Loading [MathJax]/extensions/MathMenu.js
Wen Huang - IEEE Xplore Author Profile

Showing 1-14 of 14 results

Filter Results

Show

Results

Unmanned aerial vehicle (UAV)-enabled intelligent systems are emerging and empowering real-time monitoring and modeling tasks. The security requirements in real-time UAV-enabled intelligent systems are data integrity, authenticity, traceability, tamper-proofing, and privacy. A secure channel established by authenticated key agreement (AKA) protocol can cover all the security requirements. However,...Show More
Unmanned aerial vehicles (UAVs) are promising tools for efficient data collections of sensors in Internet of Things networks. Existing studies exploited both spatial and temporal data correlations to reduce the amount of collected redundant data, in which sensors are first partitioned into different clusters, a master sensor in each cluster then collects raw data from other sensors and compresses ...Show More
Access control and authenticity are two critical concerns of the encrypted propagating data in edge computing-assisted intelligent transportation systems (EC-ITS). This paper presents a fully traceable and verifiable ciphertext-policy attribute-based encryption scheme with auditable outsourced decryption and dynamic identity revocation (FTV-AOD-DR-CP-ABE) for EC-ITS as a confidential and fine-grai...Show More
Authenticated Key agreement (AKA) protocol is one of the essential components for reliable secure communication in Industrial Internet of Things (IIoT) communication model. Recently, Srinivas et al. proposed a three-factor elliptic curve cryptosystem (ECC)-based AKA protocol called UAP-BCIoT for wireless sensor network-based intelligent transportation system (ITS). In this article, we first find o...Show More
With the popularity of artificial intelligence and cloud computing, many neural network models can be placed on the cloud server as an open service, such as Google Goggles and the online face recognition system of Baidu. The data owner sends his data to the cloud server to get the prediction result of data. Obviously, the cloud service provider can access model parameters and private data if there...Show More
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising cryptographic tool to provide efficient fine-grained access control for data accessing and sharing in cloud-assisted Intelligent Internet of Mobile Things (IIoMT). Decryption verification is an essential property of OD-ABE to enable the mobile user to verify the precision of the decryption data. Unfortunately, the...Show More
Massive Internet of Things (IoT) data sets are possessed by big institutions serving daily life because IoT devices are widely used in our daily life such as wearable devices and smart home devices. Publishing these data sets among various institutions causes an increasing number of users to concern their personal privacy. Differential privacy is the state-of-the-art concept of privacy preservatio...Show More
Differential privacy is a widely accepted privacy conception. However, there is a limitation on the number of queries supported by differentially private mechanisms, and the limitation stops differentially private mechanisms from being widely used in business systems. In this paper, we propose two mechanisms to optimize the number of queries, namely approximate answer differentially private mechan...Show More
Differential privacy is a widely accepted concept of privacy preservation, and the Laplace mechanism is a famous instance of differentially private mechanisms used to deal with numerical data. In this paper, we find that differential privacy does not take the linear property of queries into account, resulting in unexpected information leakage. Specifically, the linear property makes it possible to...Show More
The differential privacy is the state-of-the-art conception for privacy preservation due to its strong privacy guarantees, however it suffers from low accuracy. In this paper, we propose a personalized sample Laplace mechanism by combining the Laplace mechanism with sampling technology. In order to improve the accuracy, the proposed mechanism assigns personalized sampling probability to each recor...Show More
Differential privacy is the state-of-the-art for preserving privacy and differential privacy mechanism based on Laplace distribution with mean 0 is common practice. However, privacy budget is exhausted so quick that the number of queries is not enough. In this paper, a differential privacy mechanism is proposed to optimize the number of queries for application scenario of multiple users. We isolat...Show More
The logistic model is a very elementary and important model in the field of machine learning. In this article, an efficient differential privacy logistic classification mechanism is proposed. The proposed mechanism is better than object function perturbation mechanism in terms of running time and accuracy. Regarding accuracy, the proposed mechanism's accuracy is almost the same as the no different...Show More
In the field of social survey of misconduct and legal consultation, the features of confidentiality, integrity, deniable authentication, and non-repudiation are needed for the sake of preserving privacy. For this special kind of application scenario, we propose an efficient deniable authentication encryption scheme. Our scheme can achieve the four secure features in a single logical step. And comp...Show More
Cloud computing is a novel pattern, which can allow users to outsource their data to the cloud servers in order to save the resource of clients. For the sake of protecting the clients' privacy, the clients' data are stored or computed in the encrypted data. This leads to a new issue: how to quickly search these encrypted data. One of the methods to solve the problem is to construct public-key encr...Show More