Privacy-preserving face recognition with multi-edge assistance for intelligent security systems

W Gao, J Yu, R Hao, F Kong… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Face recognition is one of the key technologies in intelligent security systems. Data privacy
and identification efficiency have always been concerns about face recognition. Existing …

High throughput implementation of post-quantum key encapsulation and decapsulation on GPU for Internet of Things applications

WK Lee, SO Hwang - IEEE Transactions on Services …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) sensor nodes are placed ubiquitously to collect information, which is
then vulnerable to malicious attacks. For instance, adversaries can perform side channel …

Blockchain-based two-party fair contract signing scheme

L Zhang, H Zhang, J Yu, H Xian - Information Sciences, 2020 - Elsevier
A fair contract signing scheme ensures that contract signing participants can fairly exchange
the digital signatures of the contract, which has a wide range of applications on the Internet …

Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things

H Zhang, J Yu, C Tian, G Xu, P Gao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …

Certificateless cloud storage auditing supporting data ownership transfer

Y Huang, W Shen, J Qin - Computers & Security, 2024 - Elsevier
Cloud storage auditing allows the data owner/verifier to check whether the cloud correctly
stores data owners' data. In cloud storage auditing scenario, data ownership transfer is a …

Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance

X Sun, C Tian, C Hu, W Tian, H Zhang, J Yu - Computers & Security, 2022 - Elsevier
In the current cloud computing era, outsourcing overloaded computations to cloud servers
has become an increasingly popular computing paradigm. Meanwhile, face recognition …

Optimization scheme for intrusion detection scheme GBDT in edge computing center

J Cui, H Xia, R Zhang, B Hu, X Cheng - Computer Communications, 2021 - Elsevier
Combination of edge computing technologies and machine learning help to put edge
intelligence into practice. Industrial Internet of Things (IIoT) is one of its most typical …

Secure edge-aided computations for social Internet-of-Things systems

H Zhang, J Yu, MS Obaidat… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Devices in the Internet-of-Things (IoT) are networked and perform massive computations to
support various social IoT systems. Applications in social IoT systems often involve …

Efficient and secure outsourcing scheme for RSA decryption in Internet of Things

H Zhang, J Yu, C Tian, L Tong, J Lin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …

Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database

K Yang, C Tian, H Xian, W Tian, Y Zhang - World Wide Web, 2023 - Springer
In the current cloud computing and big data era, outsourcing the storage and associated
query operations of large-scale databases to cloud service providers has become an …