UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite |  | TC[WOS]:5 TC[Scopus]:4 | Submit date:2022/05/17
Cipher-feedback Secret Sharing  Ciphers  Cloud Computing  Correlation  Cryptography  Encrypted Image  Homomorphic Encryption  Multiple Data Hiders  Prediction Methods  Reversible Data Hiding  Servers  
Homo-ELM: fully homomorphic extreme learning machine Journal article
International Journal of Machine Learning and Cybernetics, 2020,Volume: 11,Issue: 7,Page: 1531-1540
Authors:  Wang,Weiru;  Gan,Yanfen;  Vong,Chi Man;  Chen,Chuangquan
Favorite |  | TC[WOS]:3 TC[Scopus]:5 | Submit date:2021/03/11
Encrypted Image Classification  Encrypted Machine Learning  Extreme Learning Machine  Fully Homomorphic Encryption  Privacy Preservation  
Homo-ELM: fully homomorphic extreme learning machine Journal article
International Journal of Machine Learning and Cybernetics (SCI-E), 2020,Page: 1531-1540
Authors:  Wang, W.R.;  Gan, W.F.;  Vong, C. M.;  Chen, C.Q.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/09
Encrypted Machine Learning  Fully Homomorphic Encryption  Privacy Preservation  Extreme Learning Machine  Encrypted Image Classification  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, USA, 14-16 Dec. 2015
Authors:  Yunyu Li;  Jiantao Zhou;  Yuanman Li;  Oscar C. Au
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation  
Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion Conference paper
MM 2015 - Proceedings of the 2015 ACM Multimedia Conference, Brisbane, AUSTRALIA, OCT 26-30, 2015
Authors:  Yunyu Li;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:2 | Submit date:2018/12/22
Image Homomorphic Encryption  Ciphertext Expansion  Ciphertextonly Attack