- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Crystallization and Solubility Studies
- X-ray Diffraction in Crystallography
- Complexity and Algorithms in Graphs
- Cloud Data Security Solutions
- Microwave Engineering and Waveguides
- EEG and Brain-Computer Interfaces
- Blockchain Technology Applications and Security
- Visual perception and processing mechanisms
- Advanced Vision and Imaging
- Opportunistic and Delay-Tolerant Networks
- Epilepsy research and treatment
- Antenna Design and Analysis
- Generative Adversarial Networks and Image Synthesis
- Complex Network Analysis Techniques
- Opinion Dynamics and Social Influence
- Neural and Behavioral Psychology Studies
- Language, Metaphor, and Cognition
- Advanced Graph Neural Networks
- Air Quality and Health Impacts
- Image Enhancement Techniques
Beijing Normal University
2010-2024
Chinese Institute for Brain Research
2020-2024
Henan Normal University
2011-2023
Beijing Institute of Technology
2019-2023
Zhuhai Institute of Advanced Technology
2019-2023
Peking University
2021
Shanghai Jiao Tong University
2019
Beijing University of Technology
2011-2013
Traditional steganography methods often hide secret data by establishing a mapping relationship between and cover image or directly in noisy area, but has low embedding capacity. Based on the thought of deep learning, this paper, we propose new scheme based U-Net structure. First, form paired training, trained neural network includes hiding an extraction network; then, sender uses to embed into another full-size without any modification sends it receiver. Finally, receiver reconstruct...
Private set intersection (PSI) enables parties to compute the of their inputs without leaking any additional information. Recently, there have been significant advances in two-party settings with malicious security, making PSI truly practical even compared naive insecure method. However, efficient solutions more general case (multi-party) are only known for semi-honest setting. How construct a multi-party solution (especially large inputs) setting remains an important open question this...
File fragment classification is an important step in digital forensics. The most popular method based on traditional machine learning by extracting features like N-gram, Shannon entropy or Hamming weights. However, these are far from enough to classify file fragments. In this paper, we propose a novel scheme fragment-to-grayscale image conversion and deep extract more hidden therefore improve the accuracy of classification. Benefit multi-layered feature maps, our convolution neural network...
Repetitive experience with the same visual stimulus and task can remarkably improve behavioral performance on task. This well-known perceptual-learning phenomenon is usually specific to trained retinal- or visual-field location, which taken as an indication of plastic changes in retinotopic areas. In previous studies perceptual learning, however, a change location retina accompanied by positional nonretinotopic frames reference, such relative head other objects. It unclear, therefore,...
The effects of air pollution on adolescents need further consideration. Although there is evidence that maternal exposure to may affect the cognitive function offspring, relevant studies remain limited and inconsistent, with a lack assessing causal from developing countries. Using data Chinese Family Panel Studies, representative nationwide cohort study, OLS combined instrumental variable + two-stage least square (IV+2SLS) was used explore PM2.5 concentrations during pregnancy offspring when...
Electric Vehicle Routing Problem (EVRP) is considerably challenging due to the capacity and electricity constraints of electric vehicles (EVs). Most existing studies on EVRP consider no limits charging times when optimizing routes EVs. However, long time charging, EVs are usually limited urgent service demands customers. To simulate this practical problem, paper first formulates with both (EVRP-CC). tackle new optimization further devises a two-stage solution construction method for ant...
Secret sharing is an important component of cryptography protocols and has a wide range practical applications. However, the existing secret schemes cannot apply to computationally weak devices efficiently guarantee fairness. In this study, novel outsourcing scheme proposed. setting sharing, clients only need small amount decryption verification operations, while expensive reconstruction computation verifiable can be outsourced cloud service providers (CSP). The does not require complex...
The quality of underwater images is often marred by noticeable color casts and blurring, resulting from complex phenomena such as differential light attenuation based on wavelength, veiling scattering, scattering plankton suspended particles in water. In this paper, we propose an effective image enhancement method called Optimal Contrast Attenuation Difference (OCAD) to tackle these issues. OCAD employs a two-step approach. First, it estimates coarse transmission map optimizing contrast...
Threshold private set intersection (TPSI) allows multiple parties to learn the of their input sets only if size is greater than a certain threshold. This task has been demonstrated useful with practical applications, and thus many active research conducted. However, current solutions for TPSI are still slow large e.g., n=2^20 size, potentially candidates secure against semi-honest adversaries. For basic PSI, there have efficient scalable solutions, even in malicious settings. It interesting...
Abstract Visual processing takes place in both retinotopic and spatiotopic frames of reference. Whereas visual perceptual learning is usually specific to the trained location, our recent study has shown specificity motion direction discrimination. To explore mechanisms underlying learning, examine whether similar also exist form processing, we human subjects discriminate an orientation difference between two successively displayed stimuli, with a gaze shift manipulate their positional...
Deploying deep learning models on edge servers can effectively alleviate the pressure cloud data centers in computing, communication, and energy, etc. In this study, we attempt to extend deployment scheme from mobile terminals further save spectrum resources, utilize communication provide intelligent applications. Unfortunately, model experiences a slow convergence speed, terminal consumes much energy if is only trained local devices with weak computing power. Therefore, deploy algorithms...
Using the educational knowledge graph to express logical characteristics of knowledge, this paper takes project-driven learning in teaching “Information Technology Secondary Schools” as an example and studies group cooperative mode based on graph. The relationship between points subject courses is described form a graph, activities coordinating cooperation each are completed through integration process use classroom can not only build collaborative system teachers students but also help...
Threshold private set intersection (TPSI) allows a receiver to obtain the when cardinality of is greater or equal threshold, which has wide range applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all them rely on lots expensive public-key techniques require an exponential number possible combinations among shares. In this work, we design efficient protocol, achieves computational security in semi-honest model. To...
With the wide application of Internet Things (IoT), a huge number data are collected from IoT networks and required to be processed, such as mining. Although it is popular outsource storage computation cloud, may invade privacy participants’ information. Cryptography‐based privacy‐preserving mining has been proposed protect participating parties’ for this process. However, still an open problem handle with multiparticipant’s ciphertext analysis. And these algorithms rely on semihonest...
Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret schemes, fairness vital desirable property. To achieve fairness, existing schemes either require trusted third party or execution of multiround protocol, are impractical. Moreover, classic scheme requires expensive computing verification phase. In this work, we provide an outsourcing hierarchical threshold (HTSS) protocol based on reputation. scheme, participants...
Rational secret sharing was first introduced by Halpern and Teague (STOC, 2004). Since then, a series of works have focused on designing rational protocols. However, most existing solutions can share only one at process. To multiple secrets such as m secrets, the dealer must redistribute shares for times. In addition, previous assume existence broadcast channel which is not realistic. Motivated those problems, this paper proposes multi-secret scheme, combines scheme with game theory....
The first joint fingerprinting and decryption (JFD) for vector quantization (VQ) images addressed the problem that decrypted multimedia data may be redistributed from authorized customers to unauthorized customers. scheme also caused conventional JFD methods equipped with a special ability resist noise interference. Till now, some existing schemes related have been proposed protect content distribution, but these failed tackle several problems in original based on VQ image, including high...
Steganalysis technology judges whether there is secret information in the carrier by monitoring abnormality of data, so traditional hiding has reached bottleneck. Therefore, this paper proposed coverless based on improved training Wasserstein GANs (WGAN-GP) model. The sender trains WGAN-GP with a natural image and image. generated are visually identical, parameters generator saved to form codebook. uploads (disguise image) cloud disk. receiver downloads camouflage from disk obtains...