UM

Browse/Search Results:  1-10 of 35 Help

Selected(0)Clear Items/Page:    Sort:
Cross-cultural and gender associations with anxiety about electronic data hacking Journal article
Computers in Human Behavior, 2019,Volume: 70,Page: 161-167
Authors:  Elhai,Jon D.;  Chai,Sangmi;  Amialchuk,Aliaksandr;  Hall,Brian J.
Favorite  |  View/Download:1/0  |  Submit date:2019/06/25
Anxiety  Cross-cultural differences  Human sex differences  Information technology  Privacy  Psychological stress  
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding Conference paper
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, Japan, 7-10 Oct. 2018
Authors:  Shuang Yi;  Yicong Zhou
Favorite  |  View/Download:2/0  |  Submit date:2019/03/26
Reversible Data Hiding  Encrypted Image  Prediction-error Encoding  Weighted Checkerboard-based Prediction Privacy Protection  
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling Journal article
IEEE TRANSACTIONS ON MULTIMEDIA, 2019,Volume: 21,Issue: 1,Page: 51-64
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:5/0  |  Submit date:2019/01/17
Reversible data hiding  encrypted images  parametric binary tree labeling scheme  privacy protection  
Genetic and Genomic Consultation: Are We Ready for Direct-to-Consumer Telegenetics ? Journal article
FRONTIERS IN GENETICS, 2018,Volume: 9
Authors:  Du, Li;  Becher, Shmuel I.
Favorite  |  View/Download:5/0  |  Submit date:2019/01/17
telegenetics  telegenomics  direct-to-consumer  genetic services  risks and benefits  privacy  informed consent  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite  |  View/Download:1/0  |  Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Toward Secure Image Denoising: A Machine Learning Based Realization Conference paper
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Calgary, CANADA, APR 15-20, 2018
Authors:  Zheng Y.;  Wang C.;  Zhou J.
Favorite  |  View/Download:7/0  |  Submit date:2018/12/22
Cloud Computing  Image Denoising  Machine Learning  Neural Network  Privacy  
Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction Journal article
SIGNAL PROCESSING, 2018,Volume: 150,Page: 171-182
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:2/0  |  Submit date:2018/10/30
Reversible Data Hiding  Encrypted Images  High Capacity  Privacy Protection  Adaptive Bit-level Data Embedding  Adaptive Checkerboard Based Prediction  
Medshare: A Novel Hybrid Cloud for Medical Resource Sharing among Autonomous Healthcare Providers Journal article
IEEE Access, 2018,Volume: 6,Page: 46949-46961
Authors:  Yang Y.;  Li X.;  Qamar N.;  Liu P.;  Ke W.;  Shen B.;  Liu Z.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/14
cloud computing  Electronic health records (EHRs)  health care resource sharing  health information exchange (HIE)  healthcare providers  hybrid cloud  patient privacy  
Pseudonym inference in cooperative vehicular traffic scenarios Conference paper
2018 IEEE Conference on Communications and Network Security, CNS 2018
Authors:  Chu X.;  Ruan N.;  Li M.;  Jia W.
Favorite  |  View/Download:2/0  |  Submit date:2019/04/04
Location privacy  mix-zone  vehicle platoon  vehicular ad-hoc networks (VANETs)  
Enhancing social network privacy with accumulated non-zero prior knowledge Journal article
INFORMATION SCIENCES, 2018,Volume: 445,Page: 6-21
Authors:  Wang, Yue;  Yang, Lin;  Chen, Xiaoyun;  Zhang, Xiaofeng;  He, Zhenyu
Favorite  |  View/Download:4/0  |  Submit date:2018/10/30
Differential privacy  Social network analysis  Privacy protection  Privacy preserving data mining