4.5 Article

Adaptive privacy-preserving federated learning

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors

Xiaojun Zhang et al.

Summary: The proposed conditional identity privacy-preserving public auditing (CIPPPA) mechanism aims to address the issue of traditional public auditing mechanisms failing to achieve conditional identity privacy for patients in cloud-based WBANs. By integrating Ethereum blockchain to assist patients in validating malicious auditing behaviors, reliable medical data management and security are achieved.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage

Yuan Zhang et al.

Summary: This paper presents a secure PEKS scheme called SEPSE, which can defend against keyword guessing attacks by allowing users to encrypt keywords with dedicated key servers and supporting key renewal. Furthermore, SEPSE can resist online KGA through a public blockchain, enabling key servers to learn the number of keyword requests made by users.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

Hongwei Li et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)

Article Automation & Control Systems

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence

Meng Hao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

VerifyNet: Secure and Verifiable Federated Learning

Guowen Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Secure and efficient encrypted keyword search for multi-user setting in cloud computing

Haijiang Wang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)

Article Computer Science, Theory & Methods

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data

Guowen Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Secure Multi-Party Computation: Theory, practice and applications

Chuan Zhao et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Artificial Intelligence

A deep learning framework for unsupervised affine and deformable image registration

Bob D. de Vos et al.

MEDICAL IMAGE ANALYSIS (2019)

Article Computer Science, Theory & Methods

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI

Wenbo Jiang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Engineering, Electrical & Electronic

Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems

Guowen Xu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities

Guowen Xu et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Theory & Methods

Classification of ransomware families with machine learning based on N-gram of opcodes

Hanqi Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

General Theory of security and a study of hacker's behavior in big data era

Yixian Yang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification

Xiaoxia Liu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Review Computer Science, Artificial Intelligence

Recent Trends in Deep Learning Based Natural Language Processing

Tom Young et al.

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2018)

Article Computer Science, Hardware & Architecture

Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities

Hao Ren et al.

IEEE NETWORK (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds

Hongwei Li et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2018)

Article Computer Science, Information Systems

Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability

Shenmin Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Event-based Vision meets Deep Learning on Steering Prediction for Self-driving Cars

Ana I. Maqueda et al.

2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2018)

Article Computer Science, Hardware & Architecture

Efficient end-to-end authentication protocol for wearable health monitoring systems

Qi Jiang et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Proceedings Paper Computer Science, Theory & Methods

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response

Ulfar Erlingsson et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)

Article Computer Science, Information Systems

Functional Mechanism: Regression Analysis under Differential Privacy

Jun Zhang et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2012)