Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (211)
  • Open Access

    ARTICLE

    Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing

    Leqi Jiang1, 2, Zhangjie Fu1, 2, *

    Journal of Cyber Security, Vol.2, No.1, pp. 49-61, 2020, DOI:10.32604/jcs.2020.09308

    Abstract Genetic Algorithm (GA) has been widely used to solve various optimization problems. As the solving process of GA requires large storage and computing resources, it is well motivated to outsource the solving process of GA to the cloud server. However, the algorithm user would never want his data to be disclosed to cloud server. Thus, it is necessary for the user to encrypt the data before transmitting them to the server. But the user will encounter a new problem. The arithmetic operations we are familiar with cannot work directly in the ciphertext domain. In this paper, a privacy-preserving outsourced genetic… More >

  • Open Access

    ARTICLE

    Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model

    Wenxi Han1, 2, Mingzhi Cheng3, *, Min Lei1, 2, Hanwen Xu2, Yu Yang1, 2, Lei Qian4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1025-1038, 2020, DOI:10.32604/cmc.2020.09815

    Abstract In recent years, with the continuous advancement of the intelligent process of the Internet of Vehicles (IoV), the problem of privacy leakage in IoV has become increasingly prominent. The research on the privacy protection of the IoV has become the focus of the society. This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms, proposes a privacy protection system structure based on untrusted data collection server, and designs a vehicle location acquisition algorithm based on a local differential privacy and game model. The algorithm first meshes the road network space. Then, the dynamic… More >

  • Open Access

    ARTICLE

    Fine-Grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform

    Jiaye Pan1, Yi Zhuang1, *, Xinwen Hu1, 2, Wenbing Zhao3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 607-622, 2020, DOI:10.32604/cmc.2020.09853

    Abstract Nowadays cloud architecture is widely applied on the internet. New malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud platforms. In view of the problems with existing application behavior monitoring methods such as coarse-grained analysis, high performance overhead and lack of applicability, this paper proposes a new fine-grained binary program monitoring and analysis method based on multiple system level components, which is used to detect the possible privacy leakage of applications installed on cloud platforms. It can be used online in cloud platform environments for fine-grained automated analysis of target programs, ensuring… More >

  • Open Access

    ARTICLE

    δ-Calculus: A New Approach to Quantifying Location Privacy☆

    Lihua Yin1, Ran Li1, 2, *, Jingquan Ding3, 4, 5, *, Xiao Li3, 4, 5, Yunchuan Guo2, Huibing Zhang6, Ang Li7

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1323-1342, 2020, DOI:10.32604/cmc.2020.09667

    Abstract With the rapid development of mobile wireless Internet and high-precision localization devices, location-based services (LBS) bring more convenience for people over recent years. In LBS, if the original location data are directly provided, serious privacy problems raise. As a response to these problems, a large number of location-privacy protection mechanisms (LPPMs) (including formal LPPMs, FLPPMs, etc.) and their evaluation metrics have been proposed to prevent personal location information from being leakage and quantify privacy leakage. However, existing schemes independently consider FLPPMs and evaluation metrics, without synergizing them into a unifying framework. In this paper, a unified model is proposed to… More >

  • Open Access

    ARTICLE

    OTT Messages Modeling and Classification Based on Recurrent Neural Networks

    Guangyong Yang1, Jianqiu Zeng1, Mengke Yang2, *, Yifei Wei3, Xiangqing Wang3, Zulfiqar Hussain Pathan4

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 769-785, 2020, DOI:10.32604/cmc.2020.07528

    Abstract A vast amount of information has been produced in recent years, which brings a huge challenge to information management. The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages. In this paper, we propose a nine-rectangle-grid information model according to the information value and privacy, and then present information use policies based on the rough set theory. Recurrent neural networks were employed to classify OTT messages. The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages, ending with a reliable trained classification model.… More >

  • Open Access

    ARTICLE

    A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing

    Shuyu Li1, Guozheng Zhang1, *

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 223-241, 2020, DOI:10.32604/cmc.2020.07499

    Abstract With the popularity of sensor-rich mobile devices, mobile crowdsensing (MCS) has emerged as an effective method for data collection and processing. However, MCS platform usually need workers’ precise locations for optimal task execution and collect sensing data from workers, which raises severe concerns of privacy leakage. Trying to preserve workers’ location and sensing data from the untrusted MCS platform, a differentially private data aggregation method based on worker partition and location obfuscation (DP-DAWL method) is proposed in the paper. DP-DAWL method firstly use an improved K-means algorithm to divide workers into groups and assign different privacy budget to the group… More >

  • Open Access

    ARTICLE

    Access Control Policy Based on Friend Circle

    Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1143-1159, 2020, DOI:10.32604/cmc.2020.04949

    Abstract Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious users, a set of multi-angle… More >

  • Open Access

    ARTICLE

    A Review of Data Cleaning Methods for Web Information System

    Jinlin Wang1, Xing Wang1, *, Yuchen Yang1, Hongli Zhang1, Binxing Fang1

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1053-1075, 2020, DOI:10.32604/cmc.2020.08675

    Abstract Web information system (WIS) is frequently-used and indispensable in daily social life. WIS provides information services in many scenarios, such as electronic commerce, communities, and edutainment. Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service. In this paper, we present a review of the state-of-the-art methods for data cleaning in WIS. According to the characteristics of data cleaning, we extract the critical elements of WIS, such as interactive objects, application scenarios, and core technology, to classify the existing works. Then, after elaborating and analyzing each category, we summarize the descriptions and challenges… More >

  • Open Access

    ARTICLE

    A Privacy Preserving Deep Linear Regression Scheme Based on Homomorphic Encryption

    Danping Dong1, *, Yue Wu1, Lizhi Xiong1, Zhihua Xia1

    Journal on Big Data, Vol.1, No.3, pp. 145-150, 2019, DOI:10.32604/jbd.2019.08706

    Abstract This paper proposes a strategy for machine learning in the ciphertext domain. The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption, and then trained in the ciphertext domain. At the same time, it is guaranteed that the error of the training results between the ciphertext domain and the plaintext domain is in a controllable range. After the training, the ciphertext can be decrypted and restored to the original plaintext training data. More >

  • Open Access

    ARTICLE

    Research on Privacy Disclosure Detection Method in Social Networks Based on Multi-Dimensional Deep Learning

    Yabin Xu1, 2, *, Xuyang Meng1, Yangyang Li3, Xiaowei Xu4, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 137-155, 2020, DOI:10.32604/cmc.2020.05825

    Abstract In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users, this paper takes microblog as the research object to study the detection of privacy disclosure in social networks. First, we perform fast privacy leak detection on the currently published text based on the fastText model. In the case that the text to be published contains certain private information, we fully consider the aggregation effect of the private information leaked by different channels, and establish a convolution neural network model based on multi-dimensional features (MF-CNN) to detect privacy disclosure comprehensively and… More >

Displaying 181-190 on page 19 of 211. Per Page