Search
Search Results
-
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication
Machine learning enables organizations and individuals to improve efficiency and productivity. With an abundance of data and computational resources,... -
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse
In the context of the evolving Data LakeHouse distributed architecture and the inescapable challenges posed by DM-Crypt, a verifiable dynamic... -
Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision
Artificial inspection of surface defects in chip inductors faces issues such as low efficiency and poor accuracy. To enhance production efficiency,... -
Multi-channel Deep Q-network Carrier Sense Multiple Access
With the continuous development of network communication and the application of many specific scenarios, the dynamics of network traffic continues to... -
Adversarial Attacks Against Object Detection in Remote Sensing Images
With the continuous development of artificial intelligence technology and the increasing richness of remote sensing data, deep convolutional neural... -
Secure Position-Aware Graph Neural Networks for Session-Based Recommendation
Session-based recommendation, a specific type of recommendation system, leverages users’ interaction sequences to provide recommendations.... -
A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing
Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control.... -
Design of a Fast Recognition Method for College Students’ Classroom Expression Images Based on Deep Learning
The expressions of students in class will directly reflect their classroom state. Therefore, this paper proposes a fast recognition method for... -
An Image Copyright Authentication Model Based on Blockchain and Digital Watermark
To solve the problems of digital image leakage and tampering as well as the low imperceptibility of watermarking algorithms in the traditional... -
Secured Digital Watermarking Using Neural Networks
Neural network has evolved as a technological breakthrough that has the potential to solve hard computational complexity. In the recent past, the... -
Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions
With the rapid growth of edge devices such as smartphones, wearables, and mobile networks, how to effectively utilize a large amount of private data... -
Securing 5G Positioning via Zero Trust Architecture
5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning... -
Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm
SM9 is an identity-based cryptographic algorithm based on elliptic curves, which has high security and low management costs. However, its... -
A Survey of Privacy Preserving Subgraph Matching Methods
Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are... -
Verifiable Secure Aggregation Protocol Under Federated Learning
Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple... -
Application of Lattice-Based Unique Ring Signature in Blockchain Transactions
Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the... -
Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility
As phishing threats intensify, incidents like the “COVID-19 vaccination form” phishing website underscore the limitations of relying solely on... -
Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection
Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding network security and data integrity. Nevertheless, the challenge of... -
A Graph-Based Vertical Federation Broad Learning System
A broad learning system is a lightweight deep neural network with breadth expansion, which is widely used in face recognition, error detection, and... -
EPoLORE: Efficient and Privacy Preserved Logistic Regression Scheme
Logistic regression, as one of the classification method, is widely used in machine learning. Due to the complexity of training process, outsourcing...