UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Privacy-preserving and verifiable deep learning inference based on secret sharing Journal article
Neurocomputing, 2022,Volume: 483,Page: 221-234
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman;  Huang, Caishi
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/04
Deep Learning Prediction  Deep Neural Network Inference  Privacy-preserving  Secure Multi-party Computation  Verifiable Computation  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:7 TC[Scopus]:7 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing Journal article
CMC-Computers, Materials & Continua, 2021,Page: 241-252
Authors:  Yu, W.;  Feng, H.;  Xu, Y.;  Yin, N.;  Chen, Y.;  Yang, Z. X.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/31
Edge computing security  multi-party computing  quantum algorithm  phase estimation  communication complexity  
Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack Conference paper
2021 18th International Conference on Privacy, Security and Trust, PST 2021
Authors:  Li, Yiran;  Hu, Guiqiang;  Liu, Xiaoyuan;  Ying, Zuobin
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/13
Federated learning  Poisoning attack  Privacy protection  Security  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:10 TC[Scopus]:11 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF) Journal article
IEEE Transactions on Services Computing, 2019,Volume: 14,Issue: 6,Page: 1940-1953
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:6 TC[Scopus]:5 | Submit date:2022/07/07
Toward Secure Image Denoising: A Machine Learning Based Realization Conference paper
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Calgary, AB, Canada, 15-20 April 2018
Authors:  Yifeng Zheng;  Cong Wang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:2 TC[Scopus]:2 | Submit date:2018/12/22
Cloud Computing  Image Denoising  Machine Learning  Neural Network  Privacy  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Yifeng Zheng;  Helei Cui;  Cong Wang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:26 TC[Scopus]:31 | Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
Bi-level protected compressive sampling Journal article
IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732
Authors:  Leo Yu Zhang;  Kwok-Wo Wong;  Yushu Zhang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:64 TC[Scopus]:64 | Submit date:2018/12/22
Compressive Sampling (Cs)  Encryption  Known/chosen-plaintext Attack  Random Projection  Restricted Isometry Property (Rip)  
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF) Conference paper
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop, Vigo, Galicia, Spain, 6 20, 2016 - 6 22, 2016
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:13 | Submit date:2018/11/06