When machine learning meets blockchain: A decentralized, privacy-preserving and secure design

X Chen, J Ji, C Luo, W Liao, P Li - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
With the onset of the big data era, designing efficient and effective machine learning
algorithms to analyze large-scale data is in dire need. In practice, data is typically generated …

Secure and efficient outsourcing of PCA-based face recognition

Y Zhang, X Xiao, LX Yang, Y Xiang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Face recognition has become increasingly popular in recent years. However, in some
special cases, many face recognition calculations cannot be performed effectively due to the …

Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression

H Zhang, P Gao, J Yu, J Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Linear Regression (LR) is a classical machine learning algorithm which has many
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …

Privacy-preserving face recognition with multi-edge assistance for intelligent security systems

W Gao, J Yu, R Hao, F Kong… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Face recognition is one of the key technologies in intelligent security systems. Data privacy
and identification efficiency have always been concerns about face recognition. Existing …

Secure edge-aided singular value decomposition in internet of things

Y Li, H Zhang, J Lin, F Liang, H Xu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Singular Value Decomposition (SVD) is a widely applied foundational decomposition
technique; however, its computational demands often exceed the capabilities of Internet of …

Cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing

H Zhang, J Yu, C Tian, P Zhao, G Xu, J Lin - IEEE Access, 2018 - ieeexplore.ieee.org
Deploying electronic health records (EHRs) is now an undisputable trend in healthcare
systems. Through affording benefits like flexibility and low cost, the cutting-cloud cloud …

Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things

H Zhang, J Yu, C Tian, G Xu, P Gao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …

Secure edge-aided computations for social Internet-of-Things systems

H Zhang, J Yu, MS Obaidat… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Devices in the Internet-of-Things (IoT) are networked and perform massive computations to
support various social IoT systems. Applications in social IoT systems often involve …

Outsourcing LDA-based face recognition to an untrusted cloud

Y Ren, Z Song, S Sun, JK Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Face recognition has been extensively employed in practice, such as attendance system
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …

Efficient and secure outsourcing scheme for RSA decryption in Internet of Things

H Zhang, J Yu, C Tian, L Tong, J Lin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …