Information and Communications Security
25th International Conference, ICICS 2023, Tian**, China, November 18–20, 2023, Proceedings
Chapter and Conference Paper
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If the...
Chapter and Conference Paper
Book and Conference Proceedings
25th International Conference, ICICS 2023, Tian**, China, November 18–20, 2023, Proceedings
Chapter and Conference Paper
GGM tree is widely used in the design of correlated oblivious transfer (COT), subfield vector oblivious linear evaluation (sVOLE), distributed point function (DPF), and distributed comparison function (DCF). O...
Chapter
Considering the internal representations in machine learning models may potentially imply some of training data, an adversary may launch attacks to extract parts of training data from a trained model (e.g., th...
Chapter
In the previous chapters, we have introduced solutions of protecting privacy against eavesdroppers in machine learning tasks. In this chapter, we will describe attack techniques of other three types of adversa...
Chapter
In the following chapters, we introduce the fusion of machine learning, image processing and security as an emerging paradigm to protect the privacy of clients and classifier. If the model of machine learning ...
Chapter
So far, the privacy-preserving machine learning has been a fruitful and long-standing research topic in both academic community and industry. With the development of cloud computing and the increasing concern ...
Chapter
Normally, we have many ways to explain machine learning. Before giving the definition, we would like to illustrate why we need machine learning. To give a solution of a computational problem, such as sorting, ...
Chapter
During machine learning tasks, the trainers could suffer some bottlenecks on resources of computation, communication, and storage. With the rapid development of Internet services, cloud computing provide a sol...
Chapter
Artificial Neural Networks (ANN) has been motivated right from its inception by the recognition that the human brain, which is a highly complex, non-linear, and parallel-computing, works in an entirely different ...
Chapter
Like the common setting of cooperative learning, each participant securely maintains a private dataset on its local device. All participants want to jointly train a global machine learning model on the union o...
Article
Data are one of the most important sources of power that drives the world today. However, aggregating data is not an easy task with increasing legal regulations and concerns from users about their data privacy...
Article
Article
Symmetric searchable encryption (SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, howeve...
Book and Conference Proceedings
Second EAI International Conference, SPNCE 2019, Tian**, China, April 13–14, 2019, Proceedings
Chapter and Conference Paper
The transparent property of the blockchain guarantees the immutability of the data on the chain, but it can lead to violations of data privacy protection. On the other hand, absolute anonymity will make it dif...
Article
Distributed denial of service (DDoS) attack has been a huge challenge of network security for many years. The bandwidth, services and resources are seriously occupied by the attackers during the attack. It is ...
Book and Conference Proceedings
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
Chapter and Conference Paper
The traditional data masking systems cannot provide reversible operations for database, and they will destroy the referential integrity of database. To solve the problems above, we provide a new data masking s...