|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Xin Liao and Khoi D. Hoang
Distributed Constraint Optimization Problems (DCOPs) are an efficient framework widely used in multi-agent collaborative modeling. The traditional DCOP framework assumes that variables are discrete and constraint utilities are represented in tabular form...
ver más
|
|
|
|
|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Yang Yang and Guanghua Song
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing...
ver más
|
|
|
|
|
|
|
Bin Cheng, Ping Chen, Xin Zhang, Keyu Fang, Xiaoli Qin and Wei Liu
With the rapid development of ubiquitous data collection and data analysis, data privacy in a recommended system is facing more and more challenges. Differential privacy technology can provide strict privacy protection while reducing the risk of privacy ...
ver más
|
|
|
|
|
|
|
Liping Zhang, Jing Li and Song Li
A new spatial keyword group query method is proposed in this paper to address the existing issue of user privacy leakage and exclusion of preferences in road networks. The proposed query method is based on the IGgram-tree index and minimum hash set. To d...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Mohit Kumar, Bernhard A. Moser, Lukas Fischer and Bernhard Freudenthaler
In order to develop machine learning and deep learning models that take into account the guidelines and principles of trustworthy AI, a novel information theoretic approach is introduced in this article. A unified approach to privacy-preserving interpret...
ver más
|
|
|
|