Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm

    As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If the...

    Zhiwei Chang, Hanfeng Zhang, Yue Yang in Artificial Intelligence Security and Priva… (2024)

  2. Chapter and Conference Paper

    Correction to: Half-Tree: Halving the Cost of Tree Expansion in COT and DPF

    **aojie Guo, Kang Yang, **ao Wang, Wenhao Zhang in Advances in Cryptology – EUROCRYPT 2023 (2023)

  3. No Access

    Book and Conference Proceedings

    Information and Communications Security

    25th International Conference, ICICS 2023, Tian**, China, November 18–20, 2023, Proceedings

    Ding Wang, Moti Yung, Zheli Liu in Lecture Notes in Computer Science (2023)

  4. No Access

    Chapter and Conference Paper

    Half-Tree: Halving the Cost of Tree Expansion in COT and DPF

    GGM tree is widely used in the design of correlated oblivious transfer (COT), subfield vector oblivious linear evaluation (sVOLE), distributed point function (DPF), and distributed comparison function (DCF). O...

    **aojie Guo, Kang Yang, **ao Wang, Wenhao Zhang in Advances in Cryptology – EUROCRYPT 2023 (2023)

  5. No Access

    Chapter

    Learning with Differential Privacy

    Considering the internal representations in machine learning models may potentially imply some of training data, an adversary may launch attacks to extract parts of training data from a trained model (e.g., th...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  6. No Access

    Chapter

    Threats in Open Environment

    In the previous chapters, we have introduced solutions of protecting privacy against eavesdroppers in machine learning tasks. In this chapter, we will describe attack techniques of other three types of adversa...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  7. No Access

    Chapter

    Applications—Privacy-Preserving Image Processing

    In the following chapters, we introduce the fusion of machine learning, image processing and security as an emerging paradigm to protect the privacy of clients and classifier. If the model of machine learning ...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  8. No Access

    Chapter

    Conclusion

    So far, the privacy-preserving machine learning has been a fruitful and long-standing research topic in both academic community and industry. With the development of cloud computing and the increasing concern ...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  9. No Access

    Chapter

    Introduction

    Normally, we have many ways to explain machine learning. Before giving the definition, we would like to illustrate why we need machine learning. To give a solution of a computational problem, such as sorting, ...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  10. No Access

    Chapter

    Outsourced Computation for Learning

    During machine learning tasks, the trainers could suffer some bottlenecks on resources of computation, communication, and storage. With the rapid development of Internet services, cloud computing provide a sol...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  11. No Access

    Chapter

    Secure Cooperative Learning in Early Years

    Artificial Neural Networks (ANN) has been motivated right from its inception by the recognition that the human brain, which is a highly complex, non-linear, and parallel-computing, works in an entirely different ...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  12. No Access

    Chapter

    Secure Distributed Learning

    Like the common setting of cooperative learning, each participant securely maintains a private dataset on its local device. All participants want to jointly train a global machine learning model on the union o...

    ** Li, ** Li, Zheli Liu, **aofeng Chen, Tong Li in Privacy-Preserving Machine Learning (2022)

  13. No Access

    Article

    Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy

    Data are one of the most important sources of power that drives the world today. However, aggregating data is not an easy task with increasing legal regulations and concerns from users about their data privacy...

    **aojie Guo, ** Li, Zheli Liu, Yu Wei, **ao Zhang in Science China Information Sciences (2021)

  14. Article

    Editorial: Security and Privacy in Computing and Communications

    Zheli Liu, ** Li, Ilsun You, Siu-Ming Yiu in Mobile Networks and Applications (2021)

  15. No Access

    Article

    Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX

    Symmetric searchable encryption (SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, howeve...

    Yanyu Huang, Siyi Lv, Zheli Liu, **angfu Song, ** Li in Science China Information Sciences (2021)

  16. No Access

    Book and Conference Proceedings

  17. No Access

    Chapter and Conference Paper

    CROSS: Supervised Sharing of Private Data over Blockchains

    The transparent property of the blockchain guarantees the immutability of the data on the chain, but it can lead to violations of data privacy protection. On the other hand, absolute anonymity will make it dif...

    Mingxin Yin, Jiqiang Gao, **aojie Guo in Security and Privacy in New Computing Envi… (2019)

  18. No Access

    Article

    An efficient DDoS detection based on SU-Genetic feature selection

    Distributed denial of service (DDoS) attack has been a huge challenge of network security for many years. The bandwidth, services and resources are seriously occupied by the attackers during the attack. It is ...

    Chundong Wang, Honglei Yao, Zheli Liu in Cluster Computing (2019)

  19. No Access

    Book and Conference Proceedings

    Cloud Computing, Security, Privacy in New Computing Environments

    7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

    Jiafu Wan, Kai Lin, Delu Zeng, ** Li in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2018)

  20. No Access

    Chapter and Conference Paper

    DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption

    The traditional data masking systems cannot provide reversible operations for database, and they will destroy the referential integrity of database. To solve the problems above, we provide a new data masking s...

    Mingming Zhang, Guiyang **e, Shimeng Wei in Cloud Computing, Security, Privacy in New … (2018)

previous disabled Page of 2