1
|
Zhao X, Xia Z. Secure Outsourced NB: Accurate and Efficient Privacy-preserving Naive Bayes Classification. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103011] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
|
2
|
Kuang X, Gao X, Wang L, Zhao G, Ke L, Zhang Q. A discrete cosine transform-based query efficient attack on black-box object detectors. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.05.089] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
3
|
Yan H, Hu L, Xiang X, Liu Z, Yuan X. PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.09.064] [Citation(s) in RCA: 48] [Impact Index Per Article: 16.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
4
|
Zhang X, Chen X, Yan H, Xiang Y. Privacy-preserving and verifiable online crowdsourcing with worker updates. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.010] [Citation(s) in RCA: 13] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
5
|
A distributed networked system for secure publicly verifiable self-tallying online voting. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.07.023] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/10/2023]
|
6
|
Huang T, Chen Y, Yao B, Yang B, Wang X, Li Y. Adversarial attacks on deep-learning-based radar range profile target recognition. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.066] [Citation(s) in RCA: 19] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
7
|
Wang Y, Yang G, Bracciali A, Leung HF, Tian H, Ke L, Yu X. Incentive compatible and anti-compounding of wealth in proof-of-stake. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.098] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
8
|
Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.041] [Citation(s) in RCA: 22] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
9
|
Li Y, Wang Y, Wang Y, Ke L, Tan YA. A feature-vector generative adversarial network for evading PDF malware classifiers. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.02.075] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
10
|
Liu Y, Ma Z, Yan Z, Wang Z, Liu X, Ma J. Privacy-preserving federated k-means for proactive caching in next generation cellular networks. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.02.042] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
11
|
Chen Y, Luo F, Li T, Xiang T, Liu Z, Li J. A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.02.037] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|