D Natarajan, A Loveless, W Dai… - Cryptology ePrint …, 2021 - eprint.iacr.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable applications. But, there exists an underlying tension: users wish to keep their data private …
Z Tong, F Ye, B Liu, J Cai, J Mei - Neurocomputing, 2021 - Elsevier
Task scheduling has always been one of the crucial problem in cloud computing. With the transition of task types from static batch processing to dynamic stream processing, the …
H Sedjelmaci, N Kaaniche… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Sixth Generation Heterogeneous Network (6G HetNet) is a global interconnected system that serves a myriad variety of applications and services across multiple domains …
T Ma, C Xu, S Yang, Y Huang, Q An… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Kubernetes (K8s) has become a core technology for cloud-native applications. However, a design flaw of the external IP in K8s leads to the service-oriented man-in-the-middle attack …
Y Chen, J Jiang, S Yan, H Xu - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
Intel SGX is a promising TEE technique that can protect programs running in user space from being maliciously accessed by the host operating system. Although it provides …
Secure computing methods such as fully homomorphic encryption and hardware solutions such as Intel Software Guard Extension (SGX) have been applied to provide security for user …
Abstract Outsourcing Machine Learning (ML) tasks to cloud servers is a cost-effective solution when dealing with distributed data. However, outsourcing these tasks to cloud …
Fully homomorphic encryption (FHE) is a powerful encryption technique that allows for computation to be performed on ciphertext without the need for decryption. FHE will thus …
D Natarajan, A Loveless, W Dai… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable applications. But, there exists an underlying tension: users wish to keep their data private …