A review of compressive sensing in information security field
The applications of compressive sensing (CS) in the field of information security have
captured a great deal of researchers' attention in the past decade. To supply guidance for …
captured a great deal of researchers' attention in the past decade. To supply guidance for …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning
To achieve automatic recommendation of privacy settings for image sharing, a new tool
called iPrivacy (image privacy) is developed for releasing the burden from users on setting …
called iPrivacy (image privacy) is developed for releasing the burden from users on setting …
Identity-based encryption with outsourced revocation in cloud computing
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …
A visually secure image encryption scheme based on parallel compressive sensing
H Wang, D Xiao, M Li, Y Xiang, X Li - Signal Processing, 2019 - Elsevier
It is generally recognized that encrypting an original image into meaningless cipher image is
an ideal method to protect image information. However, during transmission, the …
an ideal method to protect image information. However, during transmission, the …
Private machine learning classification based on fully homomorphic encryption
Machine learning classification is an useful tool for trend prediction by analyzing big data. As
supporting homomorphic operations over encrypted data without decryption, fully …
supporting homomorphic operations over encrypted data without decryption, fully …
Homomorphic encryption as a service for outsourced images in mobile cloud computing environment
The integration of cloud computing with mobile computing and internet has given birth to
mobile cloud computing. This technology offers many advantages to users, like Storage …
mobile cloud computing. This technology offers many advantages to users, like Storage …
Low-cost and confidentiality-preserving data acquisition for internet of multimedia things
Internet of Multimedia Things (IoMT) faces the challenge of how to realize low-cost data
acquisition while still preserve data confidentiality. In this paper, we present a low-cost and …
acquisition while still preserve data confidentiality. In this paper, we present a low-cost and …
Attribute-based cloud data integrity auditing for secure outsourced storage
Outsourced storage such as cloud storage can significantly reduce the burden of data
management of data owners. Despite of a long list of merits of cloud storage, it triggers many …
management of data owners. Despite of a long list of merits of cloud storage, it triggers many …
A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT
In the presence of several critical issues during data acquisition in industrial-informatics-
based applications, like Internet of Things (IoT) and smart grid, this article proposes a novel …
based applications, like Internet of Things (IoT) and smart grid, this article proposes a novel …