4.7 Article

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud

期刊

INFORMATION SCIENCES
卷 496, 期 -, 页码 150-160

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2019.05.024

关键词

Compressed sensing; Compressed sensing reconstruction outsourcing; Cloud computing; Asymmetric verification

资金

  1. Guangxi Key Laboratory of Trusted Software [kx201904]
  2. Macau Science and Technology Development Fund [FDCT/022/2017/A1, FDCT/077/2018/A2]
  3. National Natural Science Foundation of China [61702221]
  4. Chongqing Basic Research and Front Exploration Project [cstc2018jcyjA3093]

向作者/读者索取更多资源

Compressed sensing has considerable potential for utilization in various fields owing to its efficient sampling process, but its reconstruction complexity is extremely high. For resource-constrained users, performing the compressed sensing reconstruction (CSR) task is impractical. In particular, the emergence of big data makes this task increasingly time-consuming. Cloud computing resources are abundant and can be employed to solve this task. However, owing to the lack of trust in the cloud, it is necessary to outsource the CSR task without privacy leakages. In this study, we design an efficient secure outsourcing protocol for the CSR task. In the basic outsourcing service model, a client samples a signal via a secure measurement matrix and then sends the acquired measurements to the cloud for CSR outsourcing. The reconstructed signal can not only be utilized by the client, but also by other users. The proposed outsourcing scheme is highly efficient and privacy-preserving, based on three aspects. First, the sensing matrix employed for reconstruction is assumed to be public, because it has a significantly larger size than the signal and consumes considerable resources if encrypted and transmitted. Second, a secret orthogonal sparsifying basis is contained only in the measurement matrix, rather than the sensing matrix. Third, a user can verify the reconstructed signal by leveraging the keys, which are the unique information shared between the client and user. We also demonstrate the privacy and analyze the efficiency of the proposed CSR outsourcing protocol, both theoretically and experimentally. (C) 2019 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Cyber Information Retrieval Through Pragmatics Understanding and Visualization

Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang

Summary: With the rapid increase of cybersecurity attacks and their significant impact, the amount of cybersecurity-related information has surged. This article proposes an innovative cybersecurity retrieval scheme that uses semantic contents and hidden metadata for automatic indexing and searching of cybersecurity information. A novel cybersecurity search engine is implemented to demonstrate effective and understandable retrieval based on the proposed schema. Comprehensive performance evaluation is conducted on real-world datasets to validate the algorithms and techniques developed for cybersecurity information retrieval. This new engine enables augmented search, cybersecurity analytics, and visualization, aiming to provide direct and efficient results for obtaining and truly understanding cybersecurity information.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Acoustics

SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals

Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Guang Hua, Keshav Sood, Yushu Zhang

Summary: In this paper, a robust watermarking method for stereo signals is proposed, based on novel features SSVS and SSVD generated using DCT and SVD. The method achieves higher embedding rate and robustness while improving perceptual quality.

IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2023)

Article Computer Science, Information Systems

Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT

Ruoyu Zhao, Yushu Zhang, Rushi Lan, Zhongyun Hua, Yong Xiang

Summary: With the widespread use of the Internet of Things (IoT), privacy concerns have emerged as a significant issue due to the collection of user data by IoT devices. This article focuses on the protection of image privacy in the context of green IoT. A novel scheme called heterogeneous and customized cost-efficient reversible image degradation is proposed, which takes into consideration privacy characteristics and diverse user requirements. The scheme aims to achieve personalized privacy protection while maintaining cost effectiveness by preserving visual content in privacy-protected images and improving image compression efficiency.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things

Nai Wang, Junjun Chen, Di Wu, Wencheng Yang, Yong Xiang, Atul Sajjanhar

Summary: The IoT concept has become popular due to advancements in electronic chip manufacturing and networking hardware. By combining end devices and networking techniques, it is possible to use higher-level machine learning models like Federated Learning and Knowledge Distillation in IoT systems. However, ensuring security in network communications is crucial for system scalability and effectiveness.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Localization of Inpainting Forgery With Feature Enhancement Network

Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Zhongyun Hua, Yong Xiang

Summary: In this work, an efficient feature enhancement network is proposed to locate the inpainted regions in the digital image. First, an artifact enhancement block is designed to effectively capture the traces left by diffusion or exemplar-based inpainting. Then, the VGGNet is used as a feature extractor to describe advanced and low-resolution features. Extensive experimental evaluations confirm the usefulness of the proposed method.

IEEE TRANSACTIONS ON BIG DATA (2023)

Article Computer Science, Artificial Intelligence

An Efficient Approach to Manage Natural Noises in Recommender Systems

Chenhong Luo, Yong Wang, Bo Li, Hanyang Liu, Pengyu Wang, Leo Yu Zhang

Summary: Recommender systems search user preferences based on historical ratings and recommend items of interest. However, natural noises in the ratings can mislead the recommendations. Different methods have been proposed to handle natural noises, but they introduce new problems. To address this, we propose a new approach that detects natural noises based on user and item classifications and corrects them using probability-weighted threshold values. Experimental results show that our method effectively corrects natural noise and improves recommendation quality.

ALGORITHMS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks

Mengyao Ma, Yanjun Zhang, M. A. P. Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai

Summary: Federated learning (FL) is vulnerable to poisoning membership inference attacks (MIA), and existing server-side robust aggregation algorithms (AGRs) are insufficient in mitigating these attacks. Therefore, a new client-side defense mechanism called LoDen is proposed to detect suspicious privacy attacks and mitigate poisoning MIA. Experimental evaluation shows that LoDen consistently achieves a 0% missing rate in detecting poisoning MIA and reduces the success rate of these attacks to 0% in most cases.

PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023 (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Masked Language Model Based Textual Adversarial Example Detection

Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang

Summary: A novel textual adversarial example detection method, MLMD, based on masked language model is proposed to produce distinguishable signals between normal and adversarial examples. Experimental results demonstrate the strong performance of MLMD on multiple benchmark datasets.

PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023 (2023)

Article Computer Science, Theory & Methods

Impulsive Artificial Defense Against Advanced Persistent Threat

Hao Sun, Xiaofan Yang, Lu-Xing Yang, Kaifan Huang, Gang Li

Summary: Advanced persistent threat (APT) is a severe threat to modern organizations and artificial APT defense is recognized as essential. There are two ways of artificial APT defenses: continuous artificial defense (CAD) and impulsive artificial defense (IAD), where IAD is superior in terms of overall service cost. This paper addresses the development of a cost-effective IAD policy and presents an iterative algorithm for solving the optimal impulsive control model.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Artificial Intelligence

PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting

Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Xiaochun Cao, Yong Xiang

Summary: To address the misuse of Photoshop inpainting tools, we propose a novel method called PS-Net to localize the inpainted regions in images. PS-Net consists of a primary network and a secondary network, which successfully identify the forged regions by mining frequency clues and enhancing feature weights. Experimental results demonstrate that PS-Net outperforms several state-of-the-art solutions in localization ability.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Statistically Dependent Blind Signal Separation Under Relaxed Sparsity

Yongxiang Li, Dezhong Peng, Yong Xiang, Qingchuan Tao, Zhong Yuan

Summary: Most traditional blind source separation (BSS) methods assume that source signals are independent, but many signals in the real world are interrelated. This study proposes a new BSS method for dependent signals that relies on the relaxed sparsity of sources. The observed signals are distributed in a specific subspace based on the representation relation in the time-frequency (TF) domain, and each observed signal is uniquely clustered into its corresponding subspace. The estimation of source signals is calculated using the inverse or pseudo-inverse matrix of the mixing matrix. Mathematical and experimental results demonstrate the promising potential of the proposed subspace clustering method to solve the dependent BSS (DBSS) problems under relaxed sparsity conditions.

IEEE SIGNAL PROCESSING LETTERS (2023)

Article Computer Science, Artificial Intelligence

Unambiguous and High-Fidelity Backdoor Watermarking for Deep Neural Networks

Guang Hua, Andrew Beng Jin Teoh, Yong Xiang, Hao Jiang

Summary: The unprecedented success of deep learning relies on the synergy of big data, computing power, and human knowledge. Copyright protection of deep neural networks (DNNs) is necessary, and DNN watermarking is a popular solution for this.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Prototype-Guided Memory Replay for Continual Learning

Stella Ho, Ming Liu, Lan Du, Longxiang Gao, Yong Xiang

Summary: Continual learning is a machine learning paradigm that learns continuously without forgetting previously acquired knowledge. Existing models often save old examples and revisit previously seen data to retain old knowledge, but the occupied memory size keeps growing. Therefore, we propose a memory-efficient method that stores a few samples to achieve good performance.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Information Systems

Optimal Transport-Based Patch Matching for Image Style Transfer

Jie Li, Yong Xiang, Hao Wu, Shaowen Yao, Dan Xu

Summary: The study introduced a novel patch-based style transfer method that operates directly in the image pixel domain without using neural networks, achieving fascinating style transfer results with rich image details.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Computer Science, Information Systems

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data

Yaxi Yang, Yao Tong, Jian Weng, Yufeng Yi, Yandong Zheng, Leo Yu Zhang, Rongxing Lu

Summary: This article presents a query scheme for privacy-preserving on genomic data, which allows secure querying of specific ranges of genomic data in a database.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

A consensus model considers managing manipulative and overconfident behaviours in large-scale group decision-making

Xia Liang, Jie Guo, Peide Liu

Summary: This paper investigates a novel consensus model based on social networks to manage manipulative and overconfident behaviors in large-scale group decision-making. By proposing a novel clustering model and improved methods, the consensus reaching is effectively facilitated. The feedback mechanism and management approach are employed to handle decision makers' behaviors. Simulation experiments and comparative analysis demonstrate the effectiveness of the model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

CGN: Class gradient network for the construction of adversarial samples

Xiang Li, Haiwang Guo, Xinyang Deng, Wen Jiang

Summary: This paper proposes a method based on class gradient networks for generating high-quality adversarial samples. By introducing a high-level class gradient matrix and combining classification loss and perturbation loss, the method demonstrates superiority in the transferability of adversarial samples on targeted attacks.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Distinguishing latent interaction types from implicit feedbacks for recommendation

Lingyun Lu, Bang Wang, Zizhuo Zhang, Shenghao Liu

Summary: Many recommendation algorithms only rely on implicit feedbacks due to privacy concerns. However, the encoding of interaction types is often ignored. This paper proposes a relation-aware neural model that classifies implicit feedbacks by encoding edges, thereby enhancing recommendation performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Proximity-based density description with regularized reconstruction algorithm for anomaly detection

Jaehong Yu, Hyungrok Do

Summary: This study discusses unsupervised anomaly detection using one-class classification, which determines whether a new instance belongs to the target class by constructing a decision boundary. The proposed method uses a proximity-based density description and a regularized reconstruction algorithm to overcome the limitations of existing one-class classification methods. Experimental results demonstrate the superior performance of the proposed algorithm.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Non-iterative border-peeling clustering algorithm based on swap strategy

Hui Tu, Shifei Ding, Xiao Xu, Haiwei Hou, Chao Li, Ling Ding

Summary: Border-Peeling algorithm is a density-based clustering algorithm, but its complexity and issues on unbalanced datasets restrict its application. This paper proposes a non-iterative border-peeling clustering algorithm, which improves the clustering performance by distinguishing and associating core points and border points.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A two-stage denoising framework for zero-shot learning with noisy labels

Long Tang, Pan Zhao, Zhigeng Pan, Xingxing Duan, Panos M. Pardalos

Summary: In this work, a two-stage denoising framework (TSDF) is proposed for zero-shot learning (ZSL) to address the issue of noisy labels. The framework includes a tailored loss function to remove suspected noisy-label instances and a ramp-style loss function to reduce the negative impact of remaining noisy labels. In addition, a dynamic screening strategy (DSS) is developed to efficiently handle the nonconvexity of the ramp-style loss.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Selection of a viable blockchain service provider for data management within the internet of medical things: An MCDM approach to Indian healthcare

Raghunathan Krishankumar, Sundararajan Dhruva, Kattur S. Ravichandran, Samarjit Kar

Summary: Health 4.0 is gaining global attention for better healthcare through digital technologies. This study proposes a new decision-making framework for selecting viable blockchain service providers in the Internet of Medical Things (IoMT). The framework addresses the limitations in previous studies and demonstrates its applicability in the Indian healthcare sector. The results show the top ranking BSPs, the importance of various criteria, and the effectiveness of the developed model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Q-learning with heterogeneous update strategy

Tao Tan, Hong Xie, Liang Feng

Summary: This paper proposes a heterogeneous update idea and designs HetUp Q-learning algorithm to enlarge the normalized gap by overestimating the Q-value corresponding to the optimal action and underestimating the Q-value corresponding to the other actions. To address the limitation, a softmax strategy is applied to estimate the optimal action, resulting in HetUpSoft Q-learning and HetUpSoft DQN. Extensive experimental results show significant improvements over SOTA baselines.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Dyformer: A dynamic transformer-based architecture for multivariate time series classification

Chao Yang, Xianzhi Wang, Lina Yao, Guodong Long, Guandong Xu

Summary: This paper proposes a dynamic transformer-based architecture called Dyformer for multivariate time series classification. Dyformer captures multi-scale features through hierarchical pooling and adaptive learning strategies, and improves model performance by introducing feature-map-wise attention mechanisms and a joint loss function.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

ESSENT: an arithmetic optimization algorithm with enhanced scatter search strategy for automated test case generation

Xiguang Li, Baolu Feng, Yunhe Sun, Ammar Hawbani, Saeed Hammod Alsamhi, Liang Zhao

Summary: This paper proposes an enhanced scatter search strategy, using opposition-based learning, to solve the problem of automated test case generation based on path coverage (ATCG-PC). The proposed ESSENT algorithm selects the path with the lowest path entropy among the uncovered paths as the target path and generates new test cases to cover the target path by modifying the dimensions of existing test cases. Experimental results show that the ESSENT algorithm outperforms other state-of-the-art algorithms, achieving maximum path coverage with fewer test cases.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

An attention based approach for automated account linkage in federated identity management

Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Aytaj Badirova, Ralph Krimmel, Christof Pohl, Ramin Yahyapour

Summary: Linking digital accounts belonging to the same user is crucial for security, user satisfaction, and next-generation service development. However, research on account linkage is mainly focused on social networks, and there is a lack of studies in other domains. To address this, we propose SmartSSO, a framework that automates the account linkage process by analyzing user routines and behavior during login processes. Our experiments on a large dataset show that SmartSSO achieves over 98% accuracy in hit-precision.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A memetic algorithm with fuzzy-based population control for the joint order batching and picker routing problem

Renchao Wu, Jianjun He, Xin Li, Zuguo Chen

Summary: This paper proposes a memetic algorithm with fuzzy-based population control (MA-FPC) to solve the joint order batching and picker routing problem (JOBPRP). The algorithm incorporates batch exchange crossover and a two-level local improvement procedure. Experimental results show that MA-FPC outperforms existing algorithms in terms of solution quality.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection

Guoxiang Zhong, Fagui Liu, Jun Jiang, Bin Wang, C. L. Philip Chen

Summary: In this study, we propose the AMFormer framework to address the problem of mixed normal and anomaly samples in deep unsupervised time-series anomaly detection. By refining the one-class representation and introducing the masked operation mechanism and cost sensitive learning theory, our approach significantly improves anomaly detection performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A data-driven optimisation method for a class of problems with redundant variables and indefinite objective functions

Jin Zhou, Kang Zhou, Gexiang Zhang, Ferrante Neri, Wangyang Shen, Weiping Jin

Summary: In this paper, the authors focus on the issue of multi-objective optimisation problems with redundant variables and indefinite objective functions (MOPRVIF) in practical problem-solving. They propose a dual data-driven method for solving this problem, which consists of eliminating redundant variables, constructing objective functions, selecting evolution operators, and using a multi-objective evolutionary algorithm. The experiments conducted on two different problem domains demonstrate the effectiveness, practicality, and scalability of the proposed method.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A Monte Carlo fuzzy logistic regression framework against imbalance and separation

Georgios Charizanos, Haydar Demirhan, Duygu Icen

Summary: This article proposes a new fuzzy logistic regression framework that addresses the problems of separation and imbalance while maintaining the interpretability of classical logistic regression. By fuzzifying binary variables and classifying subjects based on a fuzzy threshold, the framework demonstrates superior performance on imbalanced datasets.

INFORMATION SCIENCES (2024)