UM

Browse/Search Results:  1-10 of 45 Help

Selected(0)Clear Items/Page:    Sort:
Compressive Imaging Encryption with Secret Sharing Metasurfaces Journal article
Advanced Optical Materials, 2022,Volume: 10,Issue: 15
Authors:  Zheng, Peixia;  Li, Jiaxin;  Li, Zile;  Ge, Mingzheng;  Zhang, Shuang;  Zheng, Guoxing;  Liu, Hong Chao
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2022/08/05
Computational Ghost Imaging  Metasurface Holography  Visual Cryptography  
Privacy-preserving and verifiable deep learning inference based on secret sharing Journal article
Neurocomputing, 2022,Volume: 483,Page: 221-234
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman;  Huang, Caishi
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/04
Deep Learning Prediction  Deep Neural Network Inference  Privacy-preserving  Secure Multi-party Computation  Verifiable Computation  
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite |  | TC[WOS]:2 TC[Scopus]:1 | Submit date:2022/05/17
Cipher-feedback Secret Sharing  Ciphers  Cloud Computing  Correlation  Cryptography  Encrypted Image  Homomorphic Encryption  Multiple Data Hiders  Prediction Methods  Reversible Data Hiding  Servers  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:7 TC[Scopus]:7 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Optical ghost cryptography and steganography Journal article
Optics and Lasers in Engineering, 2020,Page: 106094-1-106094-5
Authors:  Liu, H.;  Chen, W.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/06/05
ghost imaging  cryptography  steganography  
Optical ghost cryptography and steganography Journal article
Optics and Lasers in Engineering, 2020,Volume: 130
Authors:  Liu, Hong Chao;  Chen, Wen
Favorite |  | TC[WOS]:11 TC[Scopus]:12 | Submit date:2021/11/30
Computational Ghost Imaging  Ghost Cryptography  Ghost Steganography  Optical Data Processing  Reconstruction Techniques  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:10 TC[Scopus]:11 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
A novel text encryption algorithm based on core adaptive Fourier decomposition Conference paper
ACM International Conference Proceeding Series, Sanya, Hainan, China, December 20 - 22, 2019.
Authors:  Dai, Lei;  Ye, Zhijing;  Zhang, Liming;  Qian, Tao
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/17
Adaptive Fourier Decomposition  Cryptography  Signal Processing  Text Encryption  
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism Journal article
Applied Sciences (Switzerland), 2019,Volume: 9,Issue: 23
Authors:  Shih-Yu Li;  Miguel Angel Benalcázar Hernández;  Lap-Mou Tam;  Chin-Sheng Chen
Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2021/03/09
Smart Automation  Cyberphysical Systems  Cloud Data Protection  Cryptography  
A Cloud Image Data Protection Algorithm with Multilevel Encryption Scheme and Automated-Selection Mechanism Journal article
Applied Sciences, 2019,Page: 5146-5163
Authors:  Li, S. Y.;  Hernandez, M. A. B.;  Tam, L. M.;  Chen, C. S.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/29
Smart automation  Cyberphysical systems  Cloud data protection  Cryptography