The following publications are possibly variants of this publication:
- Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud EnvironmentsXian Guo, Ye Li, Yongbo Jiang, Jing Wang, Junli Fang. cryptography, 7(4):59, September 2023. [doi]
- Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environmentsWei Wu 0015, Udaya Parampalli, Jian Liu, Ming-xian. www, 22(1):101-123, 2019. [doi]
- k nearest neighbor classification across multiple private databasesLi Xiong, Subramanyam Chitti, Ling Liu. CIKM 2006: 840-841 [doi]
- DLSH: a distribution-aware LSH scheme for approximate nearest neighbor query in cloud computingYuanyuan Sun, Yu Hua, Xue Liu, Shunde Cao, Pengfei Zuo. CLOUD 2017: 242-255 [doi]
- Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud EnvironmentsHong Rong, Huimei Wang, Jian Liu, Ming-xian. access, 4:9589-9603, 2016. [doi]