相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors
Xiaojun Zhang et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)
Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage
Yuan Zhang et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
Hongwei Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)
Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence
Meng Hao et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
VerifyNet: Secure and Verifiable Federated Learning
Guowen Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Secure and efficient encrypted keyword search for multi-user setting in cloud computing
Haijiang Wang et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data
Guowen Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Secure Multi-Party Computation: Theory, practice and applications
Chuan Zhao et al.
INFORMATION SCIENCES (2019)
A deep learning framework for unsupervised affine and deformable image registration
Bob D. de Vos et al.
MEDICAL IMAGE ANALYSIS (2019)
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI
Wenbo Jiang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems
Guowen Xu et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities
Guowen Xu et al.
IEEE COMMUNICATIONS MAGAZINE (2019)
Classification of ransomware families with machine learning based on N-gram of opcodes
Hanqi Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
General Theory of security and a study of hacker's behavior in big data era
Yixian Yang et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)
Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification
Xiaoxia Liu et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)
Recent Trends in Deep Learning Based Natural Language Processing
Tom Young et al.
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2018)
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities
Hao Ren et al.
IEEE NETWORK (2018)
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Le Trieu Phong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds
Hongwei Li et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2018)
Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability
Shenmin Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Event-based Vision meets Deep Learning on Steering Prediction for Self-driving Cars
Ana I. Maqueda et al.
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2018)
Efficient end-to-end authentication protocol for wearable health monitoring systems
Qi Jiang et al.
COMPUTERS & ELECTRICAL ENGINEERING (2017)
Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees
Hao Ren et al.
SENSORS (2016)
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
Ulfar Erlingsson et al.
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)
Functional Mechanism: Regression Analysis under Differential Privacy
Jun Zhang et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2012)