Inspiring new research in the field of signal processing in the encrypted domain, IEEE Signal Processing Magazine, vol.30, issue.2, 2013. ,
Performance of statistical tests for single-source detection using random matrix theory. Information Theory, IEEE Transactions on, vol.57, issue.4, pp.2400-2419, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00421980
Secure binary embeddings for privacy preserving nearest neighbors, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011. ,
DOI : 10.1109/WIFS.2011.6123149
Similarity estimation techniques from rounding algorithms, Proceedings of the thiry-fourth annual ACM symposium on Theory of computing , STOC '02, pp.380-388, 2002. ,
DOI : 10.1145/509907.509965
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.1930
Locality-sensitive hashing scheme based on p-stable distributions, Proceedings of the twentieth annual symposium on Computational geometry , SCG '04, pp.253-262, 2004. ,
DOI : 10.1145/997817.997857
Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces, Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR '08, pp.123-130, 2008. ,
DOI : 10.1145/1390334.1390358
One-Way Private Media Search on Public Databases: The Role of Signal Processing, IEEE Signal Processing Magazine, vol.30, issue.2, pp.53-61, 2013. ,
DOI : 10.1109/MSP.2012.2229783
Approximate nearest neighbors, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.604-613, 1998. ,
DOI : 10.1145/276698.276876
Product Quantization for Nearest Neighbor Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.33, issue.1, pp.117-128, 2011. ,
DOI : 10.1109/TPAMI.2010.57
Secure and efficient approximate nearest neighbors search, Proceedings of the first ACM workshop on Information hiding and multimedia security, IH&MMSec '13, pp.175-180, 2013. ,
DOI : 10.1145/2482513.2482539
URL : https://hal.archives-ouvertes.fr/hal-00817336
Fully private noninteractive face verification. Information Forensics and Security, IEEE Transactions on, vol.8, issue.7, pp.1101-1114, 2013. ,
Improved Subspace Estimation for Multivariate Observations of High Dimension: The Deterministic Signals Case, IEEE Transactions on Information Theory, vol.58, issue.2, pp.1043-1068, 2012. ,
DOI : 10.1109/TIT.2011.2173718
URL : https://hal.archives-ouvertes.fr/hal-00692662