{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T05:15:48Z","timestamp":1734585348873,"version":"3.30.2"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1109\/iccp63557.2024.10793031","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:09:09Z","timestamp":1734462549000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Random Knn Evaluation Using Multi-Key Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Diana-Elena","family":"Petrean","sequence":"first","affiliation":[{"name":"Technical University of Cluj-Napoca,Cluj-Napoca,Romania"}]},{"given":"Rodica","family":"Potolea","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Cluj-Napoca,Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00823-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1967.1053964"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icdmw.2014.112"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2022.3205665"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-030-34621-8_16","article-title":"Multi-Key Homomorphic Encryption from TFHE","volume-title":"Advances in Cryptology - ASIACRYPT 2019, part of Lecture Notes in Computer Science (LNCS)","volume":"11922","author":"Chen","year":"2019"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","article-title":"TFHE: Fast Fully Homomorphic Encryption Over the Torus","volume":"33","author":"Chillotti","year":"2020","journal-title":"Journal of Cryptology"},{"key":"ref7","first-page":"142","article-title":"Secure and non-interactive k-NN classifier using symmetric fully homomorphic encryption","volume-title":"PSD 2022: Privacy in Statistical Databases, part of Lecture Notes in Computer Science (LNCS)","volume":"13463","author":"Ameur","year":"2022"},{"issue":"2","key":"ref8","first-page":"111","article-title":"Efficient homomorphic evaluation of k-NN classifiers","volume-title":"PoPET 2021: Proceedings on Privacy Enhancing Technologies","volume":"2021","author":"Zuber"},{"key":"ref9","article-title":"Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace","author":"Liu","year":"2021","journal-title":"Security and Communication Networks"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"69333","DOI":"10.1109\/ACCESS.2020.2986245","article-title":"A Privacy-Preserving and Efficient k-Nearest Neighbor Query and Classification Scheme Based on k-Dimensional Tree for Outsourced Data","volume":"8","author":"Du","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"9245","DOI":"10.1007\/s11227-021-04286-2","article-title":"Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing","volume":"78","author":"Kim","year":"2022","journal-title":"The Journal of Supercomputing"},{"issue":"101602","key":"ref12","article-title":"A secure kNN query processing algorithm using homomorphic encryption on outsourced database","volume-title":"Data & Knowledge Engineering","volume":"123","author":"Kim","year":"2019"},{"issue":"4","key":"ref13","first-page":"689","article-title":"Secure k-NN Query on Encrypted Cloud Data with Multiple Keys","volume":"7","author":"Cheng","year":"2017","journal-title":"IEEE Transactions on Big Data"},{"issue":"2","key":"ref14","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.32604\/iasc.2023.034123","article-title":"Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption","volume":"37","author":"Wang","year":"2023","journal-title":"Intelligent Automation & Soft Computing"},{"issue":"2","key":"ref15","doi-asserted-by":"crossref","first-page":"135","DOI":"10.11591\/csit.v4i2.pp135-142","article-title":"Investigating the impact of data scaling on the k-nearest neighbor algorithm","volume":"4","author":"Pagan","year":"2023","journal-title":"Computer Science and Information Technologies"},{"key":"ref16","article-title":"Predict Students\u2019 Dropout and Academic Success","author":"Realinho","year":"2024","journal-title":"UCI Machine Learning Repository, 2021"},{"key":"ref17","article-title":"Early prediction of student\u2019s performance in higher education: a case study","volume-title":"Trends and Applications in Information Systems and Technologies, Advances in Intelligent Systems and Computing","volume":"1365","author":"Martins"},{"volume-title":"Breast Cancer Wisconsin (Original)","year":"1992","author":"Wolberg","key":"ref18"},{"issue":"5","key":"ref19","first-page":"1","article-title":"Cancer diagnosis via linear programming","volume":"23","author":"Mangasarian","year":"1990","journal-title":"SIAM News"},{"volume-title":"NATICUSdroid (Android Permissions)","year":"2022","author":"Mathur","key":"ref20"},{"issue":"102696","key":"ref21","article-title":"NATICUSdroid: A malware detection framework for Android using native and custom permissions","volume-title":"Journal of Information Security and Applications","volume":"58","author":"Mathur","year":"2021"},{"volume-title":"MK-TFHE GitHub repository","year":"2024","key":"ref22"}],"event":{"name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","start":{"date-parts":[[2024,10,17]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2024,10,19]]}},"container-title":["2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10792975\/10792923\/10793031.pdf?arnumber=10793031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T07:17:44Z","timestamp":1734506264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10793031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iccp63557.2024.10793031","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]}}}