When federated learning meets privacy-preserving computation

J Chen, H Yan, Z Liu, M Zhang, H **ong… - ACM Computing Surveys, 2024‏ - dl.acm.org
Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide
attention from society and individuals. It is desirable to make the data available but invisible …

Evolutionary biogeography-based whale optimization methods with communication structure: Towards measuring the balance

J Tu, H Chen, J Liu, AA Heidari, X Zhang… - Knowledge-Based …, 2021‏ - Elsevier
Abstract Whale Optimization Algorithm (WOA) is a popular swarm-based algorithm with
some spotted defects in its generated patterns during the searching phases. In this study, an …

An encrypted medical blockchain data search method with access control mechanism

C Gan, H Yang, Q Zhu, Y Zhang, A Saini - Information Processing & …, 2023‏ - Elsevier
The use of medical blockchain enables the safe sharing of electronic medical data (EMD).
With the continuous growth of EMD, how to efficiently find EMD on the medical blockchain is …

Chaotic simulated annealing multi-verse optimization enhanced kernel extreme learning machine for medical diagnosis

J Liu, J Wei, AA Heidari, F Kuang, S Zhang… - Computers in Biology …, 2022‏ - Elsevier
Classification models such as Multi-Verse Optimization (MVO) play a vital role in disease
diagnosis. To improve the efficiency and accuracy of MVO, in this paper, the defects of MVO …

A novel hierarchical secret image sharing scheme with multi-group joint management

Z Wu, Y Liu, X Jia - Mathematics, 2020‏ - mdpi.com
With the spread of the Internet, the speed of data spread is getting faster and faster. It
benefits us a lot but also brings us many potential security problems, especially the problem …

[HTML][HTML] Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain

H Fan, Y Liu, Z Zeng - Sensors, 2020‏ - mdpi.com
As a next-generation power system, the smart grid can implement fine-grained smart
metering data collection to optimize energy utilization. Smart meters face serious security …

[HTML][HTML] RLL-SWE: A robust linked list steganography without embedding for intelligence networks in smart environments

P Zhao, Y Zhou, S Ijaz, F Khan, J Chen… - Journal of Network and …, 2025‏ - Elsevier
With the rapid development of technology, smart environments utilizing the Internet of
Things, artificial intelligence, and big data are improving the quality of life and work …

Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework

Z Zhang, F Zhang, M Cao, C Feng, D Chen - Wireless Networks, 2024‏ - Springer
Enhancing the task offload performance of UAV-assisted Vehicular Edge Computing
Networks (VECNs) is complex, especially in vehicle-to-everything (V2X) applications. These …

Instant_Anonymity: A lightweight semantic privacy guarantee for 5G-enabled IIoT

SA Moqurrab, A Anjum, N Tariq… - IEEE transactions on …, 2022‏ - ieeexplore.ieee.org
Data publication and sharing are critical components of assessing network infrastructures in
the Internet of Things for quality-of-service enhancement. Especially, the advancement in …

RPPTD: robust privacy-preserving truth discovery scheme

J Chen, Y Liu, Y **ang, K Sood - IEEE systems journal, 2021‏ - ieeexplore.ieee.org
Benefitingfrom the rapid development of communication technology and Internet of Things
(IoT) devices, crowdsensing is on the rise. Sensor data from IoT devices can be requested …