Secure k-nearest neighbor query over encrypted data in outsourced environments Y Elmehdwi, BK Samanthula, W Jiang 2014 IEEE 30th International Conference on Data Engineering, 664-675, 2014 | 438 | 2014 |
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data BK Samanthula, Y Elmehdwi, W Jiang IEEE transactions on Knowledge and data engineering 27 (5), 1261-1273, 2014 | 212 | 2014 |
A secure data sharing and query processing framework via federation of cloud computing BK Samanthula, Y Elmehdwi, G Howser, S Madria Information Systems 48, 196-212, 2015 | 92 | 2015 |
An efficient and probabilistic secure bit-decomposition BKK Samanthula, H Chun, W Jiang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 78 | 2013 |
Privacy-preserving and outsourced multi-user k-means clustering FY Rao, BK Samanthula, E Bertino, X Yi, D Liu 2015 IEEE conference on collaboration and internet computing (CIC), 80-89, 2015 | 64 | 2015 |
An efficient and secure data sharing framework using homomorphic encryption in the cloud BK Samanthula, G Howser, Y Elmehdwi, S Madria Proceedings of the 1st International Workshop on Cloud Intelligence, 1-8, 2012 | 62 | 2012 |
Secure multiset intersection cardinality and its application to jaccard coefficient BK Samanthula, W Jiang IEEE Transactions on Dependable and Secure Computing 13 (5), 591-604, 2015 | 50 | 2015 |
Privacy-preserving complex query evaluation over semantically secure encrypted data BK Samanthula, W Jiang, E Bertino Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 38 | 2014 |
N-gram based secure similar document detection W Jiang, BK Samanthula Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 …, 2011 | 38 | 2011 |
Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks. BK Samanthula, L Cen, W Jiang, L Si Trans. Data Priv. 8 (2), 141-171, 2015 | 35 | 2015 |
Interest-driven private friend recommendation BK Samanthula, W Jiang Knowledge and Information Systems 42, 663-687, 2015 | 19 | 2015 |
Efficient privacy-preserving range queries over encrypted data in cloud computing BK Samanthula, W Jiang 2013 IEEE Sixth International Conference on Cloud Computing, 51-58, 2013 | 19 | 2013 |
Privacy-preserving protocols for shortest path discovery over outsourced encrypted graph data BK Samanthula, FY Rao, E Bertino, X Yi 2015 IEEE International Conference on Information Reuse and Integration, 427-434, 2015 | 17 | 2015 |
Secure Similar Document Detection: Optimized Computation Using the Jaccard Coefficient S Forman, BK Samanthula 2018 IEEE 4th International Conference on Big Data Security on Cloud …, 2018 | 15 | 2018 |
A probabilistic encryption based MIN/MAX computation in wireless sensor networks BK Samanthula, W Jiang, S Madria 2013 IEEE 14th International Conference on Mobile Data Management 1, 77-86, 2013 | 15 | 2013 |
A human error based approach to understanding programmer-induced software vulnerabilities V Anu, KZ Sultana, BK Samanthula 2020 IEEE International Symposium on Software Reliability Engineering …, 2020 | 13 | 2020 |
Structural and message based private friend recommendation BK Samanthula, W Jiang 2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012 | 13 | 2012 |
Review of ransomware attacks and a data recovery framework using autopsy digital forensics platform SC Nayak, V Tiwari, BK Samanthula 2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023 | 12 | 2023 |
k-nearest neighbor classification over semantically secure encrypted relational data.” eprint BK Samanthula, Y Elmehdwi, W Jiang arXiv preprint arXiv:1403.5001, 2014 | 12 | 2014 |
Exploring the mathematics of gravity D Basu, N Panorkou, M Zhu, P Lal, BK Samanthula Mathematics Teacher: Learning and Teaching PK-12 113 (1), 39-46, 2020 | 9 | 2020 |