Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleJuly 2024
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems
Expert Systems with Applications: An International Journal (EXWA), Volume 250, Issue CSep 2024https://doi.org/10.1016/j.eswa.2024.123761AbstractAdversarial attacks can mislead deep learning models to make false predictions by implanting small perturbations to the original input that are imperceptible to the human eye, which poses a huge security threat to computer vision systems based on ...
- ArticleJuly 2024
- ArticleDecember 2023
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation
Pattern Recognition and Computer VisionOct 2023, Pages 478–491https://doi.org/10.1007/978-981-99-8435-0_38AbstractLane detection is one of the fundamental technologies for autonomous driving, but it faces many security threats from adversarial attacks. Existing adversarial attacks against lane detection often simplify it as a certain type of computer vision ...
- research-articleAugust 2023
Task-Driven ADDIE-Twist Model With a Teach-Study Double-Helix Structure
- Liqi Lai,
- Luyao Wang,
- Rui Huang,
- Zoe Lin Jiang,
- Junbo Huang,
- Wenyue Shi,
- Bin Zhou,
- Renzhang Chen,
- Bin Lei,
- Junbin Fang
IEEE Transactions on Education (ITE), Volume 67, Issue 1Feb. 2024, Pages 1–10https://doi.org/10.1109/TE.2023.3296975Contribution: This article proposes a task-driven ADDIE-Twist design model with a double-helix structure, which introduces intelligent teaching tools and lightweight collaboration platforms to design a knowledge-sharing and group collaboration model with ...
- research-articleJuly 2023
Privacy-Preserving Distributed Machine Learning Made Faster
SecTL '23: Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems WorkshopJuly 2023, Article No.: 2, Pages 1–14https://doi.org/10.1145/3591197.3591306With the development of machine learning, it is difficult for a single server to process all the data. So machine learning tasks need to be spread across multiple servers, turning the centralized machine learning into a distributed one. Multi-key ...
-
- research-articleJuly 2023
Multi-authority anonymous authentication with public accountability for incentive-based applications
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 231, Issue CJul 2023https://doi.org/10.1016/j.comnet.2023.109828AbstractIncentive-based applications enable users to obtain rewards after they complete a task, but how to balance the privacy and accountability is one of the most serious concerns currently. Publicly accountable anonymous authentication ...
- ArticleDecember 2020
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System
AbstractIn recent years, physical adversarial attacks have been placed an increasing emphasis. However, previous studies usually use a printer to physically realize adversarial perturbations, and such an attack scheme will meet inevitable disadvantages of ...
- research-articleNovember 2020
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation
Quantum Information Processing (JQIP), Volume 19, Issue 11Nov 2020https://doi.org/10.1007/s11128-020-02896-yAbstractBased on the fundamental uncertainty of quantum mechanics, quantum random number generators can generate truly random number which is critically important for many applications, such as information security. However, while the generation rate of ...
- ArticleOctober 2020
A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks
Web Information Systems Engineering – WISE 2020Oct 2020, Pages 227–239https://doi.org/10.1007/978-3-030-62008-0_16AbstractWe proposed a graph anonymization method which is based on a feature learning model of Generative Adversarial Network (GAN). We used the differential privacy to ensure the privacy and take both anonymity and utility into consideration. The method ...
- research-articleOctober 2020
Coarse-to-fine two-stage semantic video carving approach in digital forensics
AbstractVideo (e.g. CCTV) plays a crucial role in digital forensics. Existing video carving methods either assume the existence of file system information or resort to the impractical exhaustive matching for all pairs of fragments. In this ...
- research-articleMay 2020
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
Information Sciences: an International Journal (ISCI), Volume 518, Issue CMay 2020, Pages 168–180https://doi.org/10.1016/j.ins.2019.12.051AbstractNowadays, cloud computing has developed well and been applied in many kinds of areas. However, privacy is still the most challenging problem which obstructs it being applied in some privacy-sensitive fields, such as finance and ...
- ArticleDecember 2019
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique
AbstractDomain name system is an important infrastructure of the Internet, which is responsible for mapping domain name to IP address. However, it is facing serious security threats due to its distributed structure with a center. Blockchain has received ...
- research-articleDecember 2019
Efficient quantum key distribution protocol based on classical–quantum polarized channels
Quantum Information Processing (JQIP), Volume 18, Issue 12Dec 2019, Pages 1–24https://doi.org/10.1007/s11128-019-2423-2AbstractTo improve the efficiency of QKD systems, a new QKD protocol based on classical–quantum polarized channels is proposed in this article. By precoding the raw key with polar codes before communication, this protocol has higher code rate and lower ...
- research-articleJanuary 2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing
Wireless Communications & Mobile Computing (WCMC), Volume 20182018https://doi.org/10.1155/2018/2385150With the wide application of Internet of Things (IoT), a huge number of data are collected from IoT networks and are required to be processed, such as data mining. Although it is popular to outsource storage and computation to cloud, it may invade ...
- articleOctober 2017
Cost-effective privacy-preserving vehicular urban sensing system
Personal and Ubiquitous Computing (PUC), Volume 21, Issue 5Pages 893–901https://doi.org/10.1007/s00779-017-1046-9Vehicular urban sensor network is a new network paradigm for sensing data collection in urban environment. An on-board unit (OBU) is required to transfer data collected from sensors to the back-end server through various wireless networks, such as DSRC/...
- articleDecember 2016
Quantum homomorphic signature based on Bell-state measurement
Quantum Information Processing (JQIP), Volume 15, Issue 12December 2016, Pages 5051–5061https://doi.org/10.1007/s11128-016-1440-7In this paper, a novel quantum homomorphic signature scheme based solely on Bell-state measurement is proposed. It allows an aggregator to merge two signature nodes' signatures of their classical messages into one signature, which is an effective ...
- research-articleSeptember 2016
Exposing frame deletion by detecting abrupt changes in video streams
Neurocomputing (NEUROC), Volume 205, Issue CSeptember 2016, Pages 84–91https://doi.org/10.1016/j.neucom.2016.03.051Many existing methods for frame deletion detection attempt to detect abnormal periodical artifacts in video stream, however, due to a number of reasons, the periodical artifacts can not always be reliably detected. In this paper, we propose a new method ...
- research-articleAugust 2016
Recovery of heavily fragmented JPEG files
Digital Investigation: The International Journal of Digital Forensics & Incident Response (DIGITI), Volume 18, Issue SAugust 2016, Pages S108–S117https://doi.org/10.1016/j.diin.2016.04.016File carving from damaged file system plays an important role in file recovery for identifying evidence in digital forensics. In this paper, we focus on JPEG file carving, with an emphasis on heavily fragmented cases. The difficulty lies on how to order ...
- ArticleJuly 2016
Improved related-key Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Proceedings, Part II, of the 21st Australasian Conference on Information Security and Privacy - Volume 9723July 2016, Pages 333–346https://doi.org/10.1007/978-3-319-40367-0_21The boomerang attack is one of the many extensions of the original differential attack. It has been widely applied to successfully attack many existing ciphers. In this paper, we investigate an extended version of the boomerang attack and show that it is ...
- ArticleJuly 2016
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids
Proceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy - Volume 9722July 2016, Pages 40–56https://doi.org/10.1007/978-3-319-40253-6_3It is well-known that critical infrastructures would be targets for cyber attacks. In this paper, we focus on smart grids. In a smart grid system, information from smart meters would be used to perform a state estimation in real time in order to ...