- Cryptography and Data Security
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Security and Verification in Computing
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Stochastic Gradient Optimization Techniques
- Advanced Graph Neural Networks
- Advanced Steganography and Watermarking Techniques
- Pharmaceutical Practices and Patient Outcomes
- Information Systems and Technology Applications
- Caching and Content Delivery
- Coding theory and cryptography
- Machine Learning and ELM
- Video Surveillance and Tracking Methods
- Graph Theory and Algorithms
- Parallel Computing and Optimization Techniques
- Generative Adversarial Networks and Image Synthesis
- Advanced Vision and Imaging
- Complexity and Algorithms in Graphs
- Brain Tumor Detection and Classification
- Environmental Chemistry and Analysis
- Chaos-based Image/Signal Encryption
- Cloud Computing and Resource Management
Yancheng Teachers University
2024
Chinese Research Academy of Environmental Sciences
2024
Tianjin Medical University
2023
Shandong Academy of Sciences
2023
Qilu University of Technology
2023
Qingdao University
2015-2023
Hunan University
2021
Shandong University
2018-2019
With cloud storage services, users can remotely store their data to the and realize sharing with others. Remote integrity auditing is proposed guarantee of stored in cloud. In some common systems such as electronic health records system, file might contain sensitive information. The information should not be exposed others when shared. Encrypting whole shared hiding, but will make this unable used by How hiding remote still has been explored up now. order address problem, we propose a scheme...
Using cloud storage services, users can store their data in the to avoid expenditure of local and maintenance. To ensure integrity stored cloud, many auditing schemes have been proposed. In most, if not all, existing schemes, a user needs employ his private key generate authenticators for realizing auditing. Thus, has possess hardware token (e.g., USB token, smart card) memorize password activate this key. If is lost or forgotten, most current would be unable work. order overcome problem, we...
The key exposure is a serious threat for the security of data integrity auditing. Once user's private auditing exposed, most existing schemes would inevitably become unable to work. To deal with this problem, we construct novel and efficient identity-based scheme key-exposure resilience cloud storage. This achieved by designing update technique, which fully compatible BLS signature used in In our design, Third Party Auditor (TPA) responsible generating information. user can his based on one...
Public auditing is a significant technique in cloud-based Internet of Things (IoT) systems, which enables the verifier to check integrity IoT data stored cloud. Nowadays, become core property for owners. Once one owner are sold another one, ownership these has be transferred. However, existing public schemes with transfer require all authenticators corresponding transferred transformed new ones auditing. It incurs computation cost because recomputing data, especially when vast quantity being...
Remote data integrity auditing, as a key technology for cloud storage, allows verifier to check without downloading entire file from server (CS). In practice, user might only concern the of files containing specific keyword and would like perform dynamic operations on data. this paper, we construct practical keyword-based remote auditing scheme supporting full dynamics. such scheme, novel construction called tag is designed. Using tag, TPA able simultaneously whether CS correctly keeps all...
The cloud storage auditing with deduplication is able to verify the integrity of data stored in while needs keep only a single copy duplicated file. To best our knowledge, all existing schemes are vulnerable brute-force dictionary attacks, which incurs leakage user privacy. In this paper, we focus on new aspect being against attacks auditing. We propose scheme supporting strong privacy protection, user's file would not be disclosed and other parties when predictable or from small space....
This report presents Wan, a comprehensive and open suite of video foundation models designed to push the boundaries generation. Built upon mainstream diffusion transformer paradigm, Wan achieves significant advancements in generative capabilities through series innovations, including our novel VAE, scalable pre-training strategies, large-scale data curation, automated evaluation metrics. These contributions collectively enhance model's performance versatility. Specifically, is characterized...
Data deduplication technology is a very important in cloud storage. It widely applied various fields, such as electronic health care. can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure schemes based on popularity have been proposed. They use convergent encryption to encrypt with high double-layer low popularity. However, these huge computational overhead because adopted for whole complex symmetric key delivery. In order...
Many related scales have been developed and applied to measure patients' medication adherence, but the research on psychometric characteristics of scale still requires further studies. This study aims provide validation GMAS by using Rasch analysis make targeted recommendations for improvement.This is a cross-sectional secondary data. 312 Chinese adult patients were recruited from two tertiary hospitals one community health service center in Tianjin complete questionnaire containing GMAS,...
Cloud storage is becoming more and popular because of its elasticity pay-as-you-go service manner. In some cloud scenarios, the data that are stored in may be shared by a group users. To verify integrity this kind applications, many auditing schemes for have been proposed. However, all these do not consider access authorization problem users, which makes revoked users still able to belonging group. order deal with problem, we propose novel public scheme paper. Different from previous work,...
Graph Neural Networks (GNNs) have shown promising results in various tasks, among which link prediction is an important one. GNN models usually follow a node-centric message passing procedure that aggregates the neighborhood information to central node recursively. Following this paradigm, features of nodes are passed through edges without caring about where located and role they played. However, neglected topological be valuable for tasks. In paper, we propose Structure Enhanced neural...