×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [5]
THE STATE KEY LA... [1]
Faculty of Educa... [1]
Authors
ZHOU JIANTAO [2]
VONG CHI MAN [1]
CHENGZHONG XU [1]
Document Type
Journal article [4]
Conference paper [2]
Date Issued
2024 [1]
2023 [1]
2020 [2]
2016 [1]
2015 [1]
Language
英語English [6]
Source Publication
International Jo... [2]
2015 IEEE Global... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
MM 2015 - Procee... [1]
Indexed By
SCIE [4]
CPCI-S [2]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-6 of 6
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme
Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Xu, Cheng Zhong. Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024.
Authors:
Zhu, Kaiqun
;
Wang, Zidong
;
Ding, Derui
;
Dong, Hongli
;
Xu, Cheng Zhong
Favorite
|
TC[WOS]:
0
TC[Scopus]:
2
IF:
10.2
/
10.4
|
Submit date:2024/05/16
Artificial Neural Networks
Artificial Neural Networks (Anns)
Bandwidth
Bandwidth Constraints
Cryptography
Encryption
Homomorphic Encryption Scheme (Hes)
Noise
Secure State Estimation
Security
Set-membership State Estimation
State Estimation
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT
Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:
Rezaeibagha, Fatemeh
;
Mu, Yi
;
Huang, Ke
;
Chen, Lanxiang
;
Zhang, Leyou
Favorite
|
TC[WOS]:
4
TC[Scopus]:
6
IF:
5.5
/
5.9
|
Submit date:2024/01/10
Cloud Computing
Data Security
Homomorphic Encryption
Internet Of Things
Homo-ELM: fully homomorphic extreme learning machine
Journal article
Wang,Weiru, Gan,Yanfen, Vong,Chi Man, Chen,Chuangquan. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:
Wang,Weiru
;
Gan,Yanfen
;
Vong,Chi Man
;
Chen,Chuangquan
Favorite
|
TC[WOS]:
5
TC[Scopus]:
7
IF:
3.1
/
3.6
|
Submit date:2021/03/11
Encrypted Image Classification
Encrypted Machine Learning
Extreme Learning Machine
Fully Homomorphic Encryption
Privacy Preservation
Homo-ELM: fully homomorphic extreme learning machine
Journal article
Wang, W.R., Gan, W.F., Vong, C. M., Chen, C.Q.. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:
Wang, W.R.
;
Gan, W.F.
;
Vong, C. M.
;
Chen, C.Q.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
7
IF:
3.1
/
3.6
|
Submit date:2022/08/09
Encrypted Machine Learning
Fully Homomorphic Encryption
Privacy Preservation
Extreme Learning Machine
Encrypted Image Classification
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique
Conference paper
Yunyu Li, Jiantao Zhou, Yuanman Li, Oscar C. Au. Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique[C], 2016, 800-804.
Authors:
Yunyu Li
;
Jiantao Zhou
;
Yuanman Li
;
Oscar C. Au
Adobe PDF
|
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
|
Submit date:2018/12/22
Ciphertext Expansion
Homomorphic Encryption
Linear Interpolation
Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion
Conference paper
Yunyu Li, Jiantao Zhou, Yuanman Li. Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion[C], 2015, 1063-1066.
Authors:
Yunyu Li
;
Jiantao Zhou
;
Yuanman Li
Adobe PDF
|
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2018/12/22
Image Homomorphic Encryption
Ciphertext Expansion
Ciphertextonly Attack