Search Results for author: Xun Yi

Found 6 papers, 1 papers with code

Committed Private Information Retrieval

1 code implementation3 Feb 2023 Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah

A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers collude and try to fool the client by sending manipulated data.

Information Retrieval Retrieval

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization

no code implementations4 Feb 2022 Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang

In this paper, we present a system design which offers efficient protection of individual model updates throughout the learning procedure, allowing clients to only provide obscured model updates while a cloud server can still perform the aggregation.

Federated Learning

Privacy-Aware Identity Cloning Detection based on Deep Forest

no code implementations21 Oct 2021 Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara

We propose a novel method to detect identity cloning of social-sensor cloud service providers to prevent the detrimental outcomes caused by identity deception.

Deception Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.