Chunhua Su

Orcid: 0000-0002-6461-9684

According to our database1, Chunhua Su authored at least 184 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024

FIND: Privacy-Enhanced Federated Learning for Intelligent Fake News Detection.
IEEE Trans. Comput. Soc. Syst., August, 2024

DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain.
IEEE Trans. Comput. Soc. Syst., April, 2024

Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024

Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVs.
IEEE Internet Things J., March, 2024

ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024

A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption.
IEEE Trans. Consumer Electron., February, 2024

Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles.
IEEE Internet Things J., February, 2024

PCIDS: Permission and Credibility-Based Intrusion Detection System in IoT Gateways.
IEEE Internet Things J., January, 2024

LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving.
IEEE Trans. Inf. Forensics Secur., 2024

Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing.
IEEE Trans. Emerg. Top. Comput., 2024

A review and implementation of physical layer channel key generation in the Internet of Things.
J. Inf. Secur. Appl., 2024

Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping.
Comput. Secur., 2024

AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

The Framework of General Channel Key Generation Based on Physical Layer.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

MEMS Design Process Based Simulation and Analysis of a Hypothetical Sensor Design with Electromechanics Interface.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Design and Analysis of Piezoelectric Energy Harvester for Wireless Sensor Networks.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

2023
A coordinates-based hierarchical computing framework towards spatial data processing.
Comput. Commun., November, 2023

Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System.
IEEE Trans. Comput. Soc. Syst., August, 2023

A Trusted Reputation Management Scheme for Cross-Chain Transactions.
Sensors, July, 2023

RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023

Smart contract token-based privacy-preserving access control system for industrial Internet of Things.
Digit. Commun. Networks, April, 2023

Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction.
IEEE Consumer Electron. Mag., March, 2023

China's agricultural machinery operation big data system.
Comput. Electron. Agric., February, 2023

Blockchain-Based Personalized Federated Learning for Internet of Medical Things.
IEEE Trans. Sustain. Comput., 2023

Correction to: Loss-based differentiation strategy for privacy preserving of social robots.
J. Supercomput., 2023

Loss-based differentiation strategy for privacy preserving of social robots.
J. Supercomput., 2023

Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust".
Symmetry, 2023

A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems.
IEEE Internet Things J., 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning.
Proceedings of the Network and System Security - 17th International Conference, 2023

Privacy-stealing Approach in Distributed IoMT Systems.
Proceedings of the 16th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

BrokerFi: A DeFi dApp Built upon Broker-based Blockchain.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Instant and Secure Channel Key Extraction Scheme Among Wireless Devices.
Proceedings of the IEEE Global Communications Conference, 2023

2022
CNN- and GAN-based classification of malicious code families: A code visualization approach.
Int. J. Intell. Syst., December, 2022

Efficient Encrypted Data Search With Expressive Queries and Flexible Update.
IEEE Trans. Serv. Comput., 2022

DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint.
IEEE Trans. Intell. Transp. Syst., 2022

On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022

Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications.
IEEE Trans. Ind. Informatics, 2022

BSIF: Blockchain-Based Secure, Interactive, and Fair Mobile Crowdsensing.
IEEE J. Sel. Areas Commun., 2022

A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

A Privacy-Preserving Data Feed Scheme for Smart Contracts.
IEICE Trans. Inf. Syst., 2022

Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems.
IEICE Trans. Inf. Syst., 2022

Layer-Based Communication-Efficient Federated Learning with Privacy Preservation.
IEICE Trans. Inf. Syst., 2022

BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022

Fusion of Blockchain, IoT and Artificial Intelligence - A Survey.
IEICE Trans. Inf. Syst., 2022

FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Secure Collaboration Between Consortiums in Permissioned Blockchains.
Proceedings of the Provable and Practical Security, 2022

Privacy-preserving Blockchain-based Global Data Sharing for Federated Learning with Non-IID Data.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint.
Proceedings of the IEEE International Conference on Communications, 2022

WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy.
Proceedings of the IEEE International Conference on Communications, 2022

Decentralized Federated Learning for Internet of Things Anomaly Detection.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Poster: Key Generation Scheme Based on Physical Layer.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.
IEEE Trans. Netw. Sci. Eng., 2021

ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021

Secure and efficient mutual authentication protocol for smart grid under blockchain.
Peer-to-Peer Netw. Appl., 2021

A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021

An improving sparse coding algorithm for wireless passive target positioning.
Phys. Commun., 2021

Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment.
IEEE Internet Things J., 2021

A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021

Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021

IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021

COFEL: Communication-Efficient and Optimized Federated Learning with Local Differential Privacy.
Proceedings of the ICC 2021, 2021

Systematic Research on Technology and Challenges of Lightning Network.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Indoor device-free passive localization with DCNN for location-based services.
J. Supercomput., 2020

You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Leakage-resilient biometric-based remote user authentication with fuzzy extractors.
Theor. Comput. Sci., 2020

Design and application of a personal credit information sharing platform based on consortium blockchain.
J. Inf. Secur. Appl., 2020

A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things.
J. Inf. Secur. Appl., 2020

A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020

Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020

A MQTT-API-compatible IoT security-enhanced platform.
Int. J. Sens. Networks, 2020

Special issue on security and privacy of blockchain technologies.
Int. J. Inf. Sec., 2020

A Novel Structure-Based Data Sharing Scheme in Cloud Computing.
IEICE Trans. Inf. Syst., 2020

A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks.
IEICE Trans. Inf. Syst., 2020

Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication.
IEICE Trans. Inf. Syst., 2020

New Pseudo-Random Number Generator for EPC Gen2.
IEICE Trans. Inf. Syst., 2020

Am I eclipsed? A smart detector of eclipse attacks for Ethereum.
Comput. Secur., 2020

GADM: Manual fake review detection for O2O commercial platforms.
Comput. Secur., 2020

BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs.
IEEE Commun. Mag., 2020

A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes.
Sci. China Inf. Sci., 2020

BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid.
Proceedings of the 19th IEEE International Conference on Trust, 2020

CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst., 2019

Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019

Intrusion Detection Based on Device-Free Localization in the Era of IoT.
Symmetry, 2019

Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring.
Symmetry, 2019

Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
Sensors, 2019

AI-Driven Cyber Security Analytics and Privacy Protection.
Secur. Commun. Networks, 2019

A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries.
J. Univers. Comput. Sci., 2019

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario.
KSII Trans. Internet Inf. Syst., 2019

Game theoretic security of quantum bit commitment.
Inf. Sci., 2019

Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019

Automatic fine-grained access control in SCADA by machine learning.
Future Gener. Comput. Syst., 2019

Lightweight IoT-based authentication scheme in cloud computing circumstance.
Future Gener. Comput. Syst., 2019

Polynomial-based modifiable blockchain structure for removing fraud transactions.
Future Gener. Comput. Syst., 2019

Security analysis and new models on the intelligent symmetric key encryption.
Comput. Secur., 2019

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access, 2019

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019

An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.
Proceedings of the Network and System Security - 13th International Conference, 2019

Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.
Proceedings of the Network and System Security - 13th International Conference, 2019

Device-Free Localization via Sparse Coding with Log-Regularizer.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Hierarchical MQTT with Edge Computation.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019

A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid.
Proceedings of the Computational Science/Intelligence and Applied Informatics, 2019

Secure and Efficient MQTT Group Communication Design.
Proceedings of the Computational Science/Intelligence and Applied Informatics, 2019

CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Authentication with What You See and Remember in the Internet of Things.
Symmetry, 2018

Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018

OTP-IoT: An ownership transfer protocol for the Internet of Things.
J. Inf. Secur. Appl., 2018

Towards practical white-box lightweight block cipher implementations for IoTs.
Future Gener. Comput. Syst., 2018

Stag hunt and trust emergence in social networks.
Future Gener. Comput. Syst., 2018

Special Issue on Advanced Persistent Threat.
Future Gener. Comput. Syst., 2018

I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics.
IEEE Commun. Mag., 2018

A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository.
IEEE Access, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018

A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices.
IEEE Access, 2018

A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things.
IEEE Access, 2018

CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Secur. Appl., 2017

Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data.
Int. J. Found. Comput. Sci., 2017

A simple authentication encryption scheme.
Concurr. Comput. Pract. Exp., 2017

Variable message encryption through blockcipher compression function.
Concurr. Comput. Pract. Exp., 2017

Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.
Proceedings of the Provable Security, 2017

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017

Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A simple construction of encryption for a tiny domain message.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
A Matrix Based ORAM: Design, Implementation and Experimental Analysis.
IEICE Trans. Inf. Syst., 2016

Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurr. Comput. Pract. Exp., 2016

Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Proceedings of the Information Security Practice and Experience, 2016

Security and experimental performance analysis of a matrix ORAM.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Transparent authentication scheme with adaptive biometrie features for IoT networks.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space.
Proceedings of the Applications and Techniques in Information Security, 2016

Secure and Traceable Framework for Data Circulation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

An Efficient Construction of a Compression Function for Cryptographic Hash.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

A Blockcipher Based Authentication Encryption.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
An improved preimage attack against HAVAL-3.
Inf. Process. Lett., 2015

M-ORAM: A Matrix ORAM with Log N Bandwidth Cost.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A New Statistical Approach for Integral Attack.
Proceedings of the Network and System Security - 9th International Conference, 2015

Analysis of Path ORAM toward Practical Utilization.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Improved Differential Characteristic Searching Methods.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Collaborative agglomerative document clustering with limited information disclosure.
Secur. Commun. Networks, 2014

Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptol. ePrint Arch., 2014

A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Proceedings of the Provable Security - 8th International Conference, 2014

Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014

Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.
Proceedings of the Information Security Practice and Experience, 2014

2012
A Survey on Privacy Frameworks for RFID Authentication.
IEICE Trans. Inf. Syst., 2012

Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
p-Moment exponential robust stability of grey neutral stochastic delay systems.
Grey Syst. Theory Appl., 2011

2010
Two robust remote user authentication protocols using smart cards.
J. Syst. Softw., 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Importance of Data Standardization in Privacy-Preserving K-Means Clustering.
Proceedings of the Database Systems for Advanced Applications, 2009

2008
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...