Found: 35
Select item for more details and to access through your institution.
Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation Support.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 12, p. 2378, doi. 10.3390/electronics13122378
- By:
- Publication type:
- Article
Federated Learning Incentive Mechanism with Supervised Fuzzy Shapley Value.
- Published in:
- Axioms (2075-1680), 2024, v. 13, n. 4, p. 254, doi. 10.3390/axioms13040254
- By:
- Publication type:
- Article
Blockchain-Based Key Management Scheme Using Rational Secret Sharing.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 1, p. 307, doi. 10.32604/cmc.2024.047975
- By:
- Publication type:
- Article
Federated Learning Backdoor Attack Based on Frequency Domain Injection.
- Published in:
- Entropy, 2024, v. 26, n. 2, p. 164, doi. 10.3390/e26020164
- By:
- Publication type:
- Article
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 138, n. 1, p. 827, doi. 10.32604/cmes.2023.029039
- By:
- Publication type:
- Article
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 138, n. 1, p. 917, doi. 10.32604/cmes.2023.027276
- By:
- Publication type:
- Article
Stable and Fast Deep Mutual Information Maximization Based on Wasserstein Distance.
- Published in:
- Entropy, 2023, v. 25, n. 12, p. 1607, doi. 10.3390/e25121607
- By:
- Publication type:
- Article
Low distortion reversible database watermarking based on hybrid intelligent algorithm.
- Published in:
- Mathematical Biosciences & Engineering, 2023, v. 20, n. 12, p. 21315, doi. 10.3934/mbe.2023943
- By:
- Publication type:
- Article
A mobile energy trading scheme based on Lightning Network.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 20, p. 1, doi. 10.1002/cpe.6623
- By:
- Publication type:
- Article
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 20, p. 1, doi. 10.1002/cpe.7193
- By:
- Publication type:
- Article
Secure Ring Signature Scheme for Privacy-Preserving Blockchain.
- Published in:
- Entropy, 2023, v. 25, n. 9, p. 1334, doi. 10.3390/e25091334
- By:
- Publication type:
- Article
Federated Learning Incentive Mechanism Design via Shapley Value and Pareto Optimality.
- Published in:
- Axioms (2075-1680), 2023, v. 12, n. 7, p. 636, doi. 10.3390/axioms12070636
- By:
- Publication type:
- Article
Wasserstein Distance-Based Deep Leakage from Gradients.
- Published in:
- Entropy, 2023, v. 25, n. 5, p. 810, doi. 10.3390/e25050810
- By:
- Publication type:
- Article
Fast and Accurate Deep Leakage from Gradients Based on Wasserstein Distance.
- Published in:
- International Journal of Intelligent Systems, 2023, p. 1, doi. 10.1155/2023/5510329
- By:
- Publication type:
- Article
Image Adversarial Example Generation Method Based on Adaptive Parameter Adjustable Differential Evolution.
- Published in:
- Entropy, 2023, v. 25, n. 3, p. 487, doi. 10.3390/e25030487
- By:
- Publication type:
- Article
FaceEncAuth:Face Recognition Privacy Security Scheme Based on FaceNet and SMAlgorithms.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 11, p. 93, doi. 10.3778/j.issn.1002-8331.2112-0517
- By:
- Publication type:
- Article
GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel.
- Published in:
- Entropy, 2022, v. 24, n. 3, p. 430, doi. 10.3390/e24030430
- By:
- Publication type:
- Article
Federated Learning Incentive Mechanism Design via Enhanced Shapley Value Method.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/9690657
- By:
- Publication type:
- Article
PCA-based membership inference attack for machine learning models.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2022, v. 43, n. 1, p. 149, doi. 10.11959/j.issn.1000-436x.2022009
- By:
- Publication type:
- Article
K-Implicit Tracking Data Publishing Scheme Against Geo-Matching Attacks.
- Published in:
- Journal of Information Science & Engineering, 2022, v. 38, n. 1, p. 1, doi. 10.6688/JISE.202201_38(1).0001
- By:
- Publication type:
- Article
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5592191
- By:
- Publication type:
- Article
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6692061
- By:
- Publication type:
- Article
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 3, p. 1414, doi. 10.1007/s12083-020-01035-9
- By:
- Publication type:
- Article
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6654539
- By:
- Publication type:
- Article
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/8824915
- By:
- Publication type:
- Article
An Efficient Plaintext-Related Chaotic Image Encryption Scheme Based on Compressive Sensing.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 3, p. 758, doi. 10.3390/s21030758
- By:
- Publication type:
- Article
A Novel Chaos-Based Image Encryption Scheme by Using Randomly DNA Encode and Plaintext Related Permutation.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 21, p. 7469, doi. 10.3390/app10217469
- By:
- Publication type:
- Article
A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 9, p. 1497, doi. 10.3390/sym12091497
- By:
- Publication type:
- Article
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2020, v. 17, n. 4, p. 450, doi. 10.34028/iajit/17/4/3
- By:
- Publication type:
- Article
Weighted composite quantile regression for single index model with missing covariates at random.
- Published in:
- Computational Statistics, 2019, v. 34, n. 4, p. 1711, doi. 10.1007/s00180-019-00886-y
- By:
- Publication type:
- Article
Privacy-Preserving Monotonicity of Differential Privacy Mechanisms.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 11, p. 2081, doi. 10.3390/app8112081
- By:
- Publication type:
- Article
A novel plaintext-related image encryption scheme using hyper-chaotic system.
- Published in:
- Nonlinear Dynamics, 2018, v. 94, n. 2, p. 1319, doi. 10.1007/s11071-018-4426-4
- By:
- Publication type:
- Article
Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 7, p. 3497, doi. 10.3837/tiis.2018.07.027
- By:
- Publication type:
- Article
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks.
- Published in:
- Wireless Communications & Mobile Computing, 2018, p. 1, doi. 10.1155/2018/9437936
- By:
- Publication type:
- Article
Fair (t, n) threshold secret sharing scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 106, doi. 10.1049/iet-ifs.2012.0064
- By:
- Publication type:
- Article