UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
Zheng, Yifeng, Duan, Huayi, Tang, Xiaoting, Wang, Cong, Zhou, Jiantao. Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3), 1261-1275.
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite | TC[WOS]:21 TC[Scopus]:25  IF:7.0/6.8 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Homo-ELM: fully homomorphic extreme learning machine Journal article
Wang,Weiru, Gan,Yanfen, Vong,Chi Man, Chen,Chuangquan. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:  Wang,Weiru;  Gan,Yanfen;  Vong,Chi Man;  Chen,Chuangquan
Favorite | TC[WOS]:5 TC[Scopus]:7  IF:3.1/3.6 | Submit date:2021/03/11
Encrypted Image Classification  Encrypted Machine Learning  Extreme Learning Machine  Fully Homomorphic Encryption  Privacy Preservation  
Homo-ELM: fully homomorphic extreme learning machine Journal article
Wang, W.R., Gan, W.F., Vong, C. M., Chen, C.Q.. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:  Wang, W.R.;  Gan, W.F.;  Vong, C. M.;  Chen, C.Q.
Favorite | TC[WOS]:5 TC[Scopus]:7  IF:3.1/3.6 | Submit date:2022/08/09
Encrypted Machine Learning  Fully Homomorphic Encryption  Privacy Preservation  Extreme Learning Machine  Encrypted Image Classification  
Encrypted image classification based on multilayer extreme learning machine Journal article
Wang, W., Vong, C. M., Yang, Y., Wong, P. K.. Encrypted image classification based on multilayer extreme learning machine[J]. Multidimensional Systems and Signal Processing (SCI-E), 2017, 851-865.
Authors:  Wang, W.;  Vong, C. M.;  Yang, Y.;  Wong, P. K.
Favorite |  | Submit date:2022/08/09
Encrypted image classification  Privacy preservation  Multi layer extreme learning machine  ELM auto encoder  
Encrypted image classification based on multilayer extreme learning machine Journal article
Wang, Weiru, Vong, Chi-Man, Yang, Yilong, Wong, Pak Kin. Encrypted image classification based on multilayer extreme learning machine[J]. MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017, 28(3), 851-865.
Authors:  Wang, Weiru;  Vong, Chi-Man;  Yang, Yilong;  Wong, Pak Kin
Favorite | TC[WOS]:27 TC[Scopus]:33  IF:1.7/1.7 | Submit date:2018/10/30
Encrypted Image Classification  Privacy Preservation  Multi Layer Extreme Learning Machine  Elm Auto Encoder  
A Strategy-proof Privacy-preserving Double Auction Mechanism for Electrical Vehicles Demand Response in Microgrids Conference paper
Li, Donghe, Yang, Qingyu, Yu, Wei, An, Dou, Yang, Xinyu, Zhao, Wei, IEEE. A Strategy-proof Privacy-preserving Double Auction Mechanism for Electrical Vehicles Demand Response in Microgrids[C], 345 E 47TH ST, NEW YORK, NY 10017 USA:IEEE, 2017.
Authors:  Li, Donghe;  Yang, Qingyu;  Yu, Wei;  An, Dou;  Yang, Xinyu; et al.
Favorite | TC[WOS]:7 TC[Scopus]:32 | Submit date:2018/10/30
Smart Grids/cyber-physical Systems  Strategy-proofness  Privacy Preservation  
An image classification method that considers privacy-preservation Journal article
Chongwen Liu, Zhaowei Shang, Yuan Yan Tang. An image classification method that considers privacy-preservation[J]. Neurocomputing, 2016, 208, 80-98.
Authors:  Chongwen Liu;  Zhaowei Shang;  Yuan Yan Tang
Favorite | TC[WOS]:7 TC[Scopus]:7 | Submit date:2019/02/11
Ensemble System  Image Classification  Privacy-preservation  
Hiding sensitive association rules using central tendency Conference paper
Muhammad Naeem, Sohail Asghar, Simon Fong. Hiding sensitive association rules using central tendency[C], 2011, 478-484.
Authors:  Muhammad Naeem;  Sohail Asghar;  Simon Fong
Favorite |  | Submit date:2019/02/13
Data Mining  Sensitive Association Rules  Privacy Preservation  Central Tendency