Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Revocable certificateless Provable Data Possession with identity privacy in cloud storage
AbstractProvable Data Possession (PDP) has gained widespread adoption for ensuring the integrity of data in remote cloud storage, where a data owner can delegate a third party auditor (TPA) to perform data auditing. To eliminate key escrow problem or ...
Highlights- Addressing practical functionality and security property for data auditing in cloud storage.
- A revocable certificateless PDP scheme with user identity privacy.
- Providing formal construction and security proofs.
- An online-...
- research-articleAugust 2024
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds
Journal of Information Security and Applications (JISA), Volume 83, Issue Chttps://doi.org/10.1016/j.jisa.2024.103783AbstractE-Health Cloud can provide remote, accurate, real-time, intelligent information services for healthcare. Despite the benefits brought by data outsourcing, it may also cause data breaches and compromise user privacy. Searchable encryption can ...
- research-articleApril 2024
Behavior-Driven Planning of Electric Truck Charging Infrastructure for Intercity Operations
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 9Pages 12049–12065https://doi.org/10.1109/TITS.2024.3375458Truck stop behavior plays a critical role in supporting powertrain electrification, which is key to reducing emissions in road freight. However, it is still unclear whether these stops meet the charging needs for electric trucks during intercity trips. ...
- research-articleJanuary 2024
Efficient multi-party private set intersection protocols for large participants and small sets
AbstractPrivate set intersection (PSI) has attracted the researchers and the developers both from academia and industry in cooperating the private data to achieve privacy preserving. Traditional PSI protocols allow the two participants with ...
Highlights- This paper proposes two MP-PSI protocols used for small set settings and proven secure resisting multiple participants collusion.
- research-articleJune 2024
Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices
AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network SecurityPages 283–290https://doi.org/10.1145/3661638.3661692In the IoT environment, a large amount of sensitive data are transmitted and processed by IoT devices, such as personal identity, location data and health data. To protect these sensitive data from leakage, multi-party private set operation (MPSO) has ...
-
- research-articleAugust 2023
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 141, Issue Chttps://doi.org/10.1016/j.sysarc.2023.102913AbstractMulti-copy data possession on multi-cloud storage service provides resource-constrained users with a secure and effective way to process data maintenance. To enable integrity for the outsourced data, numerous multi-copy data auditing schemes for ...
- research-articleJanuary 2023
DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security
Backdoor attacks have been recognized as a major AI security threat in deep neural networks (DNNs) recently. The attackers inject backdoors into DNNs during the model training such as federated learning. The infected model behaves normally on the clean ...
- ArticleOctober 2022
Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting
AbstractMulti-party private set intersection (MP-PSI) allows m participants with private sets to calculate their intersection without revealing any information, which is quite different from the traditional two-party PSI. Although some efficient MP-PSI ...
- research-articleJanuary 2022
DeepGuard: Backdoor Attack Detection and Identification Schemes in Privacy-Preserving Deep Neural Networks
Deep neural networks (DNNs) have profoundly changed our lifeways in recent years. The cost of training a complicated DNN model is always overwhelming for most users with limited computation and storage resources. Consequently, an increasing number of ...
- ArticleDecember 2021
Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-Based Microgrid Energy Trading
Algorithms and Architectures for Parallel ProcessingPages 19–34https://doi.org/10.1007/978-3-030-95391-1_2AbstractMicrogrid is a promising system for coordinating distributed energy in the future Energy Internet, where energy market is crucial for facilitating multi-directional trading. Nevertheless, the traditional solutions for energy trading usually rely ...
- research-articleOctober 2021
MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks
ACM TURC '21: Proceedings of the ACM Turing Award Celebration Conference - ChinaPages 104–109https://doi.org/10.1145/3472634.3472660Deep Neural Networks (DNNs) are vulnerable to backdoor attacks where the adversary can inject malicious data during the DNN training. Such kind of attacks is always activated when the input is stamped with a pre-specified trigger which results in a pre-...
- research-articleJanuary 2018
A Secure Data Forwarding Protocol for Data Statistic Services in Multi-Hop Marine Sensor Networks*
Fundamenta Informaticae (FUNI), Volume 157, Issue 1-2Pages 63–78https://doi.org/10.3233/FI-2018-1618Homomorphic encryption always allows the linear arithmetic operations performed over the ciphertext and then returns equaling results as if the operations are taken over the original plaintext, which is always used for data aggregation in wireless sensor ...
- research-articleJanuary 2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing
Outsourcing computation with verifiability is a merging notion in cloud computing, which enables lightweight clients to outsource costly computation tasks to the cloud and efficiently check the correctness of the result in the end. This advanced ...
- articleDecember 2016
Adaptive pixel unmixing based on a fuzzy ARTMAP neural network with selective endmembers
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 20, Issue 12Pages 4723–4732https://doi.org/10.1007/s00500-015-1700-yPixel unmixing is essential for the reliable description of many land-cover patterns with low spatial resolution. The fuzzy ARTMAP neural network-based model has been proven effective for pixel unmixing in the literature. In most cases, the forms of the ...
- articleNovember 2016
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
Security and Communication Networks (SACN), Volume 9, Issue 16Pages 3777–3789https://doi.org/10.1002/sec.1490Because the technology of mobile cloud computing has brought several benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storage limitation, data owners would like ...
- research-articleJune 2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
IEEE Transactions on Information Forensics and Security (TIFS), Volume 10, Issue 6Pages 1274–1288https://doi.org/10.1109/TIFS.2015.2405905Ciphertext-policy attribute-based encryption (CP-ABE) enables fine-grained access control to the encrypted data for commercial applications. There has been significant progress in CP-ABE over the recent years because of two properties called traceability ...
- ArticleSeptember 2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
AbstractA Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system extracts the decryption keys over attributes shared by multiple users. It brings plenty of advantages in ABE applications. CP-ABE enables fine-grained access control to the encrypted ...
- articleFebruary 2014
Security and privacy for storage and computation in cloud computing
Information Sciences: an International Journal (ISCI), Volume 258Pages 371–386https://doi.org/10.1016/j.ins.2013.04.028Cloud computing emerges as a new computing paradigm that aims to provide reliable, customized and quality of service guaranteed computation environments for cloud users. Applications and databases are moved to the large centralized data centers, called ...
- articleJanuary 2014
A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption
Security and Communication Networks (SACN), Volume 7, Issue 1Pages 14–32https://doi.org/10.1002/sec.720Wireless mesh networks are promising means of providing network coverage to areas where infrastructure is difficult to install. However, little work has been done on leveraging security and transmission overheads among multicast members in a multihop ...
- ArticleJuly 2011
MobiID: a user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks
ADHOC-NOW'11: Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networksPages 177–190Delay/Disruption tolerant networks (DTNs) are wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that the nodes are willing to store-carry-and-forward bundles in an opportunistic way. ...