Loading [MathJax]/extensions/MathMenu.js

Showing 1-25 of 47 results

Filter Results

Show

Results

Eigenvalue decomposition (EVD) is a fundamental yet time-consuming operation with extensive applications in IoT. When the matrix dimension reaches millions, resource-limited IoT devices struggle to perform such computationally expensive operations. Edge computing, with its plentiful computing resources, offers an effective solution to this problem. However, privacy concerns arise because outsource...Show More
For the huge amount of data from the Internet of Things (IoT) devices, multiple kernel learning is a widely concerned issue in data analyzing, among which the multiple kernel fuzzy clustering (MKFC) algorithm is an effective approach for extracting linear features in high-dimensional space. For a time-consuming multiple kernel clustering task, it’s meaningful to find a secure and efficient outsour...Show More
Profiled side-channel analysis presents a significant risk to embedded devices in Internet of Things (IoT). Typically, a single trace is insufficient to successfully key recovery in practical scenarios. It still requires several traces based on Bayes’ posterior probability. In this article, we introduce a chosen-plaintext (CP) strategy into the deep learning-based profiled attacks to improve the a...Show More
This study explores the metric of group closeness centrality within the framework of social networks, a departure from the traditional analysis focused solely on the significance of individual nodes. Given the intricate dynamics observed in networks governed by various stakeholders, we introduce a framework that preserves privacy through the application of a greedy algorithm. This approach is desi...Show More
The large-scale matrix eigenvalue computation, as a basic mathematical tool, has been widely used in many fields such as face recognition and data analysis. However, local terminal devices lack sufficient resources to undertake heavy computational tasks, which poses a challenge to the applications of eigenvalue computation. In this paper, we propose the first privacy-preserving edge-assisted compu...Show More
Autism Spectrum Disorder (ASD) encompasses a range of complex neurodevelopmental conditions typically identified in early childhood. ASD is characterized by challenges in social interaction, communication, and by repetitive behaviors with restricted interests. The variability in symptoms’ severity and expression among individuals presents significant diagnostic challenges to physicians. Advancemen...Show More
With the advancement of the Internet of Things (IoT), numerous machine learning applications on IoT are encountering performance bottlenecks. Graph embedding is an emerging type of machine learning that has achieved commendable results in areas, such as network anomaly detection, malware detection, IoT device management, and service recommendation within the IoT. However, for some resource-constra...Show More
Decision tree classifiers are pervasively applied in a wide range of areas, such as healthcare, credit-risk assessment, spam detection, and many more. To ensure effectiveness and efficiency, clients usually choose to adopt classification services that are offered by model providers. However, the required data interactions in the evaluation process raise privacy concerns for both the provider and t...Show More
Approaches predicting the results of mutation testing by machine learning have been proposed to reduce the cost of mutation testing. The predictive approaches based on PIE theory and approaches based on natural language have been proposed. However, both PIE-based and natural language-based approaches have disadvantages, leading to a reduction in effectiveness at the test case level prediction. In ...Show More
An online service system may experience various performance faults during operation. Detecting and locating these faults after they occur can significantly impact the user experience and lead to significant losses. Therefore, it is necessary to predict faults before they occur. Existing methods for fault prediction typically only predict the possibility of fault, without providing more granular pr...Show More
Large-scale matrix multiplication is a computational bottleneck in various applications including artificial intelligence and machine learning. Given the time complexity of O(n3) for matrix multiplication, large matrix computation is exceedingly time-consuming for the client-side user. By outsourcing this task to cloud servers with substantial computational resources, we can significantly reduce t...Show More
Erythemato-squamous disease (ESD) is a benign skin condition with a broad spectrum of symptoms, creating diagnostic challenges for physicians. Numerous studies have suggested the use of deep learning for constructing classification models. However, the patient data utilized for model training and inference is highly confidential, and any breach could lead to severe implications. To address this is...Show More
Federated learning is a new type of artificial intelligence technology. During the training process, the client transmits model parameter information instead of local data to ensure their privacy and security. But it also incurs higher communication costs. This article proposes a new federated learning pruning method, FedADP, with the aim of adaptively determining pruning ratios for each layer in ...Show More
The purpose of drug recommendation is to predict the effective and safe drug combinations required for the current visit based on the historical medical data of patients. How to better mine the hidden relationship in the medical data and effectively improve the accuracy of drug recommendation are research hotspots in the medical field. This paper proposes a Collaborative Cross-attention Drug Recom...Show More
Generating Adversarial Network (GAN) is a prominent unsupervised learning method that utilizes two competing neural networks to generate realistic data, which has been widely employed in image synthesis and data augmentation. Outsourcing GAN training to cloud servers can significantly reduce the computation load on local devices. Furthermore, in outsourcing settings, training data can be gathered ...Show More
The proliferation of Internet of Things (IoT) devices has led to the generation of massive amounts of data that require efficient aggregation for analysis and decision-making. However, multi-tier IoT systems, which involve multiple layers of devices and gateways, face more complex security challenges in data aggregation compared to ordinary IoT systems. In this paper, we propose an efficient priva...Show More
Text-to-SQL aims to parse natural language problems into SQL queries, which can provide a simple interface to access large databases enabling SQL novices a quicker entry into databases. As the Text-to-SQL field is intensively studied, more and more models use GNNs to encode heterogeneous graph information in this task, and how to better obtain path information between nodes in database schema hete...Show More
The road network plays an important role in guiding people's daily travel. In the road network, the shortest distance query is one of the most basic query operations. With the scale of the road network continuously expanding, people choose to outsource the road network to the cloud server in the form of an encrypted graph. To the best of authors' knowledge, the existing privacy-preserving shortest...Show More
Face recognition is one of the key technologies in intelligent security systems. Data privacy and identification efficiency have always been concerns about face recognition. Existing privacy-preserving protocols only focus on the training phase of face recognition. Since intelligent security systems mainly complete the calculation of large-scale face data in the identification phase, existing priv...Show More
With the popularity of Internet of Things (IoT) and 5G, privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key cryptosystem, which allow the users to utilize their own identity as the public key to carry out data encryption and digital signature, which is very suit...Show More
With popularity and growth of cloud computing, outsourcing computation, as an important cloud service, has been applied in the field of academic and industry. It allows the resource-constrained IoT devices to outsource the computationally intensive problems to the cloud server. The smallest normalized cuts of the large-scale graph is a fundamental issue in graph theory, which is often used in vari...Show More
With the development of cloud computing and the advent of Internet of Things (IoT), outsourcing computation, as an important application of cloud computing, has been widely researched in the field of academic and industry. The convex optimization problem, as a most common mathematical problem, often appears in some machine learning algorithms and smart grid designs. However, the process of solving...Show More
Data security and privacy have become an important problem while big data systems are growing dramatically fast in various application fields. Paillier additive homomorphic cryptosystem is widely used in information security fields such as big data security, communication security, cloud computing security, and artificial intelligence security. However, how to improve its computational performance...Show More
As candidates for cryptographic primitives in 5G communication, ZUC-256, SNOW-V, and AES-256 offer the 256-bit security in terms of confidentiality and integrity. There have been some studies on software implementations on different platforms for them. In this paper, ZUC-256, SNOW-V, and AES-256 are implemented in the standard C language on RISC-V CPU without AES new instructions. Their implementa...Show More
Phrase search encryption, as an important technique in cloud-based IoT system, allows users to retrieve encrypted IoT data that contains a set of consecutive keywords. It plays an important role in cloud-based e-healthcare diagnosis system, machine learning applications for cloud-based IoT system, etc. However, to the best of our knowledge, the existing phrase search encryption schemes cannot achi...Show More