to boosting. J. Jpn. Soc. Artif. Intell. 14, 771\u2013780 (1999)","journal-title":"J. Jpn. Soc. Artif. Intell."},{"key":"4_CR7","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography II: Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography II: Basic Applications. Cambridge University Press, New York (2004)"},{"issue":"1","key":"4_CR8","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM J. Comput. 18(1), 186\u2013208 (1989)","journal-title":"SIAM J. Comput."},{"issue":"7","key":"4_CR9","doi-asserted-by":"crossref","first-page":"3411","DOI":"10.1109\/TIP.2016.2568460","volume":"25","author":"S Hu","year":"2016","unstructured":"Hu, S., Qian, W., Wang, J., Zhan, Q., Ren, K.: Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25(7), 3411\u20133425 (2016)","journal-title":"IEEE Trans. Image Process."},{"key":"4_CR10","unstructured":"Kantarcoglu, M., Vaidya, J.: Privacy preserving naive bayes classifier for horizontally partitioned data. In: IEEE ICDM Workshop on Privacy Preserving Data Mining, pp. 3\u20139 (2003)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-319-47422-9_8","volume-title":"Provable Security","author":"X Li","year":"2016","unstructured":"Li, X., Zhu, Y., Wang, J.: Secure na\u00efve bayesian classification over encrypted data in cloud. In: Chen, L., Han, J. (eds.) ProvSec 2016. LNCS, vol. 10005, pp. 130\u2013150. Springer, Cham (2016). doi: 10.1007\/978-3-319-47422-9_8"},{"issue":"4","key":"4_CR12","first-page":"953","volume":"33","author":"X Li","year":"2017","unstructured":"Li, X., Zhu, Y., Wang, J.: Efficient encrypted data comparison through a hybrid method. J. Inf. Sci. Eng. 33(4), 953\u2013964 (2017)","journal-title":"J. Inf. Sci. Eng."},{"key":"4_CR13","unstructured":"Mccallum, A.K.: Multi-label text classication with a mixture model trained by EM. In: AAAI Workshop on Text Learning, pp. 1\u20137 (1999)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_16"},{"issue":"3","key":"4_CR15","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s10994-011-5256-5","volume":"85","author":"J Read","year":"2011","unstructured":"Read, J., Pfahringer, B., Holmes, G., Frank, E.: Classifier chains for multi-label classification. Mach. Learn. 85(3), 333\u2013359 (2011)","journal-title":"Mach. Learn."},{"issue":"2","key":"4_CR16","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10994-008-5064-8","volume":"73","author":"J Rnkranz","year":"2008","unstructured":"Rnkranz, J., Llermeier, E., Menc, L., Eneldo, A., Brinker, K.: Multilabel classification via calibrated label ranking. Mach. Learn. 73(2), 133\u2013153 (2008)","journal-title":"Mach. Learn."},{"issue":"5","key":"4_CR17","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1109\/TKDE.2014.2364027","volume":"27","author":"BK Samanthula","year":"2015","unstructured":"Samanthula, B.K., Elmehdwi, Y., Jiang, W.: k-Nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261\u20131273 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"4_CR18","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1023\/A:1007649029923","volume":"39","author":"RE Schapire","year":"2000","unstructured":"Schapire, R.E., Singer, Y.: Boostexter: a boosting-based system for text categorization. Mach. Learn. 39(2), 135\u2013168 (2000)","journal-title":"Mach. Learn."},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-540-74958-5_38","volume-title":"Machine Learning: ECML 2007","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Vlahavas, I.: Random k-labelsets: an ensemble method for multilabel classification. In: Kok, J.N., Koronacki, J., Mantaras, R.L., Matwin, S., Mladeni\u010d, D., Skowron, A. (eds.) ECML 2007. LNCS, vol. 4701, pp. 406\u2013417. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74958-5_38"},{"key":"4_CR20","unstructured":"Ueda, N.: Parametric mixture models for multi-labeled text. In: Advances in Neural Information Processing Systems, pp. 721\u2013728 (2002)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-319-02726-5_7","volume-title":"Information and Communications Security","author":"S Wang","year":"2013","unstructured":"Wang, S., Nassar, M., Atallah, M., Malluhi, Q.: Secure and private outsourcing of shape-based feature extraction. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol. 8233, pp. 90\u201399. Springer, Cham (2013). doi: 10.1007\/978-3-319-02726-5_7"},{"issue":"3","key":"4_CR22","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.is.2008.11.001","volume":"34","author":"X Yi","year":"2009","unstructured":"Yi, X., Zhang, Y.: Privacy-preserving naive bayes classification on distributed data via semi-trusted mixers. Inf. Syst. 34(3), 371\u2013380 (2009)","journal-title":"Inf. Syst."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, L., Jung, T., Liu, C., Ding, X., Li, X.Y., Liu, Y.: POP: privacy-preserving outsourced photo sharing and searching for mobile devices. In: IEEE International Conference on Distributed Computing Systems, pp. 308\u2013317 (2015)","DOI":"10.1109\/ICDCS.2015.39"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, M.-L., Zhou, Z.-H.: A k-nearest neighbor based algorithm for multi-label classification. In: IEEE International Conference on Granular Computing, vol. 2, pp. 718\u2013721 (2005)","DOI":"10.1109\/GRC.2005.1547385"},{"issue":"10","key":"4_CR25","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1109\/TKDE.2006.162","volume":"18","author":"M-L Zhang","year":"2006","unstructured":"Zhang, M.-L., Zhou, Z.-H.: Multilabel neural networks with applications to functional genomics and text categorization. IEEE Trans. Knowl. Data Eng. 18(10), 1338\u20131351 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4_CR26","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.cose.2016.11.013","volume":"69","author":"L Zhou","year":"2017","unstructured":"Zhou, L., Zhu, Y., Castiglione, A.: Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69, 84\u201396 (2017)","journal-title":"Comput. Secur."},{"key":"4_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","volume":"89","author":"Y Zhu","year":"2016","unstructured":"Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1\u201312 (2016)","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68637-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T14:13:46Z","timestamp":1750947226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68637-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319686363","9783319686370"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68637-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}