- Machine Learning and Differential Privacy.- Large Vision-Language Model Security: A Survey.- A Robust Linked List Steganography Without Embedding for Digital Images.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.- On the Differential Transparency Order of Boolean Functions.- Federated Learning.
- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.- Privacy-Preserving Services.- Secure Cloud Album: Design and Implementation.
- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.- Advertising Diversion App using Clipboard Content Recognition.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.- Blockchain and Distributed System.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.- Public-Key Cryptography.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.- A Quantum-Resistant Blockchain Based on Hash Function.- Multi-Party Computation.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.