Po-Wen Chi
YOU?
Author Swipe
View article: A Reliable Aggregation Method Based on Threshold Additive Secret Sharing in Federated Learning with Quality of Service (QoS) Support
A Reliable Aggregation Method Based on Threshold Additive Secret Sharing in Federated Learning with Quality of Service (QoS) Support Open
Federated learning is a decentralized privacy-preserving mechanism that allows multiple clients to collaborate without exchanging their datasets. Instead, they jointly train a model by uploading their own gradients. However, recent researc…
View article: Theseus Data Synthesis Approach: A Privacy-Preserving Online Data Sharing Service
Theseus Data Synthesis Approach: A Privacy-Preserving Online Data Sharing Service Open
With the vigorously developed services of cloud computing, it is relatively easier and more convenient for organizations or enterprises to open data on clouds. However, as personal information in electronic data becomes more massive and de…
View article: Secure Collaborative Computing for Linear Regression
Secure Collaborative Computing for Linear Regression Open
Machine learning usually requires a large amount of training data to build useful models. We exploit the mathematical structure of linear regression to develop a secure and privacy-preserving method that allows multiple parties to collabor…
View article: A Privacy-Preserving Zero-Knowledge Proof for Blockchain
A Privacy-Preserving Zero-Knowledge Proof for Blockchain Open
Zero-Knowledge Proof (ZKP) is a useful tools for proving that a prover possesses a secret without revealing it to the verifier. Designated Verifier Proof (DVP) is a special type of ZKP that adds the ability to restrict the identity of veri…
View article: Building a Privacy-Preserving Blockchain-Based Bidding System: A Crypto Approach
Building a Privacy-Preserving Blockchain-Based Bidding System: A Crypto Approach Open
Blockchain-based bidding systems are becoming increasingly popular nowadays. Due to the properties of blockchain, bidding records are unchangeable. With existing encryption techniques, these bidding records can only be shared by the bidder…
View article: Understanding Potential Cyber-Armies in Elections: A Study of Taiwan
Understanding Potential Cyber-Armies in Elections: A Study of Taiwan Open
Currently, online social networks are essential platforms for political organizations to monitor public opinion, disseminate information, argue with the opposition, and even achieve spin control. However, once such purposeful/aggressive ar…
View article: How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability
How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability Open
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly …
View article: Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems
Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems Open
Cloud-assisted cyber–physical systems (CCPSs) integrate the physical space with cloud computing. To do so, sensors on the field collect real-life data and forward it to clouds for further data analysis and decision-making. Since multiple s…
View article: Author Index
Author Index Open
View article: Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography
Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography Open
While social network services have become popular platforms where large amounts of user-generated content are published, individuals, election campaigns, and political organizations leverage the services to publish, promote, and exchange p…
View article: SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN
SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN Open
The recent rapid development of Web technology, multimedia content, and interactive data has considerably expanded the size of the Internet transmissions. Benefiting from the paradigm-shifting technology of software defined networking (SDN…