![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
VeriDL: Integrity Verification of Outsourced Deep Learning Services
Deep neural networks (DNNs) are prominent due to their superior performance in many fields. The deep-learning-as-a-service (DLaaS) paradigm enables individuals and organizations (clients) to outsource their DN...
-
Chapter and Conference Paper
An SVM Based Secural Image Steganography Algorithm for IoT
With the fast development of IoT network, there are more and more images generated by sensors and other devices, which increases the transmission expenses. By adopting image steganography, the images can deli...
-
Chapter and Conference Paper
MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT
Software defined network (SDN) can effectively balance link loads and guarantee QoS for different application categories of data streams on Internet of Things (IoT). To achieve high accuracy and low time consu...
-
Chapter and Conference Paper
Efficient Authentication of Approximate Record Matching for Outsourced Databases
Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. A major security concern of the outsourcing paradigm is whether the ...
-
Chapter and Conference Paper
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations
When outsourcing data mining needs to an untrusted service provider in the Data-Mining-as-a-Service (DMaS) paradigm, it is important to verify whether the service provider (server) returns correct mining resul...
-
Chapter and Conference Paper
Result Integrity Verification of Outsourced Frequent Itemset Mining
The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...