Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model

    The exponential growth and widespread of fake news in online media have been causing unprecedented threats to the election result, public hygiene and justice. With ever-growing contents in online media, scruti...

    Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam in Digital Forensics and Cyber Crime (2024)

  2. No Access

    Chapter and Conference Paper

    SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE

    In recent years, distributed machine learning has garnered significant attention. However, privacy continues to be an unresolved issue within this field. Multi-key homomorphic encryption over torus (MKTFHE) is...

    Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu in Mobile Internet Security (2024)

  3. No Access

    Chapter and Conference Paper

    Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

    Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...

    Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao in Information Security and Cryptology (2024)

  4. No Access

    Chapter and Conference Paper

    Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation

    Lane detection is one of the fundamental technologies for autonomous driving, but it faces many security threats from adversarial attacks. Existing adversarial attacks against lane detection often simplify it ...

    Junbin Fang, Zewei Yang, Siyuan Dai, You Jiang in Pattern Recognition and Computer Vision (2024)

  5. No Access

    Chapter and Conference Paper

    A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions

    A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in applications to digital rights management) and in authenticat...

    Yanmin Zhao, Yang Wang, Siu Ming Yiu, Yu Liu, Meiqin Wang in Security and Trust Management (2023)

  6. No Access

    Chapter and Conference Paper

    Detecting Anomalous Programmable Logic Controller Events Using Process Mining

    Programmable logic controllers that monitor and control industrial processes are attractive targets for cyber attackers. Although techniques and tools have been developed for detecting anomalous programmable l...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Critical Infrastructure Protection XV (2022)

  7. No Access

    Chapter and Conference Paper

    Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES

    We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as on...

    Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang in Selected Areas in Cryptography (2022)

  8. No Access

    Chapter and Conference Paper

    Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability

    Time-lock puzzle schemes allow one to encrypt messages for the future. More concretely, one can efficiently generate a time-lock puzzle for a secret/solution s, such that s remains hidden until a specified time T

    Yi Liu, Qi Wang, Siu-Ming Yiu in Computer Security – ESORICS 2022 (2022)

  9. Article

    Editorial: Security and Privacy in Computing and Communications

    Zheli Liu, ** Li, Ilsun You, Siu-Ming Yiu in Mobile Networks and Applications (2021)

  10. No Access

    Article

    ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM

    Most of users hesitate to use third-party web applications because of security and privacy concerns. An ideal solution would be to allow apps to work with encrypted data, so that users might be more willing to...

    **aojie Guo, Yanyu Huang, **hui Ye, Sijie Yin, Min Li in Mobile Networks and Applications (2021)

  11. No Access

    Chapter and Conference Paper

    Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys

    With the popularity of cloud computing, data owners encrypt their data with different keys before uploading data to the cloud due to privacy concerns. Homomorphic encryption makes it possible to calculate on e...

    Jun Zhang, Zoe L. Jiang, ** Li, Siu Ming Yiu in Smart Computing and Communication (2021)

  12. No Access

    Chapter and Conference Paper

    Forced Independent Optimized Implementation of 4-Bit S-Box

    Searching the optimal circuit implementation of a Boolean function is still an open problem. This work proposes a new optimizing scheme, which could find circuit expressions with optimal gate equivalent comple...

    Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu in Information Security and Privacy (2021)

  13. No Access

    Chapter and Conference Paper

    A Secure and Self-tallying E-voting System Based on Blockchain

    E-voting has been studied for many years. Recently, researchers find that blockchain can provide an alternative secure platform for e-voting systems, because of its properties of tamper resistance and transpar...

    Gongxian Zeng, Meiqi He, Siu Ming Yiu in Information Security Applications (2020)

  14. No Access

    Chapter and Conference Paper

    Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model

    We propose a leakage-resilient inner-product functional encryption scheme (IPFE) in the bounded-retrieval model (BRM). This is the first leakage-resilient functional encryption scheme in the BRM. In our leakag...

    Linru Zhang, **angning Wang, Yuechen Chen in Information and Communications Security (2020)

  15. No Access

    Chapter

    A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning

    Federated learning (FL) has great potential for coalescing isolated data islands. It enables privacy-preserving collaborative model training and addresses security and privacy concerns. Besides booming technol...

    Mingshu Cong, Han Yu, ** Weng, Siu Ming Yiu in Federated Learning (2020)

  16. Chapter and Conference Paper

    An Incident Response Model for Industrial Control System Forensics Based on Historical Events

    Cyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, indus...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Critical Infrastructure Protection XIII (2019)

  17. Chapter and Conference Paper

    A Forensic Logging System for Siemens Programmable Logic Controllers

    Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XIV (2018)

  18. Chapter and Conference Paper

    Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

    Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...

    Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau in Advances in Digital Forensics XIV (2018)

  19. Chapter and Conference Paper

    Privacy-Preserving Disease Risk Test Based on Bloom Filters

    Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses s...

    Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu in Information and Communications Security (2018)

  20. No Access

    Chapter and Conference Paper

    Relevant Fact Selection for QA via Sequence Labeling

    Question answering (QA) is a very important, but not yet completely resolved problem in artificial intelligence. Solving the QA problem consists of two major steps: relevant fact selection and answering the qu...

    Yuzhi Liang, Jia Zhu, Yupeng Li, Min Yang in Knowledge Science, Engineering and Managem… (2017)

previous disabled Page of 2