![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Practical Single-Round Secure Wildcard Pattern Matching
Secure pattern matching allows a client who holds a substring (pattern) to find all the substring’s locations appearing in the long string (text) stored in a server. Meanwhile, the server should not learn any ...
-
Chapter and Conference Paper
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning
As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...
-
Chapter and Conference Paper
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption
With the rapid development of distributed machine learning and Internet of things, tons of distributed data created by devices are used for model training and what comes along is the concern of security and pr...
-
Chapter and Conference Paper
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis
In many scenarios, people have a demand for deploying the artificial intelligence applications on the edge device of IoT. For some special applications, these embedded devices are always required real-time rep...