{"id":"https://openalex.org/W3009741218","doi":"https://doi.org/10.1145/3374587.3374646","title":"A Study of Ciphertext Fuzzy Retrieval Based on Information Matrix","display_name":"A Study of Ciphertext Fuzzy Retrieval Based on Information Matrix","publication_year":2019,"publication_date":"2019-12-06","ids":{"openalex":"https://openalex.org/W3009741218","doi":"https://doi.org/10.1145/3374587.3374646","mag":"3009741218"},"language":"en","primary_location":{"id":"doi:10.1145/3374587.3374646","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374587.3374646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004457967","display_name":"Guangli Xiang","orcid":"https://orcid.org/0000-0002-6885-6265"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiang Guangli","raw_affiliation_strings":["School of computer science and technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of computer science and technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101745843","display_name":"Chen Yan","orcid":"https://orcid.org/0000-0003-0737-9626"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Yan","raw_affiliation_strings":["School of computer science and technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of computer science and technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008383377","display_name":"Shen Guancheng","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Guancheng","raw_affiliation_strings":["School of computer science and technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of computer science and technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013467482","display_name":"Tian Biao","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Biao","raw_affiliation_strings":["School of computer science and technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of computer science and technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004457967"],"corresponding_institution_ids":["https://openalex.org/I196699116"],"apc_list":null,"apc_paid":null,"fwci":0.3391,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72581392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"48","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9422000050544739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9312999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7500841617584229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6083911657333374},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5107166767120361},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.4906426966190338},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3345434069633484},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32175275683403015},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2810836434364319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14519193768501282},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.08309870958328247}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7500841617584229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6083911657333374},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5107166767120361},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.4906426966190338},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3345434069633484},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32175275683403015},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2810836434364319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14519193768501282},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.08309870958328247},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3374587.3374646","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374587.3374646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1589843374","https://openalex.org/W1798609567","https://openalex.org/W2154496743","https://openalex.org/W2159915142","https://openalex.org/W2165271954","https://openalex.org/W2745606257"],"related_works":["https://openalex.org/W1939781145","https://openalex.org/W4256163854","https://openalex.org/W2383331906","https://openalex.org/W2981554290","https://openalex.org/W4379014147","https://openalex.org/W2467984134","https://openalex.org/W3049552949","https://openalex.org/W3127912646","https://openalex.org/W2539919741","https://openalex.org/W1510433380"],"abstract_inverted_index":{"To":[0],"the":[1,5,19,26,29,34,37,41,45,54,62,75,81,93,104],"ciphertext":[2,8,13,79],"retrieval":[3,15,95],"and":[4,40,91,99,111],"security":[6],"of":[7,28,36,47,66,84],"database,":[9],"we":[10,32,52],"propose":[11],"a":[12],"fuzzy":[14,63],"method":[16,77],"based":[17],"on":[18],"information":[20,38],"matrix":[21,39],"in":[22,44,109],"this":[23],"paper.":[24],"On":[25],"basis":[27],"Bloom":[30],"Filter,":[31],"introduce":[33],"index":[35,48,89],"digital":[42],"disturbance":[43],"process":[46],"generation,":[49],"after":[50],"which":[51],"performe":[53],"string":[55],"conversion":[56],"encryption.":[57],"It":[58],"not":[59],"only":[60],"supports":[61],"search":[64],"function":[65],"strings,":[67],"but":[68],"resists":[69],"similarity":[70],"attacks":[71],"as":[72],"well.":[73],"With":[74],"DFR":[76],"during":[78],"retrieval,":[80],"first":[82],"stage":[83],"filtering":[85],"is":[86,96],"completed":[87],"by":[88],"matching,":[90],"then":[92],"exact":[94],"performed.":[97],"Experiments":[98],"safety":[100],"analysis":[101],"show":[102],"that":[103],"scheme":[105],"has":[106],"more":[107],"advantages":[108],"efficiency":[110],"safety.":[112]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
