{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:26:15Z","timestamp":1740104775869,"version":"3.37.3"},"reference-count":45,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902199","61872197","61972209"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1002\/int.22989","type":"journal-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T07:20:46Z","timestamp":1660893646000},"page":"9213-9244","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Accuracy\u2010first and efficiency\u2010first privacy\u2010preserving semantic\u2010aware ranked searches in the cloud"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7888-2419","authenticated-orcid":false,"given":"Qian","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Modern Posts Nanjing University of Posts and Telecommunications Nanjing China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2465-8977","authenticated-orcid":false,"given":"Hua","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China"},{"name":"Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Univeristy of Posts and Telecomunucations Nanjing China"}]},{"given":"Zheng","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China"}]},{"given":"Yuanlong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China"}]},{"given":"Geng","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China"},{"name":"Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Univeristy of Posts and Telecomunucations Nanjing China"}]}],"member":"311","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"e_1_2_13_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"e_1_2_13_3_1","first-page":"216","article-title":"Secure indexes","volume":"2003","author":"Goh EJ","year":"2003","journal-title":"IACR Cryptol\u00a0ePrint Arch"},{"key":"e_1_2_13_4_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"e_1_2_13_5_1","doi-asserted-by":"crossref","unstructured":"KamaraS PapamanthouC RoederT. Dynamic Searchable Symmetric Encryption. ACM; 2012:965.","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_2_13_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"e_1_2_13_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"e_1_2_13_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"e_1_2_13_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.010"},{"key":"e_1_2_13_10_1","doi-asserted-by":"crossref","unstructured":"CaoN WangC LiM RenK LouW.Privacy\u2010preserving multi\u2010keyword ranked search over encrypted cloud data. In:\u00a0IEEE INFOCOM 2011;2011:829\u2010837.doi:10.1109\/INFCOM.2011.5935306","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"e_1_2_13_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"e_1_2_13_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_2_13_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2425407"},{"key":"e_1_2_13_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1404279"},{"issue":"1","key":"e_1_2_13_15_1","first-page":"102902","article-title":"Dynamic secure multi\u2010keyword ranked search over encrypted cloud data","volume":"61","author":"Hozhabr M","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"e_1_2_13_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1753175"},{"key":"e_1_2_13_17_1","doi-asserted-by":"crossref","unstructured":"HuaJ LiuY ChenH TianX JinC.Geometric range search on encrypted data with forward\/backward security.World Wide Web.2020;23:2185\u20102214.","DOI":"10.1007\/s11280-019-00774-x"},{"key":"e_1_2_13_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_2_13_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"e_1_2_13_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.36"},{"key":"e_1_2_13_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7158059"},{"key":"e_1_2_13_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3045467"},{"key":"e_1_2_13_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524606"},{"key":"e_1_2_13_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"e_1_2_13_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"e_1_2_13_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0147"},{"key":"e_1_2_13_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866031"},{"key":"e_1_2_13_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_35"},{"key":"e_1_2_13_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.74"},{"key":"e_1_2_13_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"e_1_2_13_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2823718"},{"key":"e_1_2_13_32_1","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"Blei DM","year":"2003","journal-title":"J Mach Learn Res"},{"key":"e_1_2_13_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"e_1_2_13_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"},{"key":"e_1_2_13_35_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-014-0008-2"},{"key":"e_1_2_13_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.6780939"},{"key":"e_1_2_13_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692728"},{"key":"e_1_2_13_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819121"},{"key":"e_1_2_13_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102442"},{"key":"e_1_2_13_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001728"},{"key":"e_1_2_13_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2847318"},{"key":"e_1_2_13_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(82)90024-2"},{"key":"e_1_2_13_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816656"},{"key":"e_1_2_13_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2982389"},{"key":"e_1_2_13_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50048-7"},{"key":"e_1_2_13_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91253-0_57"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22989","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22989","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:32:49Z","timestamp":1675956769000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22989"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,19]]},"references-count":45,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["10.1002\/int.22989"],"URL":"https:\/\/doi.org\/10.1002\/int.22989","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"type":"print","value":"0884-8173"},{"type":"electronic","value":"1098-111X"}],"subject":[],"published":{"date-parts":[[2022,8,19]]},"assertion":[{"value":"2022-06-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}