Adversarial attacks on deep learning-based models pose a significant thr...
Backdoor attacks have been a critical threat to deep neural network (DNN...
Trojan attacks on deep neural networks are both dangerous and surreptiti...
Cooperative learning, that enables two or more data owners to jointly tr...
The reengineering process of large data-intensive legacy software
applic...
Internet of Things based systems (IoT systems for short) are becoming
in...
A signcryption, which is an integration of a public key encryption and a...
The concept of proxy re-encryption (PRE) dates back to the work of Blaze...
Identity-based encryption with equality test supporting flexible
authori...
Blind signatures play an important role in both electronic cash and
elec...
At CRYPTO 2017, Rosca, Sakzad, Stehle and Steinfeld introduced the
Middl...
Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2...
Proxy re-encryption (PRE) securely enables the re-encryption of cipherte...
Public key encryption with equality test (PKEET) supports to check wheth...
Public key encryption with equality test (PKEET) allows testing whether ...
Malicious web domains represent a big threat to web users' privacy and
s...
The Internet of Things (IoT) is experiencing explosive growth and has ga...