Privacy-preserving similarity joins over encrypted data X Yuan, X Wang, C Wang, C Yu, S Nutanong IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017 | 22 | 2017 |
A generic method for accelerating LSH-based similarity join processing C Yu, S Nutanong, H Li, C Wang, X Yuan IEEE Transactions on Knowledge and Data Engineering 29 (4), 712-726, 2016 | 16 | 2016 |
A fast LSH-based similarity search method for multivariate time series C Yu, L Luo, LLH Chan, T Rakthanmanon, S Nutanong Information Sciences 476, 337-356, 2019 | 15 | 2019 |
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks T Xiang, C Yu, F Chen Signal Processing: Image Communication 29 (9), 1015-1027, 2014 | 14 | 2014 |
Degradative encryption: An efficient way to protect SPIHT compressed images T Xiang, J Qu, C Yu, X Fu Optics Communications 285 (24), 4891-4900, 2012 | 13 | 2012 |
A scalable framework for stylometric analysis query processing S Nutanong, C Yu, R Sarwar, P Xu, D Chow 2016 IEEE 16th International Conference on Data Mining (ICDM), 1125-1130, 2016 | 12 | 2016 |
A scalable framework for stylometric analysis of multi-author documents R Sarwar, C Yu, S Nutanong, N Urailertprasert, N Vannaboot, ... International Conference on Database Systems for Advanced Applications, 813-829, 2018 | 8 | 2018 |
Fast encryption of JPEG 2000 images in wireless multimedia sensor networks T Xiang, C Yu, F Chen International Conference on Wireless Algorithms, Systems, and Applications …, 2013 | 8 | 2013 |
Systems and methods for privacy-assured similarity joins over encrypted datasets C Wang, S Nutanong, X Yuan, X Wang, C Yu US Patent 10,496,638, 2019 | 7 | 2019 |
Research on the security of DICOM medical images based on improved AES encryption algorithm T Xiang, CY Yu, JY Qu, XS Luo Dianzi Xuebao(Acta Electronica Sinica) 40 (2), 406-411, 2012 | 6 | 2012 |
An effective and scalable framework for authorship attribution query processing R Sarwar, C Yu, N Tungare, K Chitavisutthivong, S Sriratanawilai, Y Xu, ... IEEE Access 6, 50030-50048, 2018 | 4 | 2018 |
A hardware-accelerated solution for hierarchical index-based merge-join Z Zhou, C Yu, S Nutanong, Y Cui, C Fu, CJ Xue IEEE Transactions on Knowledge and Data Engineering 31 (1), 91-104, 2018 | 4 | 2018 |
$ CAG $: Stylometric Authorship Attribution of Multi-Author Documents Using a Co-Authorship Graph R Sarwar, N Urailertprasert, N Vannaboot, C Yu, T Rakthanmanon, ... IEEE Access 8, 18374-18393, 2020 | 3 | 2020 |
Cryptanalysis of secure arithmetic coding based on interval swapping T Xiang, C Yu, J Qu, X Fu 2011 8th International Conference & Expo on Emerging Technologies for a …, 2011 | 3 | 2011 |
C2Net: A network-efficient approach to collision counting LSH similarity join H Li, S Nutanong, H Xu, C Yu, F Ha IEEE Transactions on Knowledge and Data Engineering 31 (3), 423-436, 2018 | 2 | 2018 |