Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Song, Xiangfu"'
In data-driven applications, preserving user privacy while enabling valuable computations remains a critical challenge. Technologies like Differential Privacy (DP) have been pivotal in addressing these concerns. The shuffle model of DP requires no tr
Externí odkaz:
http://arxiv.org/abs/2406.18145
Autor:
Bai, Jianli, Song, Xiangfu, Zhang, Xiaowu, Wang, Qifan, Cui, Shujie, Chang, Ee-Chien, Russello, Giovanni
A private decision tree evaluation (PDTE) protocol allows a feature vector owner (FO) to classify its data using a tree model from a model owner (MO) and only reveals an inference result to the FO. This paper proposes Mostree, a PDTE protocol secure
Externí odkaz:
http://arxiv.org/abs/2309.17124
Autor:
Bai, Jianli, Zhang, Xiaowu, Song, Xiangfu, Shao, Hang, Wang, Qifan, Cui, Shujie, Russello, Giovanni
Face recognition is a widely-used technique for identification or verification, where a verifier checks whether a face image matches anyone stored in a database. However, in scenarios where the database is held by a third party, such as a cloud serve
Externí odkaz:
http://arxiv.org/abs/2307.12010
Private decision tree evaluation (PDTE) allows a decision tree holder to run a secure protocol with a feature provider. By running the protocol, the feature provider will learn a classification result. Nothing more is revealed to either party. In mos
Externí odkaz:
http://arxiv.org/abs/2205.01284
Searchable Encryption (SE) is a technique that allows Cloud Service Providers (CSPs) to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data
Externí odkaz:
http://arxiv.org/abs/1909.11624
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and wi
Externí odkaz:
http://arxiv.org/abs/1710.00183
Publikováno v:
In Journal of Network and Computer Applications 1 April 2019 131:55-65
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Yuan, Dandan, Song, Xiangfu, Xu, Qiuliang, Zhao, Minghao, Wei, Xiaochao, Wang, Hao, Jiang, Han
Publikováno v:
In Journal of Information Security and Applications April 2018 39:1-9
Publikováno v:
In Biomaterials July 2017 132:37-47