- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Digital Media Forensic Detection
- Advanced Malware Detection Techniques
- Cryptographic Implementations and Security
- Complexity and Algorithms in Graphs
Kanazawa University
2022
National Chengchi University
2022
Visual State Space Model (VSS) has demonstrated remarkable performance in various computer vision tasks. However, the process of development, backdoor attacks have brought severe challenges to security. Such cause an infected model predict target labels when a specific trigger is activated, while behaves normally on benign samples. In this paper, we conduct systematic experiments comprehend robustness VSS through lens attacks, specifically how state space (SSM) mechanism affects robustness....
The emergence of cloud computing enables users to upload data remote clouds and compute them. This drastically reduces storage costs for users. Considering secure multilevel in enterprises, the notion hierarchical identity‐based inner product functional encryption (HIB‐IPFE) is proposed. In this cryptosystem, a sender can encrypt vector into ciphertext with identity, while receiver who possesses secret key corresponding same identity decrypt obtain . However, HIB‐IPFE not sufficient capture...