Search
Search Results
-
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication
Machine learning enables organizations and individuals to improve efficiency and productivity. With an abundance of data and computational resources,... -
Securing 5G Positioning via Zero Trust Architecture
5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning... -
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse
In the context of the evolving Data LakeHouse distributed architecture and the inescapable challenges posed by DM-Crypt, a verifiable dynamic... -
Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm
SM9 is an identity-based cryptographic algorithm based on elliptic curves, which has high security and low management costs. However, its... -
A Survey of Privacy Preserving Subgraph Matching Methods
Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are... -
Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision
Artificial inspection of surface defects in chip inductors faces issues such as low efficiency and poor accuracy. To enhance production efficiency,... -
Multi-channel Deep Q-network Carrier Sense Multiple Access
With the continuous development of network communication and the application of many specific scenarios, the dynamics of network traffic continues to... -
Verifiable Secure Aggregation Protocol Under Federated Learning
Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple... -
Adversarial Attacks Against Object Detection in Remote Sensing Images
With the continuous development of artificial intelligence technology and the increasing richness of remote sensing data, deep convolutional neural... -
Team Management
In this chapter, we’ll take a look at how to manage an offensive cybersecurity service. I am not trying to teach all the concepts of project... -
Engagement Security
Engagement security is an often overlooked aspect of managing an offensive cybersecurity team. We are focused on evaluating the security of other... -
Reporting
An assessment is only as good as its report. The report is your final opportunity to communicate the value that your team produced for the client.... -
Operational Management
The execution of offensive cybersecurity projects requires a coordinated team, communication with the client, and a properly prepared project. Each... -
The Wedge
Your team has conducted a world-class assessment. They communicated with the client throughout the whole process, so the client is thoroughly aware... -
Application of Lattice-Based Unique Ring Signature in Blockchain Transactions
Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the... -
Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility
As phishing threats intensify, incidents like the “COVID-19 vaccination form” phishing website underscore the limitations of relying solely on... -
A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing
Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control.... -
An Image Copyright Authentication Model Based on Blockchain and Digital Watermark
To solve the problems of digital image leakage and tampering as well as the low imperceptibility of watermarking algorithms in the traditional... -
Member Inference Attacks in Federated Contrastive Learning
In the past, the research community has studied privacy issues in federated learning, self-supervised learning, and deep models. However, privacy... -
Digital Watermarking: Pathway to Secure!
The progression in information technology has led to some thoughtful anxieties about the piracy and exclusive rights of digital content. The...