Open Access
ARTICLE
Congcong Wang1, Chen Wang2,3,*, Wenying Zheng4,*, Wei Gu5
1 School of Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China
2 School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, 310018, China
3 State Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China
4 School of Computer Science and Technology (School of Artificial Intelligence), Zhejiang Sci-Tech University, Hangzhou, 310018, China
5 School of Computer Science (School of Cyber Science and Engineering), Nanjing University of Information Science and Technology, Nanjing, 210044, China
* Corresponding Author: Chen Wang. Email: ; Wenying Zheng. Email:
(This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.057975
Received 01 September 2024; Accepted 23 October 2024; Published online 13 November 2024
View
Download
Like
Expression Preserved Face Privacy Protection Based on Multi-mode Discriminant Analysis
Xiang Wang, Chen Xiong, Qingqi...Inverted XML Access Control Model Based on Ontology Semantic Dependency
Meijuan Wang, Jian Wang, Lihong...A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption
Wenjia Xu, Shijun Xiang, Vasily...Secure Video Streaming with Lightweight Cipher PRESENT in an SDN Testbed
Pengcheng Liu, Xiaojun Wang, S....