supported in part by ZTE Industry-University-Institute Cooperation Funds under Grant No. 202211FKY00112;Open Research Projects of Zhejiang Lab under Grant No. 2022QA0AB02;Natural Science Foundation of Sichuan Province under Grant No. 2022NSFSC0913
As an important branch of federated learning,vertical federated learning(VFL)enables multiple institutions to train on the same user samples,bringing considerable industry benefits.However,VFL needs to exchange user f...
supported in part by the Fundamental Research Funds for Central Universities under Grant No.2022RC006;in part by the National Nat⁃ural Science Foundation of China under Grant Nos.62201029 and 62202051;in part by the BIT Research and Innovation Promoting Project under Grant No.2022YCXZ031;in part by the Shandong Provincial Key Research and Development Program under Grant No.2021CXGC010106;in part by the China Postdoctoral Science Foundation under Grant Nos.2021M700435,2021TQ0042,2021TQ0041,BX20220029 and 2022M710007.
Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accu...
The structure of key-value data is a typical data structure generated by mobile devices.The collection and analysis of the data from mobile devices are critical for service providers to improve service quality.Neverth...
Federated learning(FL) has developed rapidly in recent years as a privacy-preserving machine learning method,and it has been gradually applied to key areas involving privacy and security such as finance,medical care,a...
With the emergence of mobile crowdsensing (MCS), merchants can use their mobiledevices to collect data that customers are interested in. Now there are many mobilecrowdsensing platforms in the market, such as Gigwalk, ...
supported by National Natural Science Foundation of China under grants 61173170 and 60873225;National High Technology Research and Development Program of China under grant 2007AA01Z403;Innovation Fund of Huazhong University of Science and Technology under grants 2013QN120,2012TS052 and 2012TS053
In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and ...
supported by the National Natural Science Foundation of China under Grant No. 60873231;the National Basic Research Program of China ("973"Program) under Grant No. 2011CB302903;the High Education Natural Science Foundation of Jiangsu Province under Grant No. 08KJB520006;Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No. 09A010;Innovation Project for postgraduate cultivation of Jiangsu Province, China under Grant No. CX10B_195Z
Data storage is an important application of cloud computing. With a cloud computing platform, the burden of local data storage can be reduced. However, services and applications in a cloud may come from different prov...