Loading…
Loading…
Loading…
Loading…
Loading…
Threshold Homomorphic Encryption From Provably Secure NTRU
Xu, Kexin, Hong Meng Tan, Benjamin, Wang, Li-Ping, Mi Mi Aung, Khin, Wang, Huaxiong
Published in Computer journal (14.12.2023)
Published in Computer journal (14.12.2023)
Get full text
Journal Article
Loading…
Loading…
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori
Zhang, Li, Zhang, Yu, Wu, Wenling, Mao, Yongxia, Zheng, Yafei
Published in Computer journal (17.02.2024)
Published in Computer journal (17.02.2024)
Get full text
Journal Article
Loading…
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions
Moreno Arboleda, Francisco Javier, Garani, Georgia, Bolivar Zapata, Carlos Daniel
Published in Computer journal (17.02.2024)
Published in Computer journal (17.02.2024)
Get full text
Journal Article
Loading…
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage
Yang, Tian, Ma, Sha, Du, Jiaojiao, Jiang, Chengyu, Huang, Qiong
Published in Computer journal (17.02.2024)
Published in Computer journal (17.02.2024)
Get full text
Journal Article
Loading…
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention
Xue, Yuliang, Zhu, Yuhao, Zhu, Zhiying, Li, Sheng, Qian, Zhenxing, Zhang, Xinpeng
Published in Computer journal (17.02.2024)
Published in Computer journal (17.02.2024)
Get full text
Journal Article
Loading…
Loading…
Evaluating Membership Inference Through Adversarial Robustness
Zhang, Zhaoxi, Yu Zhang, Leo, Zheng, Xufei, Hussain Abbasi, Bilal, Hu, Shengshan
Published in Computer journal (11.11.2022)
Published in Computer journal (11.11.2022)
Get full text
Journal Article
Loading…
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network
Wang, Xiaodi, Pan, Xiaoge, Yang, Tian, Xie, Jianhua, Tang, Mingwei
Published in Computer journal (19.05.2023)
Published in Computer journal (19.05.2023)
Get full text
Journal Article
Loading…
A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm
Xu, Zhiwang, Qin, Huibin, Yang, Shengying, Arefzadeh, Seyedeh Maryam
Published in Computer journal (15.03.2023)
Published in Computer journal (15.03.2023)
Get full text
Journal Article
Loading…
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning
Tian, Yuchen, Zhang, Weizhe, Simpson, Andrew, Liu, Yang, Jiang, Zoe Lin
Published in Computer journal (15.03.2023)
Published in Computer journal (15.03.2023)
Get full text
Journal Article
Loading…
Loading…
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain
Zhang, Jiaomei, Ye, Ayong, Chen, Jianwei, Zhang, Yuexin, Yang, Wenjie
Published in Computer journal (21.04.2024)
Published in Computer journal (21.04.2024)
Get full text
Journal Article
Loading…
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros
Hou, Shiqi, Wu, Baofeng, Wang, Shichang, Guo, Hao, Lin, Dongdai
Published in Computer journal (21.04.2024)
Published in Computer journal (21.04.2024)
Get full text
Journal Article