Computer Science ›› 2025, Vol. 52 ›› Issue (11): 415-424.doi: 10.11896/jsjkx.241100101
• Information Security • Previous Articles Next Articles
HE Yuyu1,2,3, ZHOU Feng1, TIAN Youliang3,4, XIONG Wei1, WANG Shuai1,2,3
CLC Number:
| [1]LIM W Y B,LUONG N C,HOANG D T,et al.Federated lear-ning in mobile edge networks:A comprehensive survey[J].IEEE Communications Surveys Tutorials,2020,22(3):2031-2063. [2]BISWAS A,WANG H C.Autonomous vehicles enabled by the integration of IoT,edge intelligence,5G,and blockchain[J].Sensors,2023,23(4):1963. [3]WANG Z Y,XIONG H Y,ZHANG J,et al.From personalized medicine to population health:a survey of mHealth sensing techniques[J].IEEE Internet of Things Journal,2022,9(17):15413-15434. [4]ZHANG Y M,CHEN Y M,BAI X,et al.Adaptive unimodalcost volume filtering for deep stereo matching[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020:12926-12934. [5]SIMONYAN K,ZISSERMAN A.Very deep convolutional networks for large-scale image recognition[J].arXiv:1409.1556,2014. [6]LIU B,DING M,SHAHAM S,et al.When machine learningmeets privacy:A survey and outlook[J].ACM Computing Surveys,2021,54(2):1-36. [7]LI W D,OU J W.Machine scheduling with restricted rejection:An Application to task offloading in cloud-edge collaborative computing[J].European Journal of Operational Research,2024,314(3):912-919. [8]GUPTA S,CAMMAROTA R,ŠIMUNIĆ T.Memfhe:End-to-end computing with fully homomorphic encryption in memory[J].ACM Transactions on Embedded Computing Systems,2024,23(2):1-23. [9]ZHANG J W,KANG X,LIU Y,et al.A secure and lightweight multi-party private intersection-sum scheme over a symmetric cryptosystem[J].Symmetry,2023,15(2):319. [10]GILAD-BACHRACH R,DOWLIN N,LAINE K,et al.Cryptonets:Applying neural networks to encrypted data with high throughput and accuracy[C]//International Conference on Machine Learning.PMLR,2016:201-210. [11]MOHASSEL P,RINDAL P.ABY3:A mixed protocol framework for machine learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:35-52. [12]RATHEE D,RATHEE M,KUMAR N,et al.Cryptflow2:Practical 2-party secure inference[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:325-342. [13]DITTMER S,ISHAI Y,LU S,et al.Authenticated garblingfrom simple correlations[C]//Annual International Cryptology Conference.Cham:Springer,2022:57-87. [14]BORGES R,SEBÉ F.An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer[J].The Computer Journal,2023,67(3):933-940. [15]XIONG J B,BI R W,ZHAO M F,et al.Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles[J].IEEE Wireless Communications,2020,27(3):24-30. [16]HUANG K,LIU X M,FU S J,et al.A lightweight privacy-preserving CNN feature extraction framework for mobile sensing[J].IEEE Transactions on Dependable and Secure Computing,2021,18(3):1441-1455. [17]YANG X,CHEN J,HE K,et al.Efficient privacy-preserving inference outsourcing for convolutional neural networks[J].IEEE Transactions on Information Forensics and Security,2023,18:4815-4829. [18]PENG Y X,SUN K H,HE S B.A discrete memristor model and its application in Hénon map[J].Chaos,Solitons & Fractals,2020,137:109873. [19]ZHENG Y Z,LI L,QIAN L,et al.Sine-SSA-BP ship trajectory prediction based on chaotic mapping improved sparrow search algorithm[J].Sensors,2023,23(2):704. [20]BOGDANOV D,NIITSOO M,TOFT T,et al.High-perfor-mance secure multi-party computation for data mining applications[J].International Journal of Information Security,2012,11:403-418. [21]ARAKI T,FURUKAWA J,LINDELL Y,et al.High-throughput semi-honest secure three-party computation with an honest majority[C]//Proceedings of the 2016 ACM SIGSAC Confe-rence on Computer and Communications Security.2016:805-817. [22]QIN Z,YAN J B,REN K,et al.Towards efficient privacy-preserving image feature extraction in cloud computing[C]//Proceedings of the 22nd ACM International Conference on Multimedia.2014:497-506. [23]WANG J J,HU S S,WANG Q,et al.Privacy-preserving outsourced feature extractions in the cloud:A survey[J].IEEE Network,2017,31(5):36-41. [24]BEAVER D.Efficient multiparty protocols using circuit ran-domization[C]//Advances in Cryptology(CRYPTO'91).Berlin:Springer,1992:420-432. [25]XIONG J B,BI R W,TIAN Y L,et al.Toward lightweight,privacy-preserving cooperative object classification for connected autonomous vehicles[J].IEEE Internet of Things Journal,2021,9(4):2787-2801. [26]BOGDANOV D,LAUR S,WILLEMSON J.Sharemind:Aframework for fast privacy-preserving computations[C]//Computer Security-ESORICS 2008:13th European Symposium on Research in Computer Security.Berlin:Springer,2008:192-206. [27]GEIGER A,LENZ P,STILLER C,et al.Vision meets robotics:The kitti dataset[J].The International Journal of Robotics Research,2013,32(11):1231-1237. [28]LIU J,JUUTI M,LU Y,et al.Oblivious neural network predictions via minionn transformations[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.2017:619-631. [29]LI S H,XUE K P,ZHU B,et al.Falcon:A fourier transformbased approach for fast and secure convolutional neural network predictions[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8705-8714. |
| [1] | WEI Xiaohui, GUAN Zeyu, WANG Chenyang, YUE Hengshan, WU Qi. Hardware-Software Co-design Fault-tolerant Strategies for Systolic Array Accelerators [J]. Computer Science, 2025, 52(5): 91-100. |
| [2] | SUN Yang, DING Jianwei, ZHANG Qi, WEI Huiwen, TIAN Bowen. Study on Super-resolution Image Reconstruction Using Residual Feature Aggregation NetworkBased on Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600039-6. |
| [3] | LIU Hui, JI Ke, CHEN Zhenxiang, SUN Runyuan, MA Kun, WU Jun. Malicious Attack Detection in Recommendation Systems Combining Graph Convolutional Neural Networks and Ensemble Methods [J]. Computer Science, 2024, 51(6A): 230700003-9. |
| [4] | WANG Bin, LI Haixiao, CHEN Rongrong. Dual-color Image Encryption System with Improved Lifting-like Scheme [J]. Computer Science, 2024, 51(6A): 230500007-11. |
| [5] | AN Yang, WANG Xiuqing, ZHAO Minghua. Mobile Robots' Path Planning Method Based on Policy Fusion and Spiking Deep ReinforcementLearning [J]. Computer Science, 2024, 51(11A): 240100211-11. |
| [6] | JIANG Sheng, ZHU Jianhong. Face Micro-expression Recognition Method Based on ME-ResNet [J]. Computer Science, 2024, 51(11A): 231000053-7. |
| [7] | ZENG Congai, LIU Yali, CHEN Shuyi, ZHU Xiuping, NING Jianting. Multi-type K-nearest Neighbor Query Scheme with Mutual Privacy-preserving in Road Networks [J]. Computer Science, 2024, 51(11): 400-417. |
| [8] | LUO Huilan, LONG Jun, LIANG Miaomiao. Attentional Feature Fusion Approach for Siamese Network Based Object Tracking [J]. Computer Science, 2023, 50(6A): 220300237-9. |
| [9] | HUANG Yujiao, CHEN Mingkai, ZHENG Yuan, FAN Xinggang, XIAO Jie, LONG Haixia. Text Classification Based on Weakened Graph Convolutional Networks [J]. Computer Science, 2023, 50(6A): 220700039-5. |
| [10] | ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381. |
| [11] | WANG Xiaofei, FAN Xueqiang, LI Zhangwei. Improving RNA Base Interactions Prediction Based on Transfer Learning and Multi-view Feature Fusion [J]. Computer Science, 2023, 50(3): 164-172. |
| [12] | MEI Pengcheng, YANG Jibin, ZHANG Qiang, HUANG Xiang. Sound Event Joint Estimation Method Based on Three-dimension Convolution [J]. Computer Science, 2023, 50(3): 191-198. |
| [13] | CHEN Qiaosong, WU Jiliang, JIANG Bo, TAN Chongchong, SUN Kaiwei, DEN Xin, WANG Jin. Coupling Local Features and Global Representations for 2D Human Pose Estimation [J]. Computer Science, 2023, 50(11A): 221100007-5. |
| [14] | ZHANG Kaixuan, CAI Guoyong, ZHU Kunri. Image Aesthetics-enhanced Visual Perception Recommendation System [J]. Computer Science, 2023, 50(11A): 221100083-8. |
| [15] | ZHANG Lianfu, TAN Zuowen. Federated Learning Privacy-preserving Approach for Multimodal Medical Data [J]. Computer Science, 2023, 50(11A): 230800021-8. |
|
||