UM

Browse/Search Results:  1-10 of 16 Help

Selected(0)Clear Items/Page:    Sort:
PECCO: A profit and cost‐oriented computation offloading scheme in edge‐cloud environment with improved Moth‐flame optimization Journal article
Concurrency and Computation: Practice and Experience, 2022,Page: e7163
Authors:  Jiashu Wu;  Hao Dai;  Yang Wang;  Shigen Shen;  Chengzhong Xu
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/16
Cloud Computing, edge-Cloud Computation Offloading, Internet Of Things, Moth-flame Optimizer  
English textbook selection in Taiwan: Voices of two book sales representatives Journal article
Education Research International, 2022,Volume: 2022,Page: 1-6
Authors:  Barry Lee Reynolds;  Xuan Van Ha;  Melissa H. Yu
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/06/07
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:7 TC[Scopus]:8 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Homo-ELM: fully homomorphic extreme learning machine Journal article
International Journal of Machine Learning and Cybernetics, 2020,Volume: 11,Issue: 7,Page: 1531-1540
Authors:  Wang,Weiru;  Gan,Yanfen;  Vong,Chi Man;  Chen,Chuangquan
Favorite |  | TC[WOS]:2 TC[Scopus]:2 | Submit date:2021/03/11
Encrypted Image Classification  Encrypted Machine Learning  Extreme Learning Machine  Fully Homomorphic Encryption  Privacy Preservation  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:10 TC[Scopus]:11 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
Homo-ELM: fully homomorphic extreme learning machine Journal article
International Journal of Machine Learning and Cybernetics (SCI-E), 2020,Page: 1531-1540
Authors:  Wang, W.R.;  Gan, W.F.;  Vong, C. M.;  Chen, C.Q.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/09
Encrypted Machine Learning  Fully Homomorphic Encryption  Privacy Preservation  Extreme Learning Machine  Encrypted Image Classification  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2017,Volume: 430,Page: 228-239
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang;  Guanrong Chen
Adobe PDF | Favorite |  | TC[WOS]:39 TC[Scopus]:41 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Encrypted image classification based on multilayer extreme learning machine Journal article
Multidimensional Systems and Signal Processing (SCI-E), 2017,Page: 851-865
Authors:  Wang, W.;  Vong, C. M.;  Yang, Y.;  Wong, P. K.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/09
Encrypted image classification  Privacy preservation  Multi layer extreme learning machine  ELM auto encoder  
Encrypted image classification based on multilayer extreme learning machine Journal article
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017,Volume: 28,Issue: 3,Page: 851-865
Authors:  Wang, Weiru;  Vong, Chi-Man;  Yang, Yilong;  Wong, Pak-Kin
Favorite |  | TC[WOS]:18 TC[Scopus]:17 | Submit date:2018/10/30
Encrypted Image Classification  Privacy Preservation  Multi Layer Extreme Learning Machine  Elm Auto Encoder  
A Strategy-proof Privacy-preserving Double Auction Mechanism for Electrical Vehicles Demand Response in Microgrids Conference paper
Authors:  Li, Donghe;  Yang, Qingyu;  Yu, Wei;  An, Dou;  Yang, Xinyu;  Zhao, Wei;  IEEE
Favorite |  | TC[WOS]:2 TC[Scopus]:0 | Submit date:2018/10/30
Smart grids/cyber-physical systems  strategy-proofness  privacy preservation