funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544);Hubei Provincial Department of Education Project(No.Q20232206);Project of Hubei University of Economics(No.T201410).
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i...
Project supported by the Natural Science Foundation of Hubei Province(Grant No.2024AFD068).
In recent years,the phenomenon of multistability has attracted wide attention.In this paper,a memristive chaotic system with extreme multistability is constructed by using a memristor.The dynamic behavior of the syste...
the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da...
supported by Natural Science Foundation of China(Nos.62303126,62362008,author Z.Z,https://www.nsfc.gov.cn/,accessed on 20 December 2024);Major Scientific and Technological Special Project of Guizhou Province([2024]014);Guizhou Provincial Science and Technology Projects(No.ZK[2022]General149) ,author Z.Z,https://kjt.guizhou.gov.cn/,accessed on 20 December 2024);The Open Project of the Key Laboratory of Computing Power Network and Information Security,Ministry of Education under Grant 2023ZD037,author Z.Z,https://www.gzu.edu.cn/,accessed on 20 December 2024);Open Research Project of the State Key Laboratory of Industrial Control Technology,Zhejiang University,China(No.ICT2024B25),author Z.Z,https://www.gzu.edu.cn/,accessed on 20 December 2024).
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model training.However,dishonest clouds may infer user data,resulting in user data leakage.P...
supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
National Key Research and Development Program of China(2021YFB3101402);National Natural Science Foundation of China(62202294)。
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth...
supported by the Innovation and Technology Commission of Hong Kong(Grant No.GHP/026/19GD);the Research Grants Council of Hong Kong(Grant No.Ao E/P-502/20);the National Key R&D Program of China(Grant No.2021YFA1400804);the National Natural Science Foundation of China(Grant No.12222415);the Guangdong Natural Science Fund(Grant Nos.2024B1515040013 and 2020A0505140004);the Guangdong Provincial Quantum Science Strategic Initiative(Grant No.GDZX2305005)。
Ultracompact metasurfaces have gained a high reputation for manipulating light fields precisely within a subwavelength scale,bringing great development to the fields of nanophotonics,integrated optics,and quantum tech...
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection mechanisms.This study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutiona...
funded by Princess Nourah bint Abdulrahman UniversityResearchers Supporting Project number (PNURSP2024R408), Princess Nourah bint AbdulrahmanUniversity, Riyadh, Saudi Arabia.
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...