Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
3
views
49
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,659
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2023 : 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing
other
Author(s):
Shang Song
,
Lin Liu
,
Rongmao Chen
,
Wei Peng
,
Yi Wang
Publication date
(Online):
January 12 2024
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Sex and gender-sensitive medicine
Most cited references
49
Record
: found
Abstract
: not found
Article
: not found
Least squares quantization in PCM
S. Lloyd
(1982)
0
comments
Cited
775
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Approximate nearest neighbors
Piotr Indyk
,
Rajeev Motwani
(1998)
0
comments
Cited
282
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2024
Publication date (Online):
January 12 2024
Pages
: 411-430
DOI:
10.1007/978-3-031-51479-1_21
SO-VID:
58be2591-4456-4c3c-bf48-c2f6ab720cca
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Layered Symbolic Security Analysis in \(\textsf {DY}^\star \)
pp. 22
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
pp. 43
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
pp. 62
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
pp. 80
Reviving Meltdown 3a
pp. 100
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks
pp. 120
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
pp. 141
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
pp. 162
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations
pp. 183
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
pp. 203
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis
pp. 222
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
pp. 243
Everlasting ROBOT: The Marvin Attack
pp. 263
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications
pp. 285
When is Slower Block Propagation More Profitable for Large Miners?
pp. 306
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
pp. 327
Syntax-Aware Mutation for Testing the Solidity Compiler
pp. 348
Efficient Transparent Polynomial Commitments for zk-SNARKs
pp. 367
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi
pp. 389
stoRNA: Stateless Transparent Proofs of Storage-time
pp. 411
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing
pp. 431
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
pp. 452
Tactics for Account Access Graphs
pp. 471
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame
Similar content
2,659
K-nearest neighbor based on exploratory data analysis of curriculum models of Chinese early childhood education
Authors:
Hai Liu
,
Sirong He
,
Jiang Peng
Nearest-Neighbor Analysis of a Family of Fractal Distributions
Authors:
Colleen Cutler
,
Donald A. Dawson
EPR Determination of the Nearest-Neighbor Exchange Constant for Mn2+ Pairs in KZnF3
Authors:
Shelly J. Krebs
,
Christopher J. Krebs
,
James Krebs
…
See all similar