-
Chapter and Conference Paper
Automatic EPS Calculation Guided Genetic Algorithm and Incremental PCA Based DBSCAN of Extracted Acoustic Features for Anomalous Sound Detection
This paper focuses on automatic detection of anomalies in audio files. We introduce an automated unsupervised algorithm which integrates AEC-guided Genetic Algorithm and Incremental PCA and DBSCAN to detect th...
-
Chapter and Conference Paper
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model
The exponential growth and widespread of fake news in online media have been causing unprecedented threats to the election result, public hygiene and justice. With ever-growing contents in online media, scruti...
-
Chapter and Conference Paper
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption
Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...
-
Chapter and Conference Paper
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE
In recent years, distributed machine learning has garnered significant attention. However, privacy continues to be an unresolved issue within this field. Multi-key homomorphic encryption over torus (MKTFHE) is...
-
Chapter and Conference Paper
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...
-
Chapter and Conference Paper
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice
Vector commitments (VC) and their variants attract a lot of attention due to their wide range of usage in applications such as blockchain and accumulator. Mercurial vector commitment (MVC), as one of the impor...
-
Chapter and Conference Paper
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation
Lane detection is one of the fundamental technologies for autonomous driving, but it faces many security threats from adversarial attacks. Existing adversarial attacks against lane detection often simplify it ...
-
Chapter and Conference Paper
MTGL-ADMET: A Novel Multi-task Graph Learning Framework for ADMET Prediction Enhanced by Status-Theory and Maximum Flow
It is a vital step to evaluate drug-like compounds in terms of absorption, distribution, metabolism, excretion, and toxicity (ADMET) in drug design. Classical single-task learning based on abundant labels has ...
-
Chapter and Conference Paper
Asymmetric Group Message Franking: Definitions and Constructions
As online group communication scenarios become more and more common these years, malicious or unpleasant messages are much easier to spread on the internet. Message franking is a crucial cryptographic mechanis...
-
Chapter and Conference Paper
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions
A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in applications to digital rights management) and in authenticat...
-
Chapter and Conference Paper
Detecting Anomalous Programmable Logic Controller Events Using Process Mining
Programmable logic controllers that monitor and control industrial processes are attractive targets for cyber attackers. Although techniques and tools have been developed for detecting anomalous programmable l...
-
Chapter and Conference Paper
Analyzing the Error Rates of Bitcoin Clustering Heuristics
Bitcoin is a decentralized peer-to-peer cryptocurrency. Bitcoin’s strong cryptography ensures anonymity that makes it possible to profit from crimes such as ransomware attacks and money laundering. Unfortunate...
-
Chapter and Conference Paper
Making Private Function Evaluation Safer, Faster, and Simpler
In the problem of two-party private function evaluation (PFE), one party \(\mathsf {P}_{\mathsf {A}}\) ...
-
Chapter and Conference Paper
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as on...
-
Chapter and Conference Paper
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
Time-lock puzzle schemes allow one to encrypt messages for the future. More concretely, one can efficiently generate a time-lock puzzle for a secret/solution s, such that s remains hidden until a specified time T
-
Chapter and Conference Paper
Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys
With the popularity of cloud computing, data owners encrypt their data with different keys before uploading data to the cloud due to privacy concerns. Homomorphic encryption makes it possible to calculate on e...
-
Chapter and Conference Paper
Blind Polynomial Evaluation and Data Trading
Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers. In many scenarios, sellers prefer to sell pieces of data, such as ...
-
Chapter and Conference Paper
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks
There are two popular location-based service (LBS) applications: searching k-nearest neighbor Points of Interests (kNN POIs) and finding Nearby Friends (NF) via a social network server (SNS). Nevertheless, bot...
-
Chapter and Conference Paper
An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster
A cryptographic primitive, called encryption switching protocol (ESP), has been proposed recently. This two-party protocol enables interactively converting values encrypted under one scheme into another scheme...
-
Chapter and Conference Paper
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Extended permutation (EP) is a generalized notion of the standard permutation. Unlike the one-to-one correspondence map** of the standard permutation, EP allows to replicate or omit elements as many times as...