A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Privacy-preserving object detection for medical images with faster R-CNN

Y Liu, Z Ma, X Liu, S Ma, K Ren - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a lightweight privacy-preserving Faster R-CNN framework
(SecRCNN) for object detection in medical images. Faster R-CNN is one of the most …

Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing

Y Zheng, H Duan, C Wang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing enables convenient sensory data collection from a large number of
mobile devices and has found various applications. In the real practice, however, the …

PriRadar: A privacy-preserving framework for spatial crowdsourcing

D Yuan, Q Li, G Li, Q Wang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Privacy leakage is a serious issue in spatial crowdsourcing in various scenarios. In this
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …

No peek: A survey of private distributed deep learning

P Vepakomma, T Swedish, R Raskar, O Gupta… - arxiv preprint arxiv …, 2018 - arxiv.org
We survey distributed deep learning models for training or inference without accessing raw
data from clients. These methods aim to protect confidential patterns in data while still …

Privacy-aware and efficient mobile crowdsensing with truth discovery

Y Zheng, H Duan, X Yuan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Truth discovery in mobile crowdsensing has recently received wide attention. It refers to the
procedure for estimating the unknown user reliability from collected sensory data and …

Secure fine-grained encrypted keyword search for e-healthcare cloud

H Wang, J Ning, X Huang, G Wei… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
E-Healthcare systems are increasingly popular due to the introduction of wearable
healthcare devices and sensors. Personal health records (PHRs) are collected by these …

A multi-level privacy-preserving scheme for extracting traffic images

X He, L Li, H Peng, F Tong - Signal Processing, 2024 - Elsevier
Traffic images are constantly used as a stick to assess traffic conditions. Traffic flow statistical
analysis, road condition safety monitoring, vehicle violation detection, accident surveillance …

A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things

Z **a, L Jiang, X Ma, W Yang, P Ji… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, and
companies are highly motivated to store the data on cloud servers for cost saving and …

Towards private similarity query based healthcare monitoring over digital twin cloud platform

Y Zheng, R Lu, Y Guan, S Zhang… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
As the growing proportion of aging population, the demand for sustainable, high quality, and
timely healthcare services has become increasingly pressing, especially since the outbreak …