Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Privacy-preserving multi-party logistic regression in cloud computing
AbstractIn recent years, machine learning techniques have been widely deployed in various fields. However, machine learning faces problems like high computation overhead, low training accuracy, and poor security due to data silos, privacy issues and ...
Highlights- We propose a PPMLR scheme that supports authentication.
- Our scheme is fault tolerant and does not need the data owner to interact with the cloud server.
- Our scheme is enabled to create highly accurate models because it does not ...
- research-articleMarch 2024
Privacy-preserving federated learning based on partial low-quality data
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00618-8AbstractTraditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated learning provides a method to protect participants’ data privacy by ...
- research-articleMay 2024
Blockchain-based Secure Key Distribution for WSNs in Soil Monitoring
ICBCT '23: Proceedings of the 2023 5th International Conference on Blockchain TechnologyPages 29–35https://doi.org/10.1145/3638025.3638033With the rapid development of society and economy, soil issues have been emphasized. As the front-end of data collection, sensor networks are used in various soil monitoring applications. However, current wireless sensor networks face the difficulty of ...
- ArticleApril 2023
IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability
AbstractThe majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are many security problems in real world ...
- research-articleMarch 2023
Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data
Journal of Information Security and Applications (JISA), Volume 73, Issue Chttps://doi.org/10.1016/j.jisa.2023.103441AbstractThe Internet of Things (IoT) devices with restricted storage and computing sources are unable to store and handle massive data at local. A promising method is to engage some cloud server for maintaining outsourced encrypted IoT data and ...
-
- research-articleMarch 2023
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
AbstractSmart Health, with its flexibility and efficiency, has been widely deployed, especially during the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not yet well established and still present a number of security ...
Highlights- We propose a CP-ABE scheme (PHCA) that supports policy-hiding and cloud auditing.
- Our scheme ensures data integrity and privacy.
- Our scheme is proven secure under dual-system encryption technique.
- research-articleDecember 2022
Privacy‐preserving blockchain‐based contract signing with multi‐party supervision
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 4https://doi.org/10.1002/ett.4710AbstractWith the advancement of information technology, electronic contracts are gradually replacing paper contracts. Blockchain can serve as a decentralized trusted third party to help signatories solve the fairness of electronic contract signing. ...
We propose a privacy‐preserving blockchain‐based contract signing system with multi‐party supervision, in which multiple supervisors are set up to supervise contracts by voting. Before supervision, a multi‐receiver re‐encryption algorithm is used to ...
- research-articleJanuary 2022
Public Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud-Assisted IoT in Dual Server Model
In cloud computing, the outsourced data face many privacy and security threats. To allow the cloud server to perform comparison, search, and classification on outsourced ciphertexts while simultaneously providing privacy guarantee, the encryption method ...
- ArticleDecember 2021
An Anti-forensic Method Based on RS Coding and Distributed Storage
Algorithms and Architectures for Parallel ProcessingPages 240–254https://doi.org/10.1007/978-3-030-95388-1_16AbstractThe anti-forensics (AF) technology has become a new field of cybercrime. The problems of existing forensic technologies should be considered from criminals’ perspective, so as to make improvement to existing AF technologies. There are two types of ...
- research-articleAugust 2021
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model
Mobile Networks and Applications (MNET), Volume 26, Issue 4Pages 1514–1522https://doi.org/10.1007/s11036-019-01487-1AbstractNowadays, the spread of Internet rumors and viruses has caused great hidden dangers to the safety of human life. It is particularly important to identify the source of network threat, especially when there are multiple sources in the network. At ...
- research-articleNovember 2021
Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing
Biometric based remote authentication has been widely deployed. However, there exist security and privacy issues to be addressed since biometric data includes sensitive information. To alleviate these concerns, we design a privacy-preserving fingerprint ...
- research-articleJanuary 2021
A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks
In unmanned aerial vehicle networks (UAVNs), unmanned aerial vehicles with restricted computing and communication capabilities can perform tasks in collaborative manner. However, communications in UAVN confront many security issues, for example, malicious ...
- research-articleJanuary 2021
A Privacy-Preserving Blockchain Supervision Framework in the Multiparty Setting
Data supervision is an effective method to ensure the legality of user data on blockchain. However, the massive growth of data makes it difficult to achieve data supervision in existing blockchain applications. Also, data supervision often leads to ...
- articleMarch 2019
A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 23, Issue 5Pages 1735–1744https://doi.org/10.1007/s00500-017-2896-9We study the hardness of learning with errors (LWE) problem with some equation constraints ($$\hbox {LWE}_{n,l,q,\chi }$$LWEn,l,q,?, some-are-errorless LWE). Previously, it was proved that LWE with one equation (first-is-errorless LWE) can be made as ...
- articleDecember 2018
Ciphertext retrieval via attribute-based FHE in cloud computing
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 22, Issue 23Pages 7753–7761https://doi.org/10.1007/s00500-018-3404-6In order to ensure the security of users' information effectively, this paper investigates ciphertext-based attribute encryption. Homomorphic encryption can settle the problems of data privacy in cloud environments, in the way that can be operated ...
- ArticleJanuary 2015
Research on Marine Incinerator Operational Training System based on 3dsmax and Unity3D
In this paper, the interactive marine incinerator operation training system is developed based on 3dsmax and Unity3D technology. The development process of Unity3D and its key technology such as virtual reality, visual C# and IE real-time interaction ...
- ArticleMarch 2010
Engineering an Emergency Search and Rescue Application with Wireless Sensor Network and Mobile Robot
ICMTMA '10: Proceedings of the 2010 International Conference on Measuring Technology and Mechatronics Automation - Volume 02Pages 112–115https://doi.org/10.1109/ICMTMA.2010.227CAESRS (Chemical Accident Emergency Search and Rescue System) was developed for the use of monitoring the leakage of hazardous chemicals and guaranteeing the safety of people in hazardous areas. Technologies such as WSN (Wireless Sensor Network) and ...
- ArticleMarch 2010
Design and implementation of an emergency search and rescue system based on mobile robot and WSN
In order to monitor the leakage of hazardous chemicals and guarantee the safety of people in hazardous areas, we developed RESRS (Robot Emergency Search and Rescue System). RESRS integrated technologies such as mobile robot and WSN (Wireless Sensor ...
- ArticleOctober 2009
A New Association Rules Mining Algorithm Based on Vector
WGEC '09: Proceedings of the 2009 Third International Conference on Genetic and Evolutionary ComputingPages 429–432https://doi.org/10.1109/WGEC.2009.64As a classical algorithm of association rules mining, Apriori algorithm has two bottlenecks: the large number of candidate itemsets and the poor efficiency of counting support. A new association rules mining algorithm based on vector is proposed, which ...
- ArticleOctober 2009
Analysis and Modification on Existing Objective Weighting Methods in MADM
WGEC '09: Proceedings of the 2009 Third International Conference on Genetic and Evolutionary ComputingPages 162–165https://doi.org/10.1109/WGEC.2009.35In this paper, we firstly introduce and analyze the problems in existing objective weighting methods in MADM. Then we propose some ideas of solutions for those questions. Finally, we give a feasible solution for determining of weights, and verify its ...