- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Cryptography and Residue Arithmetic
- Cloud Data Security Solutions
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Complexity and Algorithms in Graphs
- Cryptographic Implementations and Security
- Advanced Authentication Protocols Security
- Advanced Data Storage Technologies
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Security in Wireless Sensor Networks
- Parallel Computing and Optimization Techniques
- Security and Verification in Computing
- Distributed and Parallel Computing Systems
- Face and Expression Recognition
- Cloud Computing and Resource Management
- Stochastic Gradient Optimization Techniques
- Face recognition and analysis
- Brain Tumor Detection and Classification
- graph theory and CDMA systems
- Distributed systems and fault tolerance
- Recommender Systems and Techniques
- Software-Defined Networks and 5G
Shandong University
2015-2025
Minzu University of China
2025
Nanjing University of Aeronautics and Astronautics
2025
Qinghai University Affiliated Hospital
2024
Dalian Polytechnic University
2024
Antea Group (France)
2023
Xinjiang Institute of Engineering
2022
State Key Laboratory of Cryptology
2008-2019
Temple University
2017
Zhejiang Financial College
2017
In the ongoing evolution of OceanBase database system, it is essential to enhance its adaptability small-scale enterprises. The system has demonstrated stability and effectiveness within Ant Group other commercial organizations, besides through TPC-C TPC-H tests. this paper, we have designed a stand-alone distributed integrated architecture named Paetica address overhead caused by components in mode, with respect system. enables adaptive configuration that allows support both serial parallel...
Face recognition is one of the key technologies in intelligent security systems. Data privacy and identification efficiency have always been concerns about face recognition. Existing privacy-preserving protocols only focus on training phase Since systems mainly complete calculation large-scale data phase, existing cannot be well applied to In this article, we propose first protocol for calculations We introduce Householder matrix blind user including model data, which enables proposed...
Styrenes are challenging substrates for current trifluoromethyl radical-involved hydrotrifluoromethylation reactions due to competitive side reactions. Moreover, metal-free of olefins that can simultaneously be compatible with styrenes and unactivated aliphatic alkenes is scarce at present. Herein, we describe an air insensitive, mild, broadly applicable protocol by using appropriate redox system comprising chloro(phenyl)trifluoromethyl-λ3-iodane presynthesized O,O'-dimethyldithiophosphoric...
Phrase search encryption, as an important technique in cloud-based IoT system, allows users to retrieve encrypted data that contains a set of consecutive keywords. It plays role e-healthcare diagnosis machine learning applications for etc. However, the best our knowledge, existing phrase encryption schemes cannot achieve complete verification results. They either verify whether returned files correctly containing query or all this are returned. Result is very some applications. If result...
Object recognition of hyperspectral remote sensing images based on machine learning is widely applied in many industries. However, the efficiency training and recognizing process object a critical issue since it involves complex matrix operations large scale data sets, especially for resource-constrained devices. One solution to outsource heavy workload cloud server. Nonetheless, may bring some security problems when server untrustworthy. Therefore, how enable devices securely efficiently...
Decision tree classifiers are pervasively applied in a wide range of areas, such as healthcare, credit-risk assessment, spam detection, and many more. To ensure effectiveness efficiency, clients usually choose to adopt classification services that offered by model providers. However, the required data interactions evaluation process raise privacy concerns for both provider client, indicating an imminent need private decision (PDTE). Recently, some works, e.g., [1] (ESORICS'19) [2] (NDSS'21),...
In traditional identity-based encryption schemes, security will be entirely lost once secret keys are exposed. However, with more and use of mobile unprotected devices, key exposure seems unavoidable. To deal this problem, we newly prop
The road network plays an important role in guiding people's daily travel. In the network, shortest distance query is one of most basic operations. With scale continuously expanding, people choose to outsource cloud server form encrypted graph. To best authors' knowledge, existing privacy-preserving schemes over large-scale graphs are all designed for static Nonetheless, graph often updated time. These cannot work well this practical application. order address problem, we explore how...
As auxiliary collaborative signals, the entity connectivity and relation semanticity beneath knowledge graph (KG) triples can alleviate data sparsity cold-start issues of recommendation tasks. Thus many works consider obtaining user item representations via information aggregation on graph-structured within Euclidean space. However, scale-free graphs (e.g., KGs) inherently exhibit non-Euclidean geometric topologies, such as tree-like circle-like structures. The existing models built in a...