Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    CryptoMask: Privacy-Preserving Face Recognition

    Face recognition is a widely-used technique for identification or verification, where a verifier checks whether a face image matches anyone stored in a database. However, in scenarios where the database is hel...

    Jianli Bai, **aowu Zhang, **angfu Song in Information and Communications Security (2023)

  2. No Access

    Article

    Secure auditing and deduplication for encrypted cloud data supporting ownership modification

    Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the d...

    Jianli Bai, Jia Yu, **ang Gao in Soft Computing (2020)

  3. No Access

    Article

    Comment on “Privacy-preserving public auditing for non-manager group shared data”

    Using cloud storage, users can remotely store their data without the burden on complicated local storage management and maintenance. However, users will no longer physically possess the storage of their data a...

    Jianli Bai, Rong Hao in The Journal of Supercomputing (2020)