Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Practical Single-Round Secure Wildcard Pattern Matching

    Secure pattern matching allows a client who holds a substring (pattern) to find all the substring’s locations appearing in the long string (text) stored in a server. Meanwhile, the server should not learn any ...

    Jun Xu, Shengnan Zhao, Chuan Zhao in ICT Systems Security and Privacy Protection (2024)

  2. No Access

    Chapter and Conference Paper

    Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning

    As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...

    Zhen **a, Zhenfu Cao, Jiachen Shen in Information Security Practice and Experien… (2023)

  3. No Access

    Chapter and Conference Paper

    Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption

    With the rapid development of distributed machine learning and Internet of things, tons of distributed data created by devices are used for model training and what comes along is the concern of security and pr...

    Fengyuan Qiu, Hao Yang, Lu Zhou, Chuan Ma in Wireless Algorithms, Systems, and Applicat… (2022)

  4. No Access

    Chapter and Conference Paper

    Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis

    In many scenarios, people have a demand for deploying the artificial intelligence applications on the edge device of IoT. For some special applications, these embedded devices are always required real-time rep...

    Sihan He, Weibin Wu, Yanbin Li, Lu Zhou in Wireless Algorithms, Systems, and Applicat… (2022)