[HTML][HTML] Asynchronous federated learning on heterogeneous devices: A survey
Federated learning (FL) is a kind of distributed machine learning framework, where the
global model is generated on the centralized aggregation server based on the parameters of …
global model is generated on the centralized aggregation server based on the parameters of …
Data security and privacy protection for cloud storage: A survey
P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
A secure authentication protocol for internet of vehicles
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting
messages for the vehicles on roads. However, as the data are transmitted in an insecure …
messages for the vehicles on roads. However, as the data are transmitted in an insecure …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …
limitations that need to be addressed in order for their deployment to be more widespread …
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme
Abstract Deep Neural Networks (DNNs) have developed rapidly in data privacy protection
applications such as medical treatment and finance. However, DNNs require high-speed …
applications such as medical treatment and finance. However, DNNs require high-speed …
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
The rapid growth of data has successfully promoted the development of edge computing,
which is used for processing the data at the edge of network. The emergence of edge …
which is used for processing the data at the edge of network. The emergence of edge …
Blockchain-assisted searchable attribute-based encryption for e-health systems
X **ang, X Zhao - Journal of Systems Architecture, 2022 - Elsevier
Abstract The Internet of Things (IoT) is becoming increasingly popular for transmitting
massive data in a network. With a limited supply of IoT devices, utilizing cloud storage is …
massive data in a network. With a limited supply of IoT devices, utilizing cloud storage is …
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
S Zhang, L Wang, H **ong - International Journal of Information Security, 2020 - Springer
Blockchain-enabled voting (BEV) systems have emerged as the next generation of modern
electronic voting (e-voting) systems, because the immutable property of the blockchain has …
electronic voting (e-voting) systems, because the immutable property of the blockchain has …
A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing
The designs of existing incentive mechanisms in mobile crowdsensing (MCS) are primarily
platform-centered or user-centered, while overlooking the multidimensional consideration of …
platform-centered or user-centered, while overlooking the multidimensional consideration of …
Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach
Nowadays, the advance of smart grid technology has fostered the development of
microgrids, which can efficiently control and manage the distributed energy resources …
microgrids, which can efficiently control and manage the distributed energy resources …