{"id":"https://openalex.org/W2979217362","doi":"https://doi.org/10.1109/iccchina.2019.8855981","title":"Shape-Unconstrained Privacy-Preserving Range Query for Fog Computing Supported Vehicular Networks Using Image","display_name":"Shape-Unconstrained Privacy-Preserving Range Query for Fog Computing Supported Vehicular Networks Using Image","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2979217362","doi":"https://doi.org/10.1109/iccchina.2019.8855981","mag":"2979217362"},"language":"en","primary_location":{"id":"doi:10.1109/iccchina.2019.8855981","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2019.8855981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101954842","display_name":"Haoran Liang","orcid":"https://orcid.org/0000-0001-8705-0024"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoran Liang","raw_affiliation_strings":["School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004673608","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0003-2483-6980"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Wu","raw_affiliation_strings":["School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005732117","display_name":"Zhi Liu","orcid":"https://orcid.org/0000-0002-4745-9025"},"institutions":[{"id":"https://openalex.org/I1298590031","display_name":"Shizuoka University","ror":"https://ror.org/01w6wtk13","country_code":"JP","type":"education","lineage":["https://openalex.org/I1298590031"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Zhi Liu","raw_affiliation_strings":["Department of Mathematical and Systems Engineering, Shizuoka University, Hamamatsu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical and Systems Engineering, Shizuoka University, Hamamatsu, Japan","institution_ids":["https://openalex.org/I1298590031"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101954842"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.2385,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55609822,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"683","last_page":"688"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8364723920822144},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.6678444743156433},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5323919057846069},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5164268612861633},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.46972906589508057},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.4694981575012207},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4483569264411926},{"id":"https://openalex.org/keywords/query-optimization","display_name":"Query optimization","score":0.4271409511566162},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41751405596733093},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.4116889238357544},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.3645440340042114},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.34656423330307007},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.314416766166687},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3126775622367859},{"id":"https://openalex.org/keywords/web-query-classification","display_name":"Web query classification","score":0.29527634382247925},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.23838722705841064},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.2063492238521576},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1950085163116455},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16489827632904053}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8364723920822144},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.6678444743156433},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5323919057846069},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5164268612861633},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.46972906589508057},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4694981575012207},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4483569264411926},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.4271409511566162},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41751405596733093},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.4116889238357544},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.3645440340042114},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.34656423330307007},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.314416766166687},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3126775622367859},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.29527634382247925},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.23838722705841064},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.2063492238521576},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1950085163116455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16489827632904053},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccchina.2019.8855981","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2019.8855981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1858319211","https://openalex.org/W1990651151","https://openalex.org/W2028274834","https://openalex.org/W2079353783","https://openalex.org/W2096899416","https://openalex.org/W2101024939","https://openalex.org/W2310343821","https://openalex.org/W2344811709","https://openalex.org/W2443633465","https://openalex.org/W2490096848","https://openalex.org/W2604252918","https://openalex.org/W2734565981","https://openalex.org/W2755200181","https://openalex.org/W2767464531","https://openalex.org/W2789284498","https://openalex.org/W2791603174","https://openalex.org/W2792222535","https://openalex.org/W2793130752","https://openalex.org/W2794290709","https://openalex.org/W2797697435","https://openalex.org/W2799867512","https://openalex.org/W2803938340","https://openalex.org/W2807091904","https://openalex.org/W2808560727","https://openalex.org/W2808853068","https://openalex.org/W6750726403"],"related_works":["https://openalex.org/W2096359267","https://openalex.org/W3125756434","https://openalex.org/W2184296057","https://openalex.org/W2026738364","https://openalex.org/W2901901036","https://openalex.org/W2362460270","https://openalex.org/W1793997780","https://openalex.org/W4232633635","https://openalex.org/W185198413","https://openalex.org/W2538384344"],"abstract_inverted_index":{"For":[0],"Location-Based":[1],"Service":[2],"(LBS)":[3],"in":[4],"vehicular":[5,100],"networks,":[6,101],"there":[7],"is":[8,192],"a":[9,141],"trend":[10],"to":[11,15,45,81,128,173,195],"leverage":[12],"fog":[13,37,82,148],"nodes":[14,149],"provide":[16],"low-latency":[17],"range":[18,24,61,94,113,136,200],"query":[19,25,62,137,152,201],"services.":[20],"However,":[21],"traditional":[22,40,67],"coordinate-centric":[23],"frameworks":[26,41],"face":[27],"performance":[28],"and":[29,77,165,178],"security":[30,163,176],"challenges":[31],"when":[32],"they":[33,49],"are":[34,171],"deployed":[35],"at":[36,55,120],"nodes.":[38,83],"First,":[39],"employ":[42],"coordinate":[43],"computation":[44],"search":[46,72,117],"targets,":[47],"thus":[48],"cannot":[50],"support":[51],"highly":[52],"irregular":[53],"areas":[54,73],"network":[56],"edges.":[57],"Second,":[58],"existing":[59],"privacy-preserving":[60],"schemes":[63],"based":[64,92,111,123,154],"on":[65,124,155],"the":[66,121,125,130,133,159,175,181,185,193],"framework":[68],"only":[69],"can":[70,150],"protect":[71,129],"with":[74,96,167],"certain":[75],"shapes":[76],"bring":[78],"high":[79],"overhead":[80],"To":[84,184],"address":[85],"these":[86],"challenges,":[87],"we":[88,105,139],"propose":[89,107],"Image":[90],"matching":[91,110],"Fine-grained":[93],"Query":[95],"Privacy-preserving":[97],"for":[98],"fog-enabled":[99],"named":[102],"IFQP.":[103,183],"Specifically,":[104],"firstly":[106],"an":[108],"image":[109,143,197],"fine-grained":[112],"query,":[114],"which":[115],"could":[116],"targets":[118],"located":[119],"edge":[122],"image.":[126],"Moreover,":[127],"privacy":[131],"of":[132,180,187],"proposed":[134,160,182],"image-centric":[135],"framework,":[138],"develop":[140],"content-searchable":[142],"encryption":[144],"algorithm.":[145,161],"In":[146],"particular,":[147],"generate":[151],"responses":[153],"images":[156],"encrypted":[157],"by":[158],"Detailed":[162],"analysis":[164],"experiments":[166],"real":[168],"LBS":[169],"datasets":[170],"done":[172],"demonstrate":[174],"properties":[177],"efficiency":[179],"best":[186],"our":[188],"knowledge,":[189],"this":[190],"work":[191],"first":[194],"introduce":[196],"technologies":[198],"into":[199],"field.":[202]},"counts_by_year":[{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
