- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Digital Transformation in Industry
- E-commerce and Technology Innovations
- Access Control and Trust
- FinTech, Crowdfunding, Digital Finance
- Chaos-based Image/Signal Encryption
- Big Data and Business Intelligence
- Software-Defined Networks and 5G
- Adversarial Robustness in Machine Learning
City University of Macau
2022-2024
University of Macau
2022
As globalization takes place, multiple data resources need to be integrated, and the degree of information flow between regions determines integration development regions. Data sharing is even more sensitive when it comes national individual interests a matter security interest. Although Privacy-Preserving Computing achieves privacy protection for input in process multi-party collaborative computing. However, original data, computing process, results face verification problems. result, on...
Federated learning has emerged as a promising technique for the Internet of Things (IoT) in various domains, including supply chain management. It enables IoT devices to collaboratively learn without exposing their raw data, ensuring data privacy. However, federated faces threats local tampering and upload process attacks. This paper proposes an innovative framework that leverages Trusted Execution Environment (TEE) blockchain technology address security privacy challenges Our achieves...
Blockchain technology, initially developed as a decentralized and transparent mechanism for recording transactions, faces significant privacy challenges due to its inherent transparency, exposing sensitive transaction data all network participants. This study proposes blockchain protection algorithm that employs digital mutual trust integrated with advanced cryptographic techniques enhance security in transactions. The contribution includes the development of new dynamic Byzantine consensus...
The development of cross-chain technology has opened possibilities for interoperability within the blockchain transactions. However, security concerns regarding transactions have remained a key issue in this field. This paper introduces an innovative TrustRank algorithm aiming at enhancing by optimizing reputation-incentive mechanisms. Specifically, study concentrated on mechanism algorithm, evaluating intrinsic value nodes based their transaction history single chain and significance as...
In order to provide Internet services, the Domain Name System (DNS) plays a crucial role. Muti-Domain Cooperative Alliance is proposed promote DNS globalization and maintain permanent sustainability of Internet. Data synchronization transactions in must ensure mutual trust. Blockchain technology one effective ways solve problem. However, trust between blockchains are still problematic synchronizing data cross-chain. This paper summarizes analyzes properties various cross-chain proposes...
Agile development has been a common methodology in software development. In response to the covid-19, most teams choose work remotely. As result of different network environments, company cloud center load cannot meet requirements remote and fault tolerance agile process. We designed mixed-method called Edge Development approach for improving during decision-making The extensive literature review provided us with three categories challenges as well solutions support Development's...