Login / Signup
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory.
Gaoli Wang
Zhenfu Cao
Xiaolei Dong
Published in:
Comput. J. (2021)
Keyphrases
</>
set theory
injection attacks
fuzzy set theory
partial order
first order logic
fuzzy sets
rough sets
database
mathematical morphology
recommender systems
pattern recognition
rough set theory
description logics
binary images
bayesian networks
image processing
knowledge base
artificial intelligence