When machine learning meets blockchain: A decentralized, privacy-preserving and secure design
With the onset of the big data era, designing efficient and effective machine learning
algorithms to analyze large-scale data is in dire need. In practice, data is typically generated …
algorithms to analyze large-scale data is in dire need. In practice, data is typically generated …
Secure and efficient outsourcing of PCA-based face recognition
Face recognition has become increasingly popular in recent years. However, in some
special cases, many face recognition calculations cannot be performed effectively due to the …
special cases, many face recognition calculations cannot be performed effectively due to the …
Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression
Linear Regression (LR) is a classical machine learning algorithm which has many
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …
Privacy-preserving face recognition with multi-edge assistance for intelligent security systems
W Gao, J Yu, R Hao, F Kong… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Face recognition is one of the key technologies in intelligent security systems. Data privacy
and identification efficiency have always been concerns about face recognition. Existing …
and identification efficiency have always been concerns about face recognition. Existing …
Secure edge-aided singular value decomposition in internet of things
Singular Value Decomposition (SVD) is a widely applied foundational decomposition
technique; however, its computational demands often exceed the capabilities of Internet of …
technique; however, its computational demands often exceed the capabilities of Internet of …
Cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing
Deploying electronic health records (EHRs) is now an undisputable trend in healthcare
systems. Through affording benefits like flexibility and low cost, the cutting-cloud cloud …
systems. Through affording benefits like flexibility and low cost, the cutting-cloud cloud …
Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
Secure edge-aided computations for social Internet-of-Things systems
Devices in the Internet-of-Things (IoT) are networked and perform massive computations to
support various social IoT systems. Applications in social IoT systems often involve …
support various social IoT systems. Applications in social IoT systems often involve …
Outsourcing LDA-based face recognition to an untrusted cloud
Face recognition has been extensively employed in practice, such as attendance system
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …
Efficient and secure outsourcing scheme for RSA decryption in Internet of Things
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …