A review of compressive sensing in information security field

Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He - IEEE access, 2016 - ieeexplore.ieee.org
The applications of compressive sensing (CS) in the field of information security have
captured a great deal of researchers' attention in the past decade. To supply guidance for …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning

J Yu, B Zhang, Z Kuang, D Lin… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
To achieve automatic recommendation of privacy settings for image sharing, a new tool
called iPrivacy (image privacy) is developed for releasing the burden from users on setting …

Identity-based encryption with outsourced revocation in cloud computing

J Li, J Li, X Chen, C Jia, W Lou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …

A visually secure image encryption scheme based on parallel compressive sensing

H Wang, D Xiao, M Li, Y Xiang, X Li - Signal Processing, 2019 - Elsevier
It is generally recognized that encrypting an original image into meaningless cipher image is
an ideal method to protect image information. However, during transmission, the …

Private machine learning classification based on fully homomorphic encryption

X Sun, P Zhang, JK Liu, J Yu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Machine learning classification is an useful tool for trend prediction by analyzing big data. As
supporting homomorphic operations over encrypted data without decryption, fully …

Homomorphic encryption as a service for outsourced images in mobile cloud computing environment

M Ibtihal, N Hassan - … of Cloud Applications and Computing (IJCAC …, 2017 - igi-global.com
The integration of cloud computing with mobile computing and internet has given birth to
mobile cloud computing. This technology offers many advantages to users, like Storage …

Low-cost and confidentiality-preserving data acquisition for internet of multimedia things

Y Zhang, Q He, Y Xiang, LY Zhang… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Multimedia Things (IoMT) faces the challenge of how to realize low-cost data
acquisition while still preserve data confidentiality. In this paper, we present a low-cost and …

Attribute-based cloud data integrity auditing for secure outsourced storage

Y Yu, Y Li, B Yang, W Susilo, G Yang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Outsourced storage such as cloud storage can significantly reduce the burden of data
management of data owners. Despite of a long list of merits of cloud storage, it triggers many …

A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT

Y Zhang, Q He, G Chen, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In the presence of several critical issues during data acquisition in industrial-informatics-
based applications, like Internet of Things (IoT) and smart grid, this article proposes a novel …