Privacy-preserving keyword similarity search over encrypted spatial data in cloud computing

F Song, Z Qin, L Xue, J Zhang, X Lin… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the proliferation of cloud computing, data owners can outsource the spatial data from
the Internet of Things devices to a cloud server to enjoy the pay-as-you-go storage …

Enabling regulatory compliance and enforcement in decentralized anonymous payment

L Xue, D Liu, J Ni, X Lin, XS Shen - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Decentralized anonymous payment (DAP) enables users to directly transfer
cryptocurrencies privately without passing through a central authority. Anonymous …

Secure and privacy-preserving decision tree classification with lower complexity

L Xue, D Liu, C Huang, X Lin… - … of Communications and …, 2020 - ieeexplore.ieee.org
As a widely-used machine-learning classifier, a decision tree model can be trained and
deployed at a service provider to provide classification services for clients, eg, remote …

BPRT: a blockchain‐based privacy‐preserving transaction scheme based on an efficient broadcast encryption with personalized messages

S Yao, D Zhang - Transactions on Emerging …, 2023 - Wiley Online Library
As blockchain has drawn more and more attention, much research has developed different
transaction schemes with privacy preserving specialized in various fields. The nature of …

An efficient and privacy-preserving multi-user multi-keyword search scheme without key sharing

F Song, Z Qin, J Liang, X Lin - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
Multi-keyword search, aiming to search the objects by a query request that consists of
multiple keywords, has wide applications in personalized recommendation services. Mean …

[Retracted] Application Analysis of Block Technology Based on Block Chain Computer Model in the False Identification of the Catalog List of the Financial Department …

Z Hu - Advances in Multimedia, 2022 - Wiley Online Library
The financial data of some listed companies is not transparent enough, especially in
financial‐related management and program planning. In addition to legal and ethical …

Consent-based privacy-preserving decision tree evaluation

L Xue, D Liu, J Ni, X Lin, X Shen - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Decision trees are prevalent machine learning models used for data classification. Cloud
servers can build their decision tree models and provide users with many classification …

Privacy-Preserving and Regulation-Enabled Mechanisms for Blockchain-based Financial Services

L Xue - 2022 - uwspace.uwaterloo.ca
With the success of cryptocurrencies such as Bitcoin, blockchain technology has attracted
extensive attention from both academia and industry. As a distributed ledger technology …

[PDF][PDF] Balancing User Privacy and Legal Demands while Conducting Businesses on the Blockchain

WB Chipeta, AA Malik - wijar.westcliff.edu
Blockchain technology offers a promising way to improve business processes by providing a
secure and transparent transaction platform. However, using this technology brings its own …