[HTML][HTML] Promoting adversarial transferability via dual-sampling variance aggregation and feature heterogeneity attacks

Y Huang, Y Chen, X Wang, J Yang, Q Wang - Electronics, 2023 - mdpi.com
At present, deep neural networks have been widely used in various fields, but their
vulnerability requires attention. The adversarial attack aims to mislead the model by …

[HTML][HTML] Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

Y Luo, Y Chen, T Li, C Tan, H Dou - Journal of Cloud Computing, 2024 - Springer
Cloud computing has data leakage from all parties, security protection of private data, and
existing solutions do not provide a trade-off between security and overhead. With distributed …

DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution

Y Sun, Y Chen, P Wu, X Wang, Q Wang - Computer Communications, 2023 - Elsevier
Adversarial robustness has attracted extensive studies in various fields by increasing the
interpretability of deep learning and enhancing the understanding of neural network models …

[HTML][HTML] VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme

Y Tang, Y Chen, Y Luo, S Dong, T Li - Applied Sciences, 2023 - mdpi.com
Public key encryption with keyword search (PEKS) allows users to perform keyword
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …

[HTML][HTML] ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

R Shi, Y Chen, C Tan, Y Luo, T Li - Journal of Cloud Computing, 2023 - Springer
The traditional threshold secret sharing scheme only allows the participants' sub-secret
shares to be used once in the reconstruction process. Several multi-secret sharing schemes …

An Effective Security Comparison Protocol in Cloud Computing

Y Chen, J Tao, T Li, J Cai, X Ren - 2022 - researchsquare.com
Secure comparison protocol is an important branch of secure multi-party computation
(SMPC), which compares the size of input data without disclosing any information between …

A Survey on Smart Intelligent Computing and Its Applications

R Yadav, MS Manshahia, MP Chaudhary… - … Conference on Intelligent …, 2023 - Springer
Smart intelligent computing has emerged as a key technology in the field of computer
science and engineering. It has revolutionized the way we interact with machines and has …