{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:38Z","timestamp":1750221158888,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Division Of Computer and Network Systems National Science Foundation","award":["1262277"],"award-info":[{"award-number":["1262277"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196513","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"537-550","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SecSAKE"],"prefix":"10.1145","author":[{"given":"Zihao","family":"Shan","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo, Amherst, NY, USA"}]},{"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Leslie","family":"Ying","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Amherst, NY, USA"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Amherst, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(01)80019-X"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/29.1488"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.11.007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486013"},{"key":"e_1_3_2_1_5_1","volume-title":"New algorithms for secure outsourcing of large-scale systems of linear equations","author":"Chen Xiaofeng","year":"2015","unstructured":"Xiaofeng Chen , Xinyi Huang , Jin Li , Jianfeng Ma , Wenjing Lou , and Duncan S Wong . 2015. New algorithms for secure outsourcing of large-scale systems of linear equations . IEEE transactions on information forensics and security, Vol. 10 , 1 ( 2015 ), 69--78. Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, and Duncan S Wong. 2015. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE transactions on information forensics and security, Vol. 10, 1 (2015), 69--78."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881446"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930794"},{"volume-title":"Probabilistic Machines Can Use Less Running Time.. IFIP congress","author":"Freivalds Rusins","key":"e_1_3_2_1_8_1","unstructured":"Rusins Freivalds . 1977. Probabilistic Machines Can Use Less Running Time.. IFIP congress , Vol. Vol. 839 . 842. Rusins Freivalds. 1977. Probabilistic Machines Can Use Less Running Time.. IFIP congress, Vol. Vol. 839. 842."},{"key":"e_1_3_2_1_9_1","first-page":"465","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","volume":"2010","author":"Gennaro Rosario","year":"2010","unstructured":"Rosario Gennaro , Craig Gentry , and Bryan Parno . 2010 . Non-interactive verifiable computing: Outsourcing computation to untrusted workers . Advances in Cryptology--CRYPTO 2010 (2010), 465 -- 482 . Rosario Gennaro, Craig Gentry, and Bryan Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Advances in Cryptology--CRYPTO 2010 (2010), 465--482.","journal-title":"Advances in Cryptology--CRYPTO"},{"key":"e_1_3_2_1_10_1","volume-title":"Cadzow's basic algorithm, alternating projections and singular spectrum analysis. Statistics and its interface","author":"Gillard Jonathan","year":"2010","unstructured":"Jonathan Gillard . 2010. Cadzow's basic algorithm, alternating projections and singular spectrum analysis. Statistics and its interface Vol. 3 , 3 ( 2010 ), 335--343. Jonathan Gillard. 2010. Cadzow's basic algorithm, alternating projections and singular spectrum analysis. Statistics and its interface Vol. 3, 3 (2010), 335--343."},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop on Efficient Machine Learning at NIPS","volume":"58","author":"Holmes Michael","year":"2007","unstructured":"Michael Holmes , Alexander Gray , and Charles Isbell . 2007 . Fast SVD for large-scale matrices . In Workshop on Efficient Machine Learning at NIPS , Vol. Vol. 58 . 249--252. Michael Holmes, Alexander Gray, and Charles Isbell. 2007. Fast SVD for large-scale matrices. In Workshop on Efficient Machine Learning at NIPS, Vol. Vol. 58. 249--252."},{"key":"e_1_3_2_1_12_1","volume-title":"Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Information sciences","author":"Lei Xinyu","year":"2014","unstructured":"Xinyu Lei , Xiaofeng Liao , Tingwen Huang , and Feno Heriniaina . 2014. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Information sciences Vol. 280 ( 2014 ), 205--217. Xinyu Lei, Xiaofeng Liao, Tingwen Huang, and Feno Heriniaina. 2014. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Information sciences Vol. 280 (2014), 205--217."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2013.7"},{"key":"e_1_3_2_1_14_1","volume-title":"High Performance Computing and Communications","author":"Liao Weixian","year":"2016","unstructured":"Weixian Liao , Wei Du , Sergio Salinas , and Pan Li. 2016. Efficient Privacy-Preserving Outsourcing of Large-Scale Convex Separable Programming for Smart Cities . In High Performance Computing and Communications ; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 2016 IEEE 18th International Conference on. IEEE , 1349--1356. Weixian Liao, Wei Du, Sergio Salinas, and Pan Li. 2016. Efficient Privacy-Preserving Outsourcing of Large-Scale Convex Separable Programming for Smart Cities. In High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 2016 IEEE 18th International Conference on. IEEE, 1349--1356."},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Lustig Michael","year":"2016","unstructured":"Michael Lustig . 2016 . ESPIRiT: Reference Implementation of Compressed Sensing and Parallel Imaging in Matlab. (March. 2016) . Retrieved Jun 20, 2016 from https:\/\/people.eecs.berkeley.edu\/ mlustig\/software Michael Lustig. 2016. ESPIRiT: Reference Implementation of Compressed Sensing and Parallel Imaging in Matlab. (March. 2016). Retrieved Jun 20, 2016 from https:\/\/people.eecs.berkeley.edu\/ mlustig\/software"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Lustig Michael","year":"2017","unstructured":"Michael Lustig . 2017 . MR Datasets for Compressed Sensing. (Dec.. 2017) . Retrieved Dec, 2017 from http:\/\/mridata.org\/undersampled Michael Lustig. 2017. MR Datasets for Compressed Sensing. (Dec.. 2017). Retrieved Dec, 2017 from http:\/\/mridata.org\/undersampled"},{"key":"e_1_3_2_1_17_1","volume-title":"Introduction to parallelizing compressed sensing magnetic resonance imaging. The Berkeley par lab: progress in the parallel computing landscape","author":"Lustig Michael","year":"2013","unstructured":"Michael Lustig , Kurt Keutzer , and Shreyas Vasanawala . 2013. Introduction to parallelizing compressed sensing magnetic resonance imaging. The Berkeley par lab: progress in the parallel computing landscape . Redmond, WA : Microsoft Corporation ( 2013 ), 105--139. Michael Lustig, Kurt Keutzer, and Shreyas Vasanawala. 2013. Introduction to parallelizing compressed sensing magnetic resonance imaging. The Berkeley par lab: progress in the parallel computing landscape. Redmond, WA: Microsoft Corporation (2013), 105--139."},{"key":"e_1_3_2_1_18_1","volume-title":"SPIRiT: Iterative self-consistent parallel imaging reconstruction from arbitrary k-space. Magnetic resonance in medicine","author":"Lustig Michael","year":"2010","unstructured":"Michael Lustig and John M Pauly . 2010. SPIRiT: Iterative self-consistent parallel imaging reconstruction from arbitrary k-space. Magnetic resonance in medicine Vol. 64 , 2 ( 2010 ), 457--471. Michael Lustig and John M Pauly. 2010. SPIRiT: Iterative self-consistent parallel imaging reconstruction from arbitrary k-space. Magnetic resonance in medicine Vol. 64, 2 (2010), 457--471."},{"volume-title":"Randomized algorithms","author":"Motwani Rajeev","key":"e_1_3_2_1_19_1","unstructured":"Rajeev Motwani and Prabhakar Raghavan . 2010. Randomized algorithms . Chapman &Hall\/CRC. Rajeev Motwani and Prabhakar Raghavan. 2010. Randomized algorithms. Chapman &Hall\/CRC."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.147"},{"key":"e_1_3_2_1_21_1","volume-title":"et almbox","author":"Pruessmann Klaas P","year":"1999","unstructured":"Klaas P Pruessmann , Markus Weiger , Markus B Scheidegger , Peter Boesiger , et almbox .. 1999 . SENSE: sensitivity encoding for fast MRI. Magnetic resonance in medicine Vol. 42 , 5 (1999), 952--962. Klaas P Pruessmann, Markus Weiger, Markus B Scheidegger, Peter Boesiger, et almbox.. 1999. SENSE: sensitivity encoding for fast MRI. Magnetic resonance in medicine Vol. 42, 5 (1999), 952--962."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654941"},{"key":"e_1_3_2_1_23_1","volume-title":"2015 IEEE Conference on. IEEE, 1035--1043","author":"Salinas Sergio","year":"2015","unstructured":"Sergio Salinas , Changqing Luo , Xuhui Chen , and Pan Li . 2015 . Efficient secure outsourcing of large-scale linear systems of equations Computer Communications (INFOCOM) , 2015 IEEE Conference on. IEEE, 1035--1043 . Sergio Salinas, Changqing Luo, Xuhui Chen, and Pan Li. 2015. Efficient secure outsourcing of large-scale linear systems of equations Computer Communications (INFOCOM), 2015 IEEE Conference on. IEEE, 1035--1043."},{"key":"e_1_3_2_1_24_1","volume-title":"Efficient secure outsourcing of large-scale sparse linear systems of equations","author":"Salinas Sergio","year":"2017","unstructured":"Sergio Salinas , Changqing Luo , Xuhui Chen , Weixian Liao , and Pan Li. 2017. Efficient secure outsourcing of large-scale sparse linear systems of equations . IEEE Transactions on Big Data ( 2017 ). Sergio Salinas, Changqing Luo, Xuhui Chen, Weixian Liao, and Pan Li. 2017. Efficient secure outsourcing of large-scale sparse linear systems of equations. IEEE Transactions on Big Data (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897862"},{"key":"e_1_3_2_1_26_1","volume-title":"Michael A Ohliger, Michael Elad, John M Pauly, Daniel B Vigneron, and Michael Lustig.","author":"Shin Peter J","year":"2014","unstructured":"Peter J Shin , Peder EZ Larson , Michael A Ohliger, Michael Elad, John M Pauly, Daniel B Vigneron, and Michael Lustig. 2014 . Calibrationless parallel imaging reconstruction based on structured low-rank matrix completion. Magnetic resonance in medicine Vol. 72 , 4 (2014), 959--970. Peter J Shin, Peder EZ Larson, Michael A Ohliger, Michael Elad, John M Pauly, Daniel B Vigneron, and Michael Lustig. 2014. Calibrationless parallel imaging reconstruction based on structured low-rank matrix completion. Magnetic resonance in medicine Vol. 72, 4 (2014), 959--970."},{"key":"e_1_3_2_1_27_1","volume-title":"Secure and practical outsourcing of linear programming in cloud computing INFOCOM","author":"Wang Cong","year":"2011","unstructured":"Cong Wang , Kui Ren , and Jia Wang . 2011. Secure and practical outsourcing of linear programming in cloud computing INFOCOM , 2011 Proceedings IEEE. IEEE , 820--828. Cong Wang, Kui Ren, and Jia Wang. 2011. Secure and practical outsourcing of linear programming in cloud computing INFOCOM, 2011 Proceedings IEEE. IEEE, 820--828."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.206"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273797"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/jmri.24521"},{"volume-title":"Efficient secure and verifiable outsourcing of matrix multiplications International Conference on Information Security","author":"Zhang Yihua","key":"e_1_3_2_1_31_1","unstructured":"Yihua Zhang and Marina Blanton . 2014. Efficient secure and verifiable outsourcing of matrix multiplications International Conference on Information Security . Springer , 158--178. Yihua Zhang and Marina Blanton. 2014. Efficient secure and verifiable outsourcing of matrix multiplications International Conference on Information Security. Springer, 158--178."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2535103"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196513","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196513"}},"subtitle":["Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":32,"alternative-id":["10.1145\/3196494.3196513","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196513","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}