Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Adversarial Examples Protect Your Privacy on Speech Enhancement System

    Mingyu Dong, Diqun Yan*, Rangding Wang

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1-12, 2023, DOI:10.32604/csse.2023.034568 - 20 January 2023

    Abstract Speech is easily leaked imperceptibly. When people use their phones, the personal voice assistant is constantly listening and waiting to be activated. Private content in speech may be maliciously extracted through automatic speech recognition (ASR) technology by some applications on phone devices. To guarantee that the recognized speech content is accurate, speech enhancement technology is used to denoise the input speech. Speech enhancement technology has developed rapidly along with deep neural networks (DNNs), but adversarial examples can cause DNNs to fail. Considering that the vulnerability of DNN can be used to protect the privacy in… More >

  • Open Access

    ARTICLE

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

    Ze Xu, Sanxing Cao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159 - 05 January 2023

    Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;… More > Graphic Abstract

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

  • Open Access

    ARTICLE

    Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain

    Jin Wang1, Wei Ou1, Osama Alfarraj2, Amr Tolba2, Gwang-Jun Kim3,*, Yongjun Ren4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1805-1819, 2023, DOI:10.32604/csse.2023.029622 - 03 November 2022

    Abstract Since transactions in blockchain are based on public ledger verification, this raises security concerns about privacy protection. And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification, when the whole transaction on the chain is verified. In order to improve the efficiency and privacy protection of block data verification, this paper proposes an efficient block verification mechanism with privacy protection based on zero-knowledge proof (ZKP), which not only protects the privacy of users but also improves the speed of data block verification. There is no… More >

  • Open Access

    ARTICLE

    GrCol-PPFL: User-Based Group Collaborative Federated Learning Privacy Protection Framework

    Jieren Cheng1, Zhenhao Liu1,*, Yiming Shi1, Ping Luo1,2, Victor S. Sheng3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1923-1939, 2023, DOI:10.32604/cmc.2023.032758 - 22 September 2022

    Abstract With the increasing number of smart devices and the development of machine learning technology, the value of users’ personal data is becoming more and more important. Based on the premise of protecting users’ personal privacy data, federated learning (FL) uses data stored on edge devices to realize training tasks by contributing training model parameters without revealing the original data. However, since FL can still leak the user's original data by exchanging gradient information. The existing privacy protection strategy will increase the uplink time due to encryption measures. It is a huge challenge in terms of… More >

  • Open Access

    ARTICLE

    Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography

    B. Murugeshwari1,*, D. Selvaraj2, K. Sudharson3, S. Radhika4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 839-851, 2023, DOI:10.32604/iasc.2023.028548 - 06 June 2022

    Abstract Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily concerned with protecting the privacy of user data. This study aims to present data mining with privacy protection (DMPP) using precise elliptic More >

  • Open Access

    REVIEW

    A Survey of Privacy Preservation for Deep Learning Applications

    Ling Zhang1,*, Lina Nie1, Leyan Yu2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 69-78, 2022, DOI:10.32604/jihpp.2022.039284 - 17 April 2023

    Abstract Deep learning is widely used in artificial intelligence fields such as computer vision, natural language recognition, and intelligent robots. With the development of deep learning, people’s expectations for this technology are increasing daily. Enterprises and individuals usually need a lot of computing power to support the practical work of deep learning technology. Many cloud service providers provide and deploy cloud computing environments. However, there are severe risks of privacy leakage when transferring data to cloud service providers and using data for model training, which makes users unable to use deep learning technology in cloud computing More >

  • Open Access

    ARTICLE

    Application and Challenge of Blockchain Technology in Medical Field

    Kaifeng Zhang1, Zhao Qiu1,*, Gengquan Xie1, Jiale Lin1, Tingting Zhang1, Yingsheng Lian1, Tao Chen1, Yunlong He2, Yu Yang2

    Journal of Cyber Security, Vol.4, No.2, pp. 95-107, 2022, DOI:10.32604/jcs.2022.029451 - 04 July 2022

    Abstract Due to its unique security, blockchain technology is widely used in the financial field. Under the background of the rapid development of information technology and the rapid improvement of medical level, it is also a general trend to integrate blockchain technology into the medical field. According to the characteristics of blockchain and the research contents of many scholars on the application of blockchain in the medical field, this paper analyzes and summarizes the problems existing in the current development of blockchain, puts forward corresponding solutions, and looks forward to the further application of blockchain technology More >

  • Open Access

    ARTICLE

    Security Analysis for a VANET Privacy Protection Scheme

    Yuzhen Liu1,2, Xiaoliang Wang1,2,*, Zhoulei Cao1,2, Frank Jiang3

    Journal of Cyber Security, Vol.4, No.1, pp. 57-64, 2022, DOI:10.32604/jcs.2022.028792 - 05 May 2022

    Abstract Vehicular ad hoc network (VANET) is a self-organizing wireless sensor network model, which is extensively used in the existing traffic. Due to the openness of wireless channel and the sensitivity of traffic information, data transmission process in VANET is vulnerable to leakage and attack. Authentication of vehicle identity while protecting vehicle privacy information is an advantageous way to improve the security of VANET. We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis. More >

  • Open Access

    ARTICLE

    A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain

    Meng-Wei Zhang1, Xiu-Bo Chen1, Haseeb Ahmad2, Gang Xu3,4,*, Yi-Xian Yang1

    Journal of Cyber Security, Vol.4, No.1, pp. 29-39, 2022, DOI:10.32604/jcs.2022.027693 - 05 May 2022

    Abstract Blockchain has a profound impact on all areas of society by virtue of its immutability, decentralization and other characteristics. However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain. In this paper, we propose a lattice-based certificateless fully homomorphic encryption (LCFHE) algorithm based on approximate eigenvector firstly. And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme, which is composed of the private key More >

  • Open Access

    ARTICLE

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    Gang Xu1, Yibo Cao1, Shiyuan Xu1, Xin Liu2,*, Xiu-Bo Chen3, Yiying Yu1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5429-5441, 2022, DOI:10.32604/cmc.2022.028562 - 21 April 2022

    Abstract With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design More >

Displaying 21-30 on page 3 of 47. Per Page