The Large Language Models (LLMs) are poised to offer efficient and
intel...
With the emergence of privacy leaks in federated learning, secure aggreg...
In order to save computing power yet enhance safety, there is a strong
i...
Considerable attention has been paid to dynamic searchable symmetric
enc...
Fueled by its successful commercialization, the recommender system (RS) ...
Sparse inner product (SIP) has the attractive property of overhead being...
Searchable symmetric encryption (SSE) supports keyword search over outso...
Despite the widespread use of encryption techniques to provide
confident...
The cloud computing technique, which was initially used to mitigate the
...
Sharding is the prevalent approach to breaking the trilemma of simultane...
A corpus of recent work has revealed that the learned index can improve ...
The advances of the Internet of Things (IoT) have had a fundamental impa...
Smart contract has been regarded as one of the most promising and appeal...
Privacy-preserving applications allow users to perform on-line daily act...
The Internet of Thing (IoT) has been a hot topic in both research commun...