Privacy and security issues in deep learning: A survey

X Liu, L Xie, Y Wang, J Zou, J Xiong, Z Ying… - IEEE …, 2020 - ieeexplore.ieee.org
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Blockchain-enabled intelligent transportation systems: a distributed crowdsensing framework

Z Ning, S Sun, X Wang, L Guo, S Guo… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Intelligent Transportation System (ITS) is critical to cope with traffic events, eg, traffic jams
and accidents, and provide services for personal traveling. However, existing researches …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

Enhancing privacy and availability for data clustering in intelligent electrical service of IoT

J Xiong, J Ren, L Chen, Z Yao, M Lin… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The ever-growing demand for electrical energy of sensing devices in the Internet of Things
(IoT) has led to generating large amounts of electricity consumption data. Electricity service …

Doren: toward efficient deep convolutional neural networks with fully homomorphic encryption

S Meftah, BHM Tan, CF Mun, KMM Aung… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) is a powerful cryptographic primitive to secure
outsourced computations against an untrusted third-party provider. With the growing …

Fine-grained data access control with attribute-hiding policy for cloud-based IoT

J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen - Computer Networks, 2019 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve
fine-grained access control over the outsourced data in Internet of Things (IoT). However, in …

[HTML][HTML] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing

M Sohal, S Sharma - Journal of King Saud University-Computer and …, 2022 - Elsevier
Cloud computing facilitates the storage and management of huge volumes of data. It offers
flexibility for retrieving the data anytime and anywhere. In recent years, storing data onto the …

SOCI: A toolkit for secure outsourced computation on integers

B Zhao, J Yuan, X Liu, Y Wu, HH Pang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure outsourced computation is a key technique for protecting data security and privacy in
the cloud. Although fully homomorphic encryption (FHE) enables computations over …

Prisec: Comparison of symmetric key algorithms for iot devices

DAF Saraiva, VRQ Leithardt, D de Paula… - Sensors, 2019 - mdpi.com
With the growing number of heterogeneous resource-constrained devices connected to the
Internet, it becomes increasingly challenging to secure the privacy and protection of data …