Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2020
Privacy-preserving federated k-means for proactive caching in next generation cellular networks
Information Sciences: an International Journal (ISCI), Volume 521, Issue CPages 14–31https://doi.org/10.1016/j.ins.2020.02.042AbstractProactive caching is a novel smart communication resource management method that can offer intelligent and economic networking services in the next generation cellular networks. In proactive caching, a common operation is using k-means ...
- research-articleMay 2020
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting
Future Generation Computer Systems (FGCS), Volume 106, Issue CPages 545–558https://doi.org/10.1016/j.future.2020.01.007AbstractWhile decision-making task is critical in knowledge transfer, particularly from multi-source domains, existing knowledge transfer approaches are not generally designed to be privacy preserving. This has potential legal and financial ...
Highlights- We propose a privacy-preserving multi-party knowledge transfer for financial market forecasting.
- research-articleFebruary 2020
Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering
Information Sciences: an International Journal (ISCI), Volume 511, Issue CPages 172–191https://doi.org/10.1016/j.ins.2019.09.038Highlights- A coarse to refined network (C2RNet) is proposed for image forgery detection.
- C2RNet is a progressive process deep neural network.
- We replace the patch-level CNN with image-level CNN for time efficiency.
- The proposed method ...
This paper proposes a splicing forgery detection method with two parts: a coarse-to-refined convolutional neural network (C2RNet) and diluted adaptive clustering. The proposed C2RNet cascades a coarse convolutional neural network (C-CNN) and a ...
- research-articleFebruary 2020
User interaction-oriented community detection based on cascading analysis
Information Sciences: an International Journal (ISCI), Volume 510, Issue CPages 70–88https://doi.org/10.1016/j.ins.2019.09.022AbstractDetecting user communities in online social networks (OSNs) is of great importance for understanding social dynamics. Compared to user connections, user interactions have been shown to be more meaningful for reflecting peer ...
- research-articleJanuary 2020
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model
In smart applications such as smart medical equipment, more data needs to be processed and trained locally and near the local end to prevent privacy leaks. However, the storage and computing capabilities of smart devices are limited, so some computing ...
- research-articleJanuary 2020
Comments on “Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources”
IEEE Transactions on Information Forensics and Security (TIFS), Volume 15Pages 1586–1588https://doi.org/10.1109/TIFS.2019.2936971With more organizational and individual data owners storing their data in the cloud, there is a corresponding need to ensure that such outsourced data can be computed by the data owners or some authorized third parties. In other words, the cloud server ...
- ArticleDecember 2019
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration
AbstractDNS tunneling is a typical DNS attack that has been used for stealing information for many years. The stolen data is encoded and encapsulated into the DNS request to evade intrusion detection. The popular detection methods of machine learning use ...
- research-articleDecember 2019
Continuous Authentication for the Internet of Things Using Channel State Information
2019 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM38437.2019.9014276In the centralized Internet of Things (IoT) archi- tecture there exists gateways, which gather sensed data from sensor nodes frequently. Due to numerous security threats and attacks in wireless sensor networks (WSNs), how to achieve device-to-device ...
- research-articleDecember 2019
Collaborative Deep Learning for Medical Image Analysis with Differential Privacy
2019 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM38437.2019.9014259Deep learning algorithms, especially convolution neural networks, have attracted huge attention in the field of medical image analysis. A hospital could train a neural network to detect disease based on medical images possessing. However, the number of ...
- research-articleDecember 2019
Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent
2019 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM38437.2019.9013842Nowadays, Electronic Medical Records (EHRs) are closely linked to people's social lives. In order to ensure the convenience of medical services, many related organizations need to share EHRs across organizations to exchange information. The existing ...
- research-articleDecember 2019
AClog: Attack Chain Construction Based on Log Correlation
2019 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM38437.2019.9013518Before the final attack happens, clandestine attackers conduct sequenced stages for being stealthy and elusive. These attacks can leave clues in several different log files. Howeverexisting approaches can only detect the anomalies using single type of log ...
- ArticleDecember 2019
BQSV: Protecting SDN Controller Cluster’s Network Topology View Based on Byzantine Quorum System with Verification Function
AbstractIn Software-defined network (SDN), SDN applications and administrators rely on the logically centralized view of the network topology to make management decisions. Therefore, the correctness of SDN controller cluster’s network topology view ...
- research-articleDecember 2019
Counting the frequency of time-constrained serial episodes in a streaming sequence
Information Sciences: an International Journal (ISCI), Volume 505, Issue CPages 422–439https://doi.org/10.1016/j.ins.2019.07.098AbstractAs a representative sequential pattern mining problem, counting the frequency of serial episodes from a streaming sequence has drawn continuous attention in academia due to its wide application in practice, e.g., telecommunication ...
- research-articleDecember 2019
Quaternion weighted spherical Bessel-Fourier moment and its invariant for color image reconstruction and object recognition
Information Sciences: an International Journal (ISCI), Volume 505, Issue CPages 388–405https://doi.org/10.1016/j.ins.2019.07.089Highlights- We propose a new quaternion image orthogonal moment named as QSBFM to effectively perform color image processing.
Moments with capable of representing global features have been widely used in image analysis, pattern recognition and computer vision applications. However, existing image moment theories are still mainly paid close attention to gray-...
- research-articleDecember 2019
PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data
Information Sciences: an International Journal (ISCI), Volume 505, Issue CPages 198–214https://doi.org/10.1016/j.ins.2019.07.078Highlights- We develop a novel feature descriptor, named Legendre Circularly Orthogonal Moment (LCOM).
In the image outsourcing system, image privacy is still an increasing concern since the cloud service provider and image owners are not in the same trusted domain. The most straightforward method for guaranteeing image privacy is to ...
- research-articleNovember 2019
Selfholding: A combined attack model using selfish mining with block withholding attack
AbstractBitcoin is one of the most influential digital cryptocurrencies in the world, of which the security is under serious threat. One of the most serious security problems is facing several attacking strategies on the bitcoin protocol, ...
- ArticleOctober 2019
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation
AbstractWith the growing use of cloud storage facilities, outsourced data security becomes a major concern. However, assured deletion for outsourced data, as an important issue for users, but received less attention in academia and industry. Most of ...
- ArticleSeptember 2019
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
AbstractAs one of the most important manners of personal and business communications, cloud emails have been widely employed due to its advantages of low-cost and convenience. However, with the occurrence of large-scale email leakage events and the ...
- ArticleSeptember 2019
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications
AbstractThe explosive growth of Android malware has led to a strong interest in developing efficient and precise malware detection approach. Recent efforts have shown that machine learning-based malware classification is a promising direction, and the API-...
- ArticleSeptember 2019
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System
AbstractMost of the existing GPS spoofing detection schemes are vulnerable to the complex generative GPS spoofing attack, and require additional auxiliary equipments and extensive signal processing capabilities, leading to defects such as low real-time ...