{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:29Z","timestamp":1742913989410,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819981472"},{"type":"electronic","value":"9789819981489"}],"license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8148-9_10","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T10:02:23Z","timestamp":1700906543000},"page":"117-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CRE: An Efficient Ciphertext Retrieval Scheme Based on\u00a0Encoder"],"prefix":"10.1007","author":[{"given":"Kejun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shaofei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pengcheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Duo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahsan, M.M., Chowdhury, F.Z., Sabilah, M., Wahab, A.W.B.A., Idris, M.Y.I.B.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1\u20135. IEEE (2017)","key":"10_CR1","DOI":"10.1109\/ICRIIS.2017.8002456"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2013","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Cer, D., Diab, M., Agirre, E., Lopez-Gazpio, I., Specia, L.: Semantic textual similarity-multilingual and cross-lingual focused evaluation. In: Proceedings of the 2017 SEMVAL International Workshop on Semantic Evaluation (2017). https:\/\/doi.org\/10.18653\/v1\/s17-2001","key":"10_CR3","DOI":"10.18653\/v1\/S17-2001"},{"doi-asserted-by":"crossref","unstructured":"Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917\u2013922. IEEE (2012)","key":"10_CR4","DOI":"10.1109\/ICC.2012.6364125"},{"doi-asserted-by":"crossref","unstructured":"Chen, Z., Wu, A., Li, Y., Xing, Q., Geng, S.: Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur. Commun. Netw. 2021, 1\u201311 (2021)","key":"10_CR5","DOI":"10.1155\/2021\/6619689"},{"issue":"5","key":"10_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2668-x","volume":"65","author":"J Cui","year":"2022","unstructured":"Cui, J., Sun, Y., Yan, X.U., Tian, M., Zhong, H.: Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci. China Inf. Sci. 65(5), 159102 (2022)","journal-title":"Sci. China Inf. Sci."},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446920","volume":"24","author":"S Cui","year":"2021","unstructured":"Cui, S., Song, X., Asghar, M.R., Galbraith, S.D., Russello, G.: Privacy-preserving dynamic symmetric searchable encryption with controllable leakage. ACM Trans. Privacy Secur. (TOPS) 24(3), 1\u201335 (2021)","journal-title":"ACM Trans. Privacy Secur. (TOPS)"},{"key":"10_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102442","volume":"147","author":"H Dai","year":"2019","unstructured":"Dai, H., Dai, X., Yi, X., Yang, G., Huang, H.: Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147, 102442 (2019)","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"Dauterman, E., Feng, E., Luo, E., Popa, R.A., Stoica, I.: Dory: an encrypted search system with distributed trust. In: Operating Systems Design and Implementation (2020)","key":"10_CR9"},{"issue":"9","key":"10_CR10","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546\u20132559 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-021-0277-0","volume":"16","author":"Z Fu","year":"2022","unstructured":"Fu, Z., Wang, Y., Sun, X., Zhang, X.: Semantic and secure search over encrypted outsourcing cloud based on BERT. Front. Comput. Sci. 16, 1\u20138 (2022)","journal-title":"Front. Comput. Sci."},{"issue":"12","key":"10_CR12","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"10_CR13","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TIFS.2017.2730365","volume":"12","author":"Z Fu","year":"2017","unstructured":"Fu, Z., Wu, X., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986\u20132997 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Hu, Z., Dai, H., Yang, G., Yi, X., Sheng, W.: Semantic-based multi-keyword ranked search schemes over encrypted cloud data. Secur. Commun. Netw. 2022 (2022)","key":"10_CR14","DOI":"10.1155\/2022\/4478618"},{"issue":"3","key":"10_CR15","first-page":"1","volume":"5","author":"Y Hua","year":"2020","unstructured":"Hua, Y., Zhang, D., Ge, S.: Research progress in the interpretability of deep learning models. J. Cyber Secur. 5(3), 1\u201312 (2020)","journal-title":"J. Cyber Secur."},{"doi-asserted-by":"crossref","unstructured":"Jiang, T., et al.: Promptbert: improving BERT sentence embeddings with prompts. arXiv preprint arXiv:2201.04337 (2022)","key":"10_CR16","DOI":"10.18653\/v1\/2022.emnlp-main.603"},{"unstructured":"Lee, J., Toutanova, K.: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)","key":"10_CR17"},{"doi-asserted-by":"crossref","unstructured":"Lewis, M., et al.: Bart: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461 (2019)","key":"10_CR18","DOI":"10.18653\/v1\/2020.acl-main.703"},{"issue":"3","key":"10_CR19","first-page":"305","volume":"18","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Fu, Z.: Secure search service based on word2vec in the public cloud. Int. J. Comput. Sci. Eng. 18(3), 305\u2013313 (2019)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TPAMI.2018.2889473","volume":"42","author":"YA Malkov","year":"2018","unstructured":"Malkov, Y.A., Yashunin, D.A.: Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. IEEE Trans. Pattern Anal. Mach. Intell. 42(4), 824\u2013836 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A., Cuppens-Boulahia, N., Cuppens, F.: Semantic search over encrypted data. In: ICT 2013, pp. 1\u20135. IEEE (2013)","key":"10_CR21","DOI":"10.1109\/ICTEL.2013.6632121"},{"doi-asserted-by":"crossref","unstructured":"Nair, M.S., Rajasree, M.S., Thampi, S.M.: Fine-grained, multi-key search control in multi-user searchable encryption. In: International Workshops on Security, Privacy, and Anonymity in Computation, Communication, and Storage; IEEE International Symposium on Ubisafe Computing; IEEE International Workshop on Security in e-Science and e-Research; International Workshop on Trust, SE (2017)","key":"10_CR22","DOI":"10.1007\/978-3-319-72395-2_73"},{"unstructured":"Ravichandiran, S.: Getting Started with Google BERT: Build and train state-of-the-art natural language processing models using BERT. Packt Publishing Ltd (2021)","key":"10_CR23"},{"unstructured":"Xu, M., Namavari, A., Cash, D., Ristenpart, T.: Searching encrypted data with size-locked indexes. In: USENIX Security (2021)","key":"10_CR24"},{"unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44\u201355. IEEE (2000)","key":"10_CR25"},{"doi-asserted-by":"crossref","unstructured":"Su, J., Zhang, L., Mu, Y.: BA-RMKABSE: blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system, vol. 132, pp. 299\u2013309 (2022)","key":"10_CR26","DOI":"10.1016\/j.future.2022.01.021"},{"unstructured":"Thakur, N., Reimers, N., R\u00fcckl\u00e9, A., Srivastava, A., Gurevych, I.: BEIR: a heterogenous benchmark for zero-shot evaluation of information retrieval models. arXiv preprint arXiv:2104.08663 (2021)","key":"10_CR27"},{"doi-asserted-by":"crossref","unstructured":"Veretennikov, A.B.: Relevance ranking for proximity full-text search based on additional indexes with multi-component keys (2021)","key":"10_CR28","DOI":"10.35634\/vm210110"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-014-0008-2","volume":"3","author":"Z Xia","year":"2014","unstructured":"Xia, Z., Zhu, Y., Sun, X., Chen, L.: Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3, 1\u201311 (2014)","journal-title":"J. Cloud Comput."},{"issue":"1","key":"10_CR30","first-page":"88","volume":"9","author":"X Yu-Jie","year":"2022","unstructured":"Yu-Jie, X., Lan-Xiang, C., Yi, M.: BTM topic model based searchable symmetric encryption. J. Cryptol. Res. 9(1), 88\u2013105 (2022)","journal-title":"J. Cryptol. Res."}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8148-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T09:37:08Z","timestamp":1730626628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8148-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"ISBN":["9789819981472","9789819981489"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8148-9_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}