Hefeng Chen
YOU?
Author Swipe
View article: Attack and defense techniques in large language models: A survey and new perspectives
Attack and defense techniques in large language models: A survey and new perspectives Open
Large Language Models (LLMs) have become central to numerous natural language processing tasks, but their vulnerabilities present significant security and ethical challenges. This systematic survey explores the evolving landscape of attack…
View article: Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem Open
Multisecret sharing schemes have been widely used in the area of information security, such as cloud storage, group authentication, and secure parallel communications. One of the issues for these schemes is to share and recover multisecret…
View article: An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy Open
Reversible data hiding (RDH) is a method that allows a cover image to be completely recovered from its corresponding stego image without distortion after the embedded secret messages have been extracted. Prediction-error expansion (PEE), a…
View article: Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data Open
Blockchain is an emerging technology that promises many exciting applications in various fields, including financial, medical, energy, and logistics management. However, there are still some limitations in the existing blockchain framework…
View article: A new method of generating hard random lattices with short bases
A new method of generating hard random lattices with short bases Open
View article: A Novel <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math> Secret Sharing Scheme Based upon Euler’s Theorem
A Novel Secret Sharing Scheme Based upon Euler’s Theorem Open
The secret sharing scheme is used to protect the privacy of information by distribution. More specifically, a dealer splits a secret into n shares and distributes them privately to n participants, in such a way that any t or more particip…
View article: A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares Open
Secret image sharing has been widely used in numerous areas such as remote sensing and information security. The goal is to share and recover one or more images using several image shares. However, most schemes only consider ordered shares…
View article: Liveness of Disjunctive and Strict Single-Type Automated Manufacturing System: An ROPN Approach
Liveness of Disjunctive and Strict Single-Type Automated Manufacturing System: An ROPN Approach Open
The resource-oriented Petri net (ROPN) modeling method is applied in this paper to model a class of automated manufacturing systems (AMS) named disjunctive and strict single-type AMSs (DS-AMS), where multiple units of a single resource typ…