2024
An efficient computer-aided diagnosis model for classifying melanoma cancer using fuzzy-ID3-pvalue decision tree algorithm.
Multim. Tools Appl., September, 2024
APCSMA: Adaptive Personalized Client-Selection and Model-Aggregation Algorithm for Federated Learning in Edge Computing Scenarios.
Entropy, August, 2024
RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain.
IEEE Trans. Netw. Sci. Eng., 2024
Privacy-Preserving Recommendation Based on a Shuffled Federated Graph Neural Network.
IEEE Internet Comput., 2024
CAPPAD: a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation.
Appl. Intell., 2024
2023
Exploring a Mesh-Hub-Based Wireless Sensor Network for Smart Home Electrical Monitoring.
Wirel. Pers. Commun., December, 2023
Listening to Users' Voice: Automatic Summarization of Helpful App Reviews.
IEEE Trans. Reliab., December, 2023
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network.
Multim. Tools Appl., September, 2023
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
Cryptogr., September, 2023
Deep learning: Applications, architectures, models, tools, and frameworks: A comprehensive survey.
,
,
,
,
,
,
,
,
,
,
CAAI Trans. Intell. Technol., September, 2023
A blockchain-based privacy-preserving advertising attribution architecture: Requirements, design, and a prototype implementation.
Softw. Pract. Exp., August, 2023
A novel buffering fault-tolerance approach for network on chip (NoC).
IET Circuits Devices Syst., July, 2023
Automatic IoT device identification: a deep learning based approach using graphic traffic characteristics.
Telecommun. Syst., June, 2023
Evolutionary Multilabel Adversarial Examples: An Effective Black-Box Attack.
IEEE Trans. Artif. Intell., June, 2023
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction.
J. Inf. Secur. Appl., June, 2023
An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing.
Expert Syst. J. Knowl. Eng., June, 2023
A near-optimal & load balanced resilient system design for high-performance computing platform.
Clust. Comput., April, 2023
Recent trends towards privacy-preservation in Internet of Things, its challenges and future directions.
IET Circuits Devices Syst., March, 2023
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.
Comput. J., March, 2023
ShrewdAttack: Low Cost High Accuracy Model Extraction.
Entropy, February, 2023
SLGNN: synthetic lethality prediction in human cancers based on factor-aware knowledge graph neural network.
Bioinform., February, 2023
Dynamic Contrastive Distillation for Image-Text Retrieval.
IEEE Trans. Multim., 2023
Adversarial ELF Malware Detection Method Using Model Interpretation.
IEEE Trans. Ind. Informatics, 2023
PSPGO: Cross-Species Heterogeneous Network Propagation for Protein Function Prediction.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023
Kdb-D2CFR: Solving Multiplayer imperfect-information games with knowledge distillation-based DeepCFR.
Knowl. Based Syst., 2023
PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things.
J. Ambient Intell. Humaniz. Comput., 2023
User-Centric Federated Matrix Factorization Based on Differential Privacy.
IEEE Internet Comput., 2023
2022
Collaborative Detection of Community Structure in Multiple Private Networks.
IEEE Trans. Comput. Soc. Syst., 2022
Simulation Method for Blockchain Systems with a Public Chain.
Sensors, 2022
3D face recognition algorithm based on nose tip contour and radial curve.
Multim. Tools Appl., 2022
An IoT and machine learning-based routing protocol for reconfigurable engineering application.
IET Commun., 2022
Robust Unlearnable Examples: Protecting Data Against Adversarial Learning.
CoRR, 2022
Adversarial malware sample generation method based on the prototype of deep learning detector.
Comput. Secur., 2022
An efficient cluster head selection for wireless sensor network-based smart agriculture systems.
Comput. Electron. Agric., 2022
Robust Unlearnable Examples: Protecting Data Privacy Against Adversarial Learning.
Proceedings of the Tenth International Conference on Learning Representations, 2022
CFDMA: A Novel Click Fraud Detection Method in Mobile Advertising.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
A Robust Watermarking Method For Image Processing Models.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
A Lightweight Advertisement Ecosystem Simulation Platform for Security Analysis.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
A Blockchain-based Electricity Retail Contracts Management System.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022
2021
An Evolutionary Study of IoT Malware.
,
,
,
,
,
,
,
,
,
,
,
IEEE Internet Things J., 2021
Providing Cache Consistency Guarantee for ICN-Based IoT Based on Push Mechanism.
IEEE Commun. Lett., 2021
RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything.
IEEE Consumer Electron. Mag., 2021
Detecting Android Malware Based on Dynamic Feature Sequence and Attention Mechanism.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
A Blockchain-based Privacy-Preserving Recommendation Mechanism.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
FedSP: Federated Speaker Verification with Personal Privacy Preservation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
HFL-DP: Hierarchical Federated Learning with Differential Privacy.
Proceedings of the IEEE Global Communications Conference, 2021
FedDeepFM: Ad CTR prediction based on Federated Factorization Machine.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
2020
Solving imperfect-information games via exponential counterfactual regret minimization.
CoRR, 2020
Delta-DNN: Efficiently Compressing Deep Neural Networks via Exploiting Floats Similarity.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020
A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
PRTransE: Emphasize More Important Facts Based on Pagerank for Knowledge Graph Completion.
Proceedings of the Cognitive Computing - ICCC 2020, 2020
2019
Solving Six-Player Games via Online Situation Estimation.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Structural-Based Graph Publishing Under Differential Privacy.
Proceedings of the Cognitive Computing - ICCC 2019, 2019
On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018
2017
Privacy-preserving targeted advertising for mobile devices.
PhD thesis, 2017
AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices.
Comput. J., 2017
2016
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation.
Softw. Pract. Exp., 2016
Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis.
Proceedings of the Data Privacy Management and Security Assurance, 2016