Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs.
Evgenios M. KornaropoulosPetros EfstathopoulosPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- similarity measure
- distance measure
- similarity metrics
- euclidean distance
- closed form
- semantic similarity
- structural similarity
- security requirements
- distance metric
- lightweight
- user defined
- information retrieval
- similarity scores
- high dimensional
- standard model
- cryptographic protocols
- authentication scheme
- data encryption