1
|
Zhao B, Liu X, Song A, Chen WN, Lai KK, Zhang J, Deng RH. PriMPSO: A Privacy-Preserving Multiagent Particle Swarm Optimization Algorithm. IEEE Trans Cybern 2023; 53:7136-7149. [PMID: 37015519 DOI: 10.1109/tcyb.2022.3224169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/19/2023]
Abstract
Centralized particle swarm optimization (PSO) does not fully exploit the potential of distributed or parallel computing and suffers from single-point-of-failure. Particularly, each particle in PSO comprises a potential solution (e.g., traveling route and neural network model parameters) which is essentially viewed as private data. Unfortunately, previously neither centralized nor distributed PSO algorithms fail to protect privacy effectively. Inspired by secure multiparty computation and multiagent system, this article proposes a privacy-preserving multiagent PSO algorithm (called PriMPSO) to protect each particle's data and enable private data sharing in a privacy-preserving manner. The goal of PriMPSO is to protect each particle's data in a distributed computing paradigm via existing PSO algorithms with competitive performance. Specifically, each particle is executed by an independent agent with its own data, and all agents jointly perform global optimization without sacrificing any particle's data. Thorough investigations show that selecting an exemplar from all particles and updating particles through the exemplar are critical operations for PSO algorithms. To this end, this article designs a privacy-preserving exemplar selection algorithm and a privacy-preserving triple computation protocol to select exemplars and update particles, respectively. Strict privacy analyses and extensive experiments on a benchmark and a realistic task confirm that PriMPSO not only protects particles' privacy but also has uniform convergence performance with the existing PSO algorithm in approximating an optimal solution.
Collapse
|
2
|
Chen Z, Wu J, Fu A, Su M, Deng RH. MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN. Knowl Based Syst 2023. [DOI: 10.1016/j.knosys.2023.110527] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/03/2023]
|
3
|
Xue Y, Chen L, Mu Y, Zeng L, Rezaeibagha F, Deng RH. Structured encryption for knowledge graphs. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.05.015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
4
|
|
5
|
Tian Y, Li Y, Deng RH, Sengupta B, Yang G. Lattice-based remote user authentication from reusable fuzzy signature. JCS 2021. [DOI: 10.3233/jcs-191370] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user’s biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.
Collapse
Affiliation(s)
- Yangguang Tian
- Cyber Security Engineering Area, Graduate School of Engineering, Osaka University, Japan. E-mail:
| | - Yingjiu Li
- Computer and Information Science, University of Oregon, USA. E-mail:
| | - Robert H. Deng
- School of Information Systems, Singapore Management University, Singapore. E-mails: ,
| | - Binanda Sengupta
- School of Information Systems, Singapore Management University, Singapore. E-mails: ,
| | - Guomin Yang
- School of Computing and Information Technology, University of Wollongong, NSW, Australia. E-mail:
| |
Collapse
|
6
|
Deng RH, Li J, Zhang HX, Li J, Fu Q, Huang G, Liu LS, Fei JG, Chen WF, Yang SC, Wang CX, Deng SX. [Therapeutic effect of tonsillectomy on IgA nephropathy after kidney transplantation]. Zhonghua Yi Xue Za Zhi 2020; 100:2378-2382. [PMID: 32791815 DOI: 10.3760/cma.j.cn112137-20191120-02526] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Abstract
Objective: To observe the clinical effect of tonsillectomy on IgA nephropathy (IgAN) after renal transplantation. Methods: From March 2011 to July 2018, 201 kidney transplantation recipients who were diagnosed of IgAN by transplant renal biopsy in the Department of Organ Transplantation of the First Affiliated Hospital of Sun Yat-sen University were retrospectively reviewed, of which 18 patients underwent tonsillectomy after renal biopsy. The clinical data of the 18 patients were collected, patient and kidney survival time and function of the transplanted kidney were analyzed. Results: Of the 18 recipients, 13 were male and 5 were female, with an average age of (36.0±10.9) years. All 18 patients survived during follow-up. Two patients returned to dialysis treatment 10 months and 14 months after tonsillectomy, respectively. The creatinine was 94 (78, 133) μmol/L, 95 (74, 139) μmol/L, 106 (87, 158) μmol/L and 95(81, 147) μmol/L before tonsillectomy, 3 months, 1 year and 2 years after tonsillectomy, respectively (P=0.206). Urinary protein quantification was 0.31 (0.16, 1.38) g/24 h, 0.34 (0.10, 1.42) g/24 h, 0.33 (0.11, 0.56) g/24 h and 0.25 (0.10, 0.50) g/24 h at the same time points, respectively (P=0.104). The two patients who returned to dialysis were diagnosed of IgAN by transplant renal biopsy because of elevated creatinine, proteinuria and hematuria, 9 years and 4 years after kidney transplant respectively. Renal biopsy suggested that glomerular and segmental sclerosis were 7/24, 5/24 and 1/6, 2/6, respectively. Additionally, interstitial fibrosis and tubular atrophy (IF/TA) were both occupied 30% in the biopsies, and tonsillectomy was performed 461 days and 1 077 days after diagnosis of IgAN, respectively. Conclusions: Tonsillectomy can maintain the stability of renal function and prevent the aggravation of proteinuria in IgAN patients after renal transplantation. However, if pathology suggests obvious glomerulosclerosis or IF/TA, tonsillectomy may not be effective.
Collapse
Affiliation(s)
- R H Deng
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - J Li
- Department of Otolaryngology, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - H X Zhang
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - J Li
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - Q Fu
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - G Huang
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - L S Liu
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - J G Fei
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - W F Chen
- Department of Pathology, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - S C Yang
- Department of Pathology, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - C X Wang
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| | - S X Deng
- Department of Organ Transplantation, the First Affiliated Hospital of Sun Yat-sen University, Guangzhou 510080, China
| |
Collapse
|
7
|
Tian Y, Li Y, Deng RH, Li N, Wu P, Liu A. A new framework for privacy-preserving biometric-based remote user authentication. JCS 2020. [DOI: 10.3233/jcs-191336] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Affiliation(s)
- Yangguang Tian
- School of Information Systems, Singapore Management University, Singapore. E-mails: ,
| | - Yingjiu Li
- Computer and Information Science, University of Oregon, USA. E-mail:
| | - Robert H. Deng
- School of Information Systems, Singapore Management University, Singapore. E-mails: ,
| | - Nan Li
- School of Electrical Engineering and Computing, University of Newcastle, NSW, Australia. E-mail:
| | - Pengfei Wu
- School of Software and Microelectronics, Peking University, Beijing, China. E-mail:
| | - Anyi Liu
- Department of Computer Science and Engineering, Oakland University, USA. E-mail:
| |
Collapse
|
8
|
Ding W, Hu R, Yan Z, Qian X, Deng RH, Yang LT, Dong M. An Extended Framework of Privacy-Preserving Computation With Flexible Access Control. IEEE Trans Netw Serv Manage 2020. [DOI: 10.1109/tnsm.2019.2952462] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
|
9
|
|
10
|
|
11
|
|
12
|
Wang Y, Pang H, Deng RH, Ding Y, Wu Q, Qin B. Securing messaging services through efficient signcryption with designated equality test. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2019.03.039] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
13
|
|
14
|
|
15
|
Qin B, Liu S, Sun S, Deng RH, Gu D. Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman. Inf Sci (N Y) 2017. [DOI: 10.1016/j.ins.2017.04.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
16
|
Lin KC, Twu MJ, Deng RH, Liu CH. The Impacts of Contact Etch Stop Layer Thickness and Gate Height on Channel Stress in Strained N-Metal Oxide Semiconductor Field Effect Transistors. J Nanosci Nanotechnol 2015; 15:2673-2679. [PMID: 26353480 DOI: 10.1166/jnn.2015.9834] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
The stress induced by strain in the channel of metal oxide semiconductor field effect transistors (MOSFET) is an effective method to boost the device performance. The geometric dimensions of spacer, gate height, and the contact etch stop layer (CESL) are important factors among the feasible booster. This study utilized the mismatch of the thermal expansion coefficients of stressors to simulate the process-induced stress in the N-MOSFET. Different temperatures are applied to different region of the device to generate the required strain. The analysis was performed by well-developed finite element package. The composite spacers with variant width of inserted silicon nitride (SiO2/SiN/SiO2, ONO) were proposed and their impacts on channel stress were compared. Two aspects of the impacts of those factors on the channel stress in the longitudinal direction for N-MOSFET with variant channel length were investigated. Firstly, the channel stresses of device without CESL for different gate heights were studied. Secondly, with stress applied to CESL and ONO spacers, the induced stresses in the channel were analyzed for long/short gate length. Two conclusions were drawn from the results of simulation. The N-MOSFET device without CESL shows that the stressed spacer alone generates compressive stress and the magnitude increases along with higher gate height. The channel stress becomes tensile for device with CESL and increases when the thickness of CESL and the height of gate increase, especially for device with shorter gate length. The gate height plays more significant role in inducing channel stress compared with the thickness of CESL. The channel stress can be used to quantify the mobility of electron/hole for strained MOSFET device. Therefore, with the guideline disclosed in this study, better device performance can be expected for N-MOSFET.
Collapse
|
17
|
|
18
|
Yan Z, Wang G, Niemi V, Deng RH. Editorial: Special issue on trust in cyber, physical and social computing. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.09.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
19
|
Lai J, Li Y, Deng RH, Weng J, Guan C, Yan Q. Towards semantically secure outsourcing of association rule mining on categorical data. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.01.040] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
20
|
|
21
|
|
22
|
Affiliation(s)
- Robert H. Deng
- School of Information Systems, Singapore Management University, Singapore
| | - Yingjiu Li
- School of Information Systems, Singapore Management University, Singapore
| | - Moti Yung
- Google Inc., Mountain View, CA, USA
- Columbia University, New York, NY, USA
| | - Yunlei Zhao
- Software School, Fudan University, Shanghai, China
| |
Collapse
|
23
|
Ye D, Ma L, Wang L, Deng RH. Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method. INT J COMPUT INT SYS 2011. [DOI: 10.1080/18756891.2011.9727829] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022] Open
|
24
|
Ye D, Ma L, Wang L, Deng RH. Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method. INT J COMPUT INT SYS 2011. [DOI: 10.2991/ijcis.2011.4.5.4] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/31/2022] Open
|
25
|
Abstract
Teleophthalmology (TeleOph) is an electronic counterpart of today's face-to-face, patient-to-specialist ophthalmology system. It enables one or more ophthalmologists to remotely examine a patient's condition via a confidential and authentic communication channel. Specifically, TeleOph allows a trained nonspecialist in a primary clinic to screen the patients with digital instruments (e.g., camera, ophthalmoscope). The acquired medical data are delivered to the hospital where an ophthalmologist will review the data collected and, if required, provide further consultation for the patient through a real-time secure channel established over a public Internet network. If necessary, the ophthalmologist is able to further sample the images/video of the patient's eyes remotely. In order to increase the productivity of the ophthalmologist in terms of number of patients reviewed, and to increase the efficiency of network resource, we manage the network bandwidth based on a Poisson model to estimate patient arrival at the clinics, and the rate of ophthalmologist consultation service for better overall system efficiency. The main objective of TeleOph is therefore to provide the remote patients with a cost-effective access to specialist's eye checkups at primary healthcare clinics, and at the same time, minimize unnecessary face-to-face consultation at the hospital specialist's center.
Collapse
Affiliation(s)
- Yongdong Wu
- Institute for Infocomm Research, Singapore 138632.
| | | | | | | | | | | | | |
Collapse
|
26
|
|
27
|
Abstract
This paper describes a secure and synthesis ophthalmology telemedicine system, referred to as TeleOph. Under a Secure Socket Layer (SSL) channel, patient prerecorded data can be safely transferred via the Internet. With encrypted videoconference and white-board, the system not only supports hospital-to-clinic consultation, but also supplies hospital-tohospital joint discussion. Based on Directshow technology (Microsoft Corporation, Redmond, WA), video cameras connected to the computer by firewire can be captured and controlled to sample video data. By using TWAIN technology, the system automatically identifies networked still cameras (on fundus and slitlamp devices) and retrieves images. All the images are stored in a selected format (such as JPEG, DICOM, BMP). Besides offline-transferring prerecorded data, the system also supplies online sampling of patient data (real-time capturing from remote places). The system was deployed at Tan Tock Seng Hospital, Singapore and Ang Mo Kio, Singapore, where 100 patients were enrolled in the system for examination. TeleOph can be successfully used for patient consultation, and hospital joint discussion. Meanwhile, TeleOph can supply both offline and online sampling of patient data.
Collapse
Affiliation(s)
- Zhuo Wei
- College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China
| | | | | | | | | | | | | | | | | |
Collapse
|
28
|
Bao F, Deng RH, Ooi BC, Yang Y. Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans Inf Technol Biomed 2005; 9:554-63. [PMID: 16379372 DOI: 10.1109/titb.2005.855556] [Citation(s) in RCA: 48] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
It is accepted that digital watermarking is quite relevant in medical imaging. However, due to the special nature of clinical practice, it is often required that watermarking not introduce irreversible distortions to medical images. The electronic clinical atlas has such a need of "lossless" watermarking. We present two tailored reversible watermarking schemes for the clinical atlas by exploiting its inherent characteristics. We have implemented the schemes and our experimental results look very promising.
Collapse
Affiliation(s)
- Feng Bao
- Institute for Infocomm Research, Singapore.
| | | | | | | |
Collapse
|
29
|
|
30
|
Abstract
Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.
Collapse
|