supported by the National Key R&D Program of China(Grant No.2021YFB2700200);the National Natural Science Foundation of China(Grant Nos.U21B2021,61972018,and 61932014)。
The massive terminals access the Internet of things(IoT)through edge nodes,bringing forth new security and privacy challenges in ciphertext search and data sharing.Meanwhile,existing ciphertext search schemes often ov...
supported by the Major Scientific and Technological Innovation Projects of Shandong Province(Grant No.2020CXGC010116);the National Natural Science Foundation of China(Grant Nos.62232002,62202051,and 62172042);the National Key R&D Program of China(Grant Nos.2021YFB2700500 and 2021YFB2700503);the China Postdoctoral Science Foundation(Grant Nos.2021M700435 and 2021TQ0042);the Open Project Funding of Key Laboratory of Mobile Application Innovation and Governance Technology,the Ministry of Industry and Information Technology(Grant No.2023IFS080601-K);the Beijing Institute of Technology Research and Innovation Promoting Project(Grant No.2023YCXY010);the Beijing Institute of Technology Research Fund Program for Young Scholars;the Young Elite Scientists Sponsorship Program by CAST(Grant No.2023QNRC001);the Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies(Grant No.2022B1212010005);the Shandong Provincial Key Research and Development Program(Grant No.2021CXGC010106)。
Recently,redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization,traceability,and transparency while ensuring controllable on-chain data reda...
supported by the National Natural Science Foundation of China(61972096,61872090,61771140,61872088).
A growing amount of data containing the sensitive information of users is being collected by emerging smart connected devices to the center server in Internet of things(IoT)era,which raises serious privacy concerns fo...
supported by the National Key R&D Program of China(2021ZD0112803);National Natural Science Foundation of China (62122066, U20A20182, 61872274, 62122095, U19A2067);the Key R&D Program of Zhejiang Province (2022C01018)。
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server,which however might disclose the sensitive informa...
supported by the National Natural Science Foundation of China(No.U1805263,No.61872090);Natural Science Foundation of Fujian Province(No.2019J01274).
The patients'medical image data are one of the most important data in e-health.Medical image data usually play a crucial role in disease diagnosis and implicate unpredictable potential values for improving diagnostic ...
supported by the National Key Research and Development Program of China(No.2016YFB0800402);the National Natural Science Foundation of China(No.U1405254,No.U1536207)
Cloud data confidentiality need to be audited for the data owner's concern. Confidentiality auditing is usually based on logging schemes, whereas cloud data dynamics and sharing group dynamics result in massive logs, ...
supported by the National Natural Science Foundation of China(No.61300216);the Key Technology Research and Development Program of Henan Province(No.132102210123);the Basic and Frontier Technology Research Program of Henan Province(No.132300410332)
To reduce communication overhead on the premise of privacy protection, this study presents a novel secret Confusion based energy-saving and privacypreserving data aggregation algorithm(CESPT). In confusion phase, CESP...
supported by the National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
Due to the popularity of mobile internet and location-aware devices,there is an explosion of location and tra jectory data of moving objects.A few proposals have been proposed for privacy preserving tra jectory data p...
supported by the National Natural Science Foundation of China(No.61272112,No.61472287,No.61300237,No.61402339,No.61572370,No.U1536204);the Science and Technology Support Program of Hubei Province(No.2013BAA004);the Priority Academic Program Development(PAPD) of Jiangsu Higher Education Institutions;the Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology(CICAEET)
The goal of authentication scheme for Vehicular ad hoc networks(VANETs) is to ensure reliability and integrity of message. Due to the timeliness of traffic-related messages and the highly dynamic nature of VANETs, it ...
supported by National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
Recommendation has become increasingly important because of the information overload. Collaborative filtering(CF) technique, as the most popular recommendation method, utilizes the historical preferences of users to p...