{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:56:25Z","timestamp":1762005385936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,14]]},"DOI":"10.1145\/3524273.3528190","type":"proceedings-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T22:23:21Z","timestamp":1659738201000},"page":"177-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Encrypted video search"],"prefix":"10.1145","author":[{"given":"Yu","family":"Zheng","sequence":"first","affiliation":[{"name":"Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Heng","family":"Tian","sequence":"additional","affiliation":[{"name":"Northeastern University, Shenyang, China"}]},{"given":"Minxin","family":"Du","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Chong","family":"Fu","sequence":"additional","affiliation":[{"name":"Northeastern University, Shenyang, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Herbert Bay Andreas Ess Tinne Tuytelaars and Luc Van Gool. 2008. Speeded-Up Robust Features (SURF). In Comput. Vis. Image Underst.  Herbert Bay Andreas Ess Tinne Tuytelaars and Luc Van Gool. 2008. Speeded-Up Robust Features (SURF). In Comput. Vis. Image Underst."},{"key":"e_1_3_2_1_2_1","unstructured":"Raphael Bost. 2016. : Forward Secure Searchable Encryption. In CCS.  Raphael Bost. 2016. : Forward Secure Searchable Encryption. In CCS."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Rapha\u00ebl Bost Brice Minaud and Olga Ohrimenko. 2017. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. In CCS.  Rapha\u00ebl Bost Brice Minaud and Olga Ohrimenko. 2017. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. In CCS.","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_1_4_1","volume-title":"Visual search for objects in a complex visual context: what we wish to see. Semantic Multimedia Analysis and Processing","author":"Boujut Hugo","year":"2014","unstructured":"Hugo Boujut , Aur\u00e9lie Bugeau , and Jenny Benois-Pineau . 2014. Visual search for objects in a complex visual context: what we wish to see. Semantic Multimedia Analysis and Processing ( 2014 ). Hugo Boujut, Aur\u00e9lie Bugeau, and Jenny Benois-Pineau. 2014. Visual search for objects in a complex visual context: what we wish to see. Semantic Multimedia Analysis and Processing (2014)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"David Cash Stanislaw Jarecki Charanjit S. Jutla Hugo Krawczyk Marcel-Catalin Rosu and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO.  David Cash Stanislaw Jarecki Charanjit S. Jutla Hugo Krawczyk Marcel-Catalin Rosu and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO.","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"David Cash Stanislaw Jarecki Charanjit S. Jutla Hugo Krawczyk Marcel-Catalin Rosu and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO.  David Cash Stanislaw Jarecki Charanjit S. Jutla Hugo Krawczyk Marcel-Catalin Rosu and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO.","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Javad Ghareh Chamani Dimitrios Papadopoulos Charalampos Papamanthou and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In CCS.  Javad Ghareh Chamani Dimitrios Papadopoulos Charalampos Papamanthou and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In CCS.","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Shih-Fu Chang William Chen Horace J. Meng Hari Sundaram and Di Zhong. 1997. VideoQ: An Automated Content Based Video Search System Using Visual Cues. In ACM MM.  Shih-Fu Chang William Chen Horace J. Meng Hari Sundaram and Di Zhong. 1997. VideoQ: An Automated Content Based Video Search System Using Visual Cues. In ACM MM.","DOI":"10.1145\/266180.266382"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Moses Charikar. 2002. Similarity estimation techniques from rounding algorithms. In STOC.  Moses Charikar. 2002. Similarity estimation techniques from rounding algorithms. In STOC.","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. In ASIACRYPT.  Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. In ASIACRYPT.","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jingyuan Chen Xinpeng Chen Lin Ma Zequn Jie and Tat-Seng Chua. 2018. Temporally Grounding Natural Sentence in Video. In EMNLP.  Jingyuan Chen Xinpeng Chen Lin Ma Zequn Jie and Tat-Seng Chua. 2018. Temporally Grounding Natural Sentence in Video. In EMNLP.","DOI":"10.18653\/v1\/D18-1015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2669095"},{"key":"e_1_3_2_1_13_1","unstructured":"Gabriella Csurka Christopher Dance Lixin Fan Jutta Willamowski and C\u00e9dric Bray. 2004. Visual categorization with bags of keypoints. In ECCV.  Gabriella Csurka Christopher Dance Lixin Fan Jutta Willamowski and C\u00e9dric Bray. 2004. Visual categorization with bags of keypoints. In ECCV."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Reza Curtmola Juan A. Garay Seny Kamara and Rafail Ostrovsky. 2006. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS.  Reza Curtmola Juan A. Garay Seny Kamara and Rafail Ostrovsky. 2006. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS.","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_15_1","volume-title":"Semantic Reasoning in Zero Example Video Event Retrieval. TOMM","author":"de Boer Maaike","year":"2017","unstructured":"Maaike de Boer , Yi-Jie Lu , Hao Zhang , Klamer Schutte , Chong-Wah Ngo , and Wessel Kraaij . 2017. Semantic Reasoning in Zero Example Video Event Retrieval. TOMM ( 2017 ). Maaike de Boer, Yi-Jie Lu, Hao Zhang, Klamer Schutte, Chong-Wah Ngo, and Wessel Kraaij. 2017. Semantic Reasoning in Zero Example Video Event Retrieval. TOMM (2017)."},{"key":"e_1_3_2_1_16_1","volume-title":"Semantic Mapping in Video Retrieval. SIGIR Forum","author":"de Boer Maaike H. T.","year":"2017","unstructured":"Maaike H. T. de Boer . 2017. Semantic Mapping in Video Retrieval. SIGIR Forum ( 2017 ). Maaike H. T. de Boer. 2017. Semantic Mapping in Video Retrieval. SIGIR Forum (2017)."},{"key":"e_1_3_2_1_17_1","volume-title":"Dimitrios Papadopoulos, and Charalampos Papamanthou.","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis , Javad Ghareh Chamani , Dimitrios Papadopoulos, and Charalampos Papamanthou. 2020 . Dynamic Searchable Encryption with Small Client Storage . (2020). Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2020. Dynamic Searchable Encryption with Small Client Storage. (2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2903651"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Sky Faber Stanislaw Jarecki Hugo Krawczyk Quan Nguyen Marcel-Catalin Rosu and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In ESORICS.  Sky Faber Stanislaw Jarecki Hugo Krawczyk Quan Nguyen Marcel-Catalin Rosu and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In ESORICS.","DOI":"10.1007\/978-3-319-24177-7_7"},{"key":"e_1_3_2_1_20_1","unstructured":"Han Fang Pengfei Xiong Luhui Xu and Yu Chen. 2021. CLIP2Video: Mastering Video-Text Retrieval via Image CLIP. (2021).  Han Fang Pengfei Xiong Luhui Xu and Yu Chen. 2021. CLIP2Video: Mastering Video-Text Retrieval via Image CLIP. (2021)."},{"key":"e_1_3_2_1_21_1","volume-title":"TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In CRYPTO.","author":"Garg Sanjam","year":"2016","unstructured":"Sanjam Garg , Payman Mohassel , and Charalampos Papamanthou . 2016 . TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In CRYPTO. Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In CRYPTO."},{"key":"e_1_3_2_1_22_1","unstructured":"Hengtong Hu Lingxi Xie Richang Hong and Qi Tian. 2020. Creating Something From Nothing: Unsupervised Knowledge Distillation for Cross-Modal Hashing. In CVPR.  Hengtong Hu Lingxi Xie Richang Hong and Qi Tian. 2020. Creating Something From Nothing: Unsupervised Knowledge Distillation for Cross-Modal Hashing. In CVPR."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Nazli Ikizler-Cinbis and Stan Sclaroff. 2010. Object Scene and Actions: Combining Multiple Features for Human Action Recognition. In ECCV.  Nazli Ikizler-Cinbis and Stan Sclaroff. 2010. Object Scene and Actions: Combining Multiple Features for Human Action Recognition. In ECCV.","DOI":"10.1007\/978-3-642-15549-9_36"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Piotr Indyk and Rajeev Motwani. 1998. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In STOC.  Piotr Indyk and Rajeev Motwani. 1998. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In STOC.","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_1_25_1","unstructured":"Mohammad Saiful Islam Mehmet Kuzu and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification Attack and Mitigation. In NDSS.  Mohammad Saiful Islam Mehmet Kuzu and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification Attack and Mitigation. In NDSS."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Herv\u00e9 J\u00e9gou Matthijs Douze and Cordelia Schmid. 2008. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search. In ECCV.  Herv\u00e9 J\u00e9gou Matthijs Douze and Cordelia Schmid. 2008. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search. In ECCV.","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"e_1_3_2_1_27_1","unstructured":"Zhong Ji Kexin Chen and Haoran Wang. 2021. Step-Wise Hierarchical Alignment Network for Image-Text Matching. In IJCAI.  Zhong Ji Kexin Chen and Haoran Wang. 2021. Step-Wise Hierarchical Alignment Network for Image-Text Matching. In IJCAI."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Nan Jiang Yao Liu Tian Guo Wenyao Xu Viswanathan Swaminathan Lisong Xu and Sheng Wei. 2020. QuRate: power-efficient mobile immersive video streaming. In MMSys.  Nan Jiang Yao Liu Tian Guo Wenyao Xu Viswanathan Swaminathan Lisong Xu and Sheng Wei. 2020. QuRate: power-efficient mobile immersive video streaming. In MMSys.","DOI":"10.1145\/3339825.3391863"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2614233"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In ASIACRYPT.  Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In ASIACRYPT.","DOI":"10.1007\/978-3-030-03326-2_6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Seny Kamara Tarik Moataz and Olga Ohrimenko. 2018. Structured Encryption and Leakage Suppression. In CRYPTO.  Seny Kamara Tarik Moataz and Olga Ohrimenko. 2018. Structured Encryption and Leakage Suppression. In CRYPTO.","DOI":"10.1007\/978-3-319-96884-1_12"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Seny Kamara Charalampos Papamanthou and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In CCS.  Seny Kamara Charalampos Papamanthou and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In CCS.","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_33_1","volume-title":"HMDB: Alarge video database for human motion recognition. In ICCV.","author":"Kuehne Hildegard","year":"2011","unstructured":"Hildegard Kuehne , Hueihan Jhuang , Est\u00edbaliz Garrote , Tomaso A. Poggio , and Thomas Serre . 2011 . HMDB: Alarge video database for human motion recognition. In ICCV. Hildegard Kuehne, Hueihan Jhuang, Est\u00edbaliz Garrote, Tomaso A. Poggio, and Thomas Serre. 2011. HMDB: Alarge video database for human motion recognition. In ICCV."},{"key":"e_1_3_2_1_34_1","volume-title":"Mohammad Saiful Islam, and Murat Kantarcioglu","author":"Kuzu Mehmet","year":"2012","unstructured":"Mehmet Kuzu , Mohammad Saiful Islam, and Murat Kantarcioglu . 2012 . Efficient Similarity Search over Encrypted Data. In ICDE. Mehmet Kuzu, Mohammad Saiful Islam, and Murat Kantarcioglu. 2012. Efficient Similarity Search over Encrypted Data. In ICDE."},{"key":"e_1_3_2_1_35_1","unstructured":"Hsueh-Ying Lai Yi-Hsuan Tsai and Wei-Chen Chiu. 2019. Bridging Stereo Matching and Optical Flow via Spatiotemporal Correspondence. In CVPR.  Hsueh-Ying Lai Yi-Hsuan Tsai and Wei-Chen Chiu. 2019. Bridging Stereo Matching and Optical Flow via Spatiotemporal Correspondence. In CVPR."},{"key":"e_1_3_2_1_36_1","volume-title":"Chow","author":"Lai Russell W. F.","year":"2017","unstructured":"Russell W. F. Lai and Sherman S. M . Chow . 2017 . Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. In ACNS. Russell W. F. Lai and Sherman S. M. Chow. 2017. Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. In ACNS."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Fei-Fei Li Robert Fergus and Pietro Perona. 2007. Learning generative visual models from few training examples: An incremental Bayesian approach tested on 101 object categories. Comput. Vis. Image Underst. (2007).  Fei-Fei Li Robert Fergus and Pietro Perona. 2007. Learning generative visual models from few training examples: An incremental Bayesian approach tested on 101 object categories. Comput. Vis. Image Underst. (2007).","DOI":"10.1016\/j.cviu.2005.09.012"},{"key":"e_1_3_2_1_38_1","unstructured":"Minghui Li Mingxue Zhang Qian Wang Sherman S. M. Chow Minxin Du Yanjiao Chen and Chenliang Li. 2018. InstantCryptoGram: Secure Image Retrieval Service. In INFOCOM.  Minghui Li Mingxue Zhang Qian Wang Sherman S. M. Chow Minxin Du Yanjiao Chen and Chenliang Li. 2018. InstantCryptoGram: Secure Image Retrieval Service. In INFOCOM."},{"key":"e_1_3_2_1_39_1","unstructured":"Tsung-Yi Lin Michael Maire Serge J. Belongie James Hays Pietro Perona Deva Ramanan Piotr Doll\u00e1r and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In ECCV.  Tsung-Yi Lin Michael Maire Serge J. Belongie James Hays Pietro Perona Deva Ramanan Piotr Doll\u00e1r and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In ECCV."},{"key":"e_1_3_2_1_40_1","unstructured":"Chunxiao Liu Zhendong Mao Tianzhu Zhang Hongtao Xie Bin Wang and Yongdong Zhang. 2020. Graph Structured Network for Image-Text Matching. In CVPR.  Chunxiao Liu Zhendong Mao Tianzhu Zhang Hongtao Xie Bin Wang and Yongdong Zhang. 2020. Graph Structured Network for Image-Text Matching. In CVPR."},{"key":"e_1_3_2_1_41_1","volume-title":"Willy Susilo, Kaitai Liang, Rongxing Lu, and Bala Srinivasan.","author":"Liu Joseph K.","year":"2015","unstructured":"Joseph K. Liu , Man Ho Au , Willy Susilo, Kaitai Liang, Rongxing Lu, and Bala Srinivasan. 2015 . Secure sharing and searching for real-time video data in mobile cloud. IEEE Network . Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, and Bala Srinivasan. 2015. Secure sharing and searching for real-time video data in mobile cloud. IEEE Network."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Liu Liu Jiangtong Li Li Niu Ruicong Xu and Liqing Zhang. 2021. Activity Image-to-Video Retrieval by Disentangling Appearance and Motion. In AAAI.  Liu Liu Jiangtong Li Li Niu Ruicong Xu and Liqing Zhang. 2021. Activity Image-to-Video Retrieval by Disentangling Appearance and Motion. In AAAI.","DOI":"10.1609\/aaai.v35i3.16312"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3034534"},{"key":"e_1_3_2_1_45_1","volume-title":"The Fallacy of Composition of Oblivious RAM and Searchable Encryption. IACR","author":"Naveed Muhammad","year":"2015","unstructured":"Muhammad Naveed . 2015. The Fallacy of Composition of Oblivious RAM and Searchable Encryption. IACR ( 2015 ). Muhammad Naveed. 2015. The Fallacy of Composition of Oblivious RAM and Searchable Encryption. IACR (2015)."},{"key":"e_1_3_2_1_46_1","volume-title":"Corso","author":"Sadanand Sreemanananth","year":"2012","unstructured":"Sreemanananth Sadanand and Jason J . Corso . 2012 . Action bank: A high-level representation of activity in video. In CVPR. Sreemanananth Sadanand and Jason J. Corso. 2012. Action bank: A high-level representation of activity in video. In CVPR."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Alexander Schindler Andrew Lindley Anahid N. Jalali Martin Boyer Sergiu Gordea and Ross King. 2020. Multi-modal video forensic platform for investigating post-terrorist attack scenarios. In MMSys.  Alexander Schindler Andrew Lindley Anahid N. Jalali Martin Boyer Sergiu Gordea and Ross King. 2020. Multi-modal video forensic platform for investigating post-terrorist attack scenarios. In MMSys.","DOI":"10.1145\/3339825.3393585"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Susanna Schwarzmann Nick Hainke Thomas Zinner Christian Sieber Werner Robitza and Alexander Raake. 2020. Comparing fixed and variable segment durations for adaptive video streaming: a holistic analysis. In MMSys.  Susanna Schwarzmann Nick Hainke Thomas Zinner Christian Sieber Werner Robitza and Alexander Raake. 2020. Comparing fixed and variable segment durations for adaptive video streaming: a holistic analysis. In MMSys.","DOI":"10.1145\/3339825.3391858"},{"key":"e_1_3_2_1_49_1","volume-title":"Smeulders","author":"Snoek Cees","year":"2010","unstructured":"Cees Snoek , Koen E. A. van de Sande , Ork de Rooij , Bouke Huurnink , Efstratios Gavves , Daan Odijk , Maarten de Rijke , Theo Gevers , Marcel Worring , Dennis Koelma , and Arnold W. M . Smeulders . 2010 . Semantic Video Search Engine. In TRECVID. Cees Snoek, Koen E. A. van de Sande, Ork de Rooij, Bouke Huurnink, Efstratios Gavves, Daan Odijk, Maarten de Rijke, Theo Gevers, Marcel Worring, Dennis Koelma, and Arnold W. M. Smeulders. 2010. Semantic Video Search Engine. In TRECVID."},{"key":"e_1_3_2_1_50_1","volume-title":"Snoek and Marcel Worring","author":"Cees G.","year":"2009","unstructured":"Cees G. M. Snoek and Marcel Worring . 2009 . Concept-Based Video Retrieval. Found. Trends Inf. Retr . (2009). Cees G. M. Snoek and Marcel Worring. 2009. Concept-Based Video Retrieval. Found. Trends Inf. Retr. (2009)."},{"volume-title":"Practical Techniques for Searches on Encrypted Data","author":"Song Dawn Xiaodong","key":"e_1_3_2_1_51_1","unstructured":"Dawn Xiaodong Song , David A. Wagner , and Adrian Perrig . 2000. Practical Techniques for Searches on Encrypted Data . In IEEE S &P. Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In IEEE S&P."},{"key":"e_1_3_2_1_52_1","volume-title":"Amir Roshan Zamir, and Mubarak Shah","author":"Soomro Khurram","year":"2012","unstructured":"Khurram Soomro , Amir Roshan Zamir, and Mubarak Shah . 2012 . UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild. CoRR ( 2012). Khurram Soomro, Amir Roshan Zamir, and Mubarak Shah. 2012. UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild. CoRR (2012)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Emil Stefanov Charalampos Papamanthou and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In NDSS.  Emil Stefanov Charalampos Papamanthou and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In NDSS.","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_1_54_1","volume-title":"Thanh Duc Ngo, and Duy-Dinh Le","author":"Truong Thanh-Dat","year":"2018","unstructured":"Thanh-Dat Truong , Vinh-Tiep Nguyen , Minh-Triet Tran , Trang-Vinh Trieu , Tien Do , Thanh Duc Ngo, and Duy-Dinh Le . 2018 . Video Search Based on Semantic Extraction and Locally Regional Object Proposal. In MMM. Thanh-Dat Truong, Vinh-Tiep Nguyen, Minh-Triet Tran, Trang-Vinh Trieu, Tien Do, Thanh Duc Ngo, and Duy-Dinh Le. 2018. Video Search Based on Semantic Extraction and Locally Regional Object Proposal. In MMM."},{"key":"e_1_3_2_1_55_1","unstructured":"Rong-Cheng Tu Xianling Mao Bo-Si Feng and Shu-ying Yu. 2019. Object Detection based Deep Unsupervised Hashing. In IJCAI.  Rong-Cheng Tu Xianling Mao Bo-Si Feng and Shu-ying Yu. 2019. Object Detection based Deep Unsupervised Hashing. In IJCAI."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Yuji Unagami Natsume Matsuzaki Shota Yamada Nuttapong Attrapadung Takahiro Matsuda and Goichiro Hanaoka. 2017. Private Similarity Searchable Encryption for Euclidean Distance. IEICE Trans. Inf. Syst. (2017).  Yuji Unagami Natsume Matsuzaki Shota Yamada Nuttapong Attrapadung Takahiro Matsuda and Goichiro Hanaoka. 2017. Private Similarity Searchable Encryption for Euclidean Distance. IEICE Trans. Inf. Syst. (2017).","DOI":"10.1587\/transinf.2016INP0011"},{"key":"e_1_3_2_1_57_1","volume-title":"Chow","author":"Wang Jiafan","year":"2022","unstructured":"Jiafan Wang and Sherman S. M . Chow . 2022 . Omnes pro uno: Practical Multi-Writer Encrypted Database. In USS. Jiafan Wang and Sherman S. M. Chow. 2022. Omnes pro uno: Practical Multi-Writer Encrypted Database. In USS."},{"key":"e_1_3_2_1_58_1","volume-title":"Jingkuan Song, and Jianqiu Ji.","author":"Wang Jingdong","year":"2014","unstructured":"Jingdong Wang , Heng Tao Shen , Jingkuan Song, and Jianqiu Ji. 2014 . Hashing for Similarity Search: A Survey. CoRR ( 2014). Jingdong Wang, Heng Tao Shen, Jingkuan Song, and Jianqiu Ji. 2014. Hashing for Similarity Search: A Survey. CoRR (2014)."},{"key":"e_1_3_2_1_59_1","volume-title":"A Comprehensive Survey on Cross-modal Retrieval. CoRR","author":"Wang Kaiye","year":"2016","unstructured":"Kaiye Wang , Qiyue Yin , Wei Wang , Shu Wu , and Liang Wang . 2016. A Comprehensive Survey on Cross-modal Retrieval. CoRR ( 2016 ). Kaiye Wang, Qiyue Yin, Wei Wang, Shu Wu, and Liang Wang. 2016. A Comprehensive Survey on Cross-modal Retrieval. CoRR (2016)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2593444"},{"key":"e_1_3_2_1_61_1","unstructured":"Dayan Wu Qi Dai Jing Liu Bo Li and Weiping Wang. 2019. Deep Incremental Hashing Network for Efficient Image Retrieval. In CVPR.  Dayan Wu Qi Dai Jing Liu Bo Li and Weiping Wang. 2019. Deep Incremental Hashing Network for Efficient Image Retrieval. In CVPR."},{"key":"e_1_3_2_1_62_1","unstructured":"Zuxuan Wu Yanwei Fu Yu-Gang Jiang and Leonid Sigal. 2016. Harnessing Object and Scene Semantics for Large-Scale Video Understanding. In CVPR.  Zuxuan Wu Yanwei Fu Yu-Gang Jiang and Leonid Sigal. 2016. Harnessing Object and Scene Semantics for Large-Scale Video Understanding. In CVPR."},{"key":"e_1_3_2_1_63_1","unstructured":"Ruicong Xu Li Niu Jianfu Zhang and Liqing Zhang. 2020. A Proposal-Based Approach for Activity Image-to-Video Retrieval. In AAAI.  Ruicong Xu Li Niu Jianfu Zhang and Liqing Zhang. 2020. A Proposal-Based Approach for Activity Image-to-Video Retrieval. In AAAI."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Erkun Yang Tongliang Liu Cheng Deng Wei Liu and Dacheng Tao. 2019. DistillHash: Unsupervised Deep Hashing by Distilling Data Pairs. In CVPR.  Erkun Yang Tongliang Liu Cheng Deng Wei Liu and Dacheng Tao. 2019. DistillHash: Unsupervised Deep Hashing by Distilling Data Pairs. In CVPR.","DOI":"10.1109\/CVPR.2019.00306"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Li Yuan Tao Wang Xiaopeng Zhang Francis E. H. Tay Zequn Jie Wei Liu and Jiashi Feng. 2020. Central Similarity Quantization for Efficient Image and Video Retrieval. In CVPR.  Li Yuan Tao Wang Xiaopeng Zhang Francis E. H. Tay Zequn Jie Wei Liu and Jiashi Feng. 2020. Central Similarity Quantization for Efficient Image and Video Retrieval. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00315"},{"key":"e_1_3_2_1_66_1","unstructured":"Xingliang Yuan Yu Guo Xinyu Wang Cong Wang Baochun Li and Xiaohua Jia. 2017. EncKV: An Encrypted Key-value Store with Rich Queries. In AsiaCCS.  Xingliang Yuan Yu Guo Xinyu Wang Cong Wang Baochun Li and Xiaohua Jia. 2017. EncKV: An Encrypted Key-value Store with Rich Queries. In AsiaCCS."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Liangli Zhen Peng Hu Xu Wang and Dezhong Peng. 2019. Deep Supervised Cross-Modal Retrieval. In CVPR.  Liangli Zhen Peng Hu Xu Wang and Dezhong Peng. 2019. Deep Supervised Cross-Modal Retrieval. In CVPR.","DOI":"10.1109\/CVPR.2019.01064"}],"event":{"name":"MMSys '22: 13th ACM Multimedia Systems Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Athlone Ireland","acronym":"MMSys '22"},"container-title":["Proceedings of the 13th ACM Multimedia Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524273.3528190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524273.3528190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:06Z","timestamp":1750188666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524273.3528190"}},"subtitle":["scalable, modular, and content-similar"],"short-title":[],"issued":{"date-parts":[[2022,6,14]]},"references-count":67,"alternative-id":["10.1145\/3524273.3528190","10.1145\/3524273"],"URL":"https:\/\/doi.org\/10.1145\/3524273.3528190","relation":{},"subject":[],"published":{"date-parts":[[2022,6,14]]},"assertion":[{"value":"2022-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}