期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK 被引量:2
1
作者 Hailin Chen Gang Xu +5 位作者 Yuling Chen Xiubo Chen Yixian Yang Ruibin Fan Kaixiang Zhang Huizhong Li 《Journal of Quantum Computing》 2020年第1期57-83,共27页
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitab... Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitably brings the issues with respect to data privacy and operating performance.In this paper,we proposed a novel blockchain scheme called Cipherchain,which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed.Specifically in our scheme,transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search(mPECK),and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger.By introducing execution-consensus-update paradigm of transaction flow,Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext,but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work.In addition,Cipherchain is a promising scheme to realize the technology combination of“blockchain+cloud computing”and“permissioned blockchain+public blockchain”. 展开更多
关键词 Blockchain Cipherchain cloud computing mPECK
下载PDF
Educational divergence among urban residents and migrant workers: Evidence from China
2
作者 Shuxing Chen Lingfeng Zheng Yuxiang Gao 《Chinese Journal of Population,Resources and Environment》 2022年第3期295-306,共12页
While the Harris-Todaro model is a traditional approach used in researching the urban-rural dichotomy,it fails to explain families’goals to maximize their current utility in terms of intertemporal decision-making con... While the Harris-Todaro model is a traditional approach used in researching the urban-rural dichotomy,it fails to explain families’goals to maximize their current utility in terms of intertemporal decision-making con‐ditions.To fill this gap,in this paper,an urban-rural dichotomy model involving labor migration and educa‐tion is established,in which it is assumed that family utility derives from consumption and children’s educa‐tional achievement.The steady-state path derived through the Bellman equation suggests that increasing edu‐cational investment and family education intensity leads to a significant urban-rural difference in children’s educational achievement.Compared with the traditional Harris-Todaro model,the transversality condition is loosened in this model,while the unavailability of loans constrains migrant families.Four hypotheses are made and tested using an empirical study.An ordinary least squares regression was used in the analysis,but due to the endogeneity caused by missing variables,the instrumental variable method and two-stage least squares regression were used.The results demonstrate that the household registration system can explain 44.5%of the educational achievement difference,and the initial difference is inflated 4.73 times after nine years of compulsory education.This divergence could increase the differences caused by household registra‐tion status,resulting in larger income gaps and intergenerational heredity of identities. 展开更多
关键词 Educational divergence Urban-rural dichotomy Migrant workers Intertemporal optimization
下载PDF
Federated Learning with Privacy-preserving and Model IP-right-protection 被引量:1
3
作者 Qiang Yang Anbu Huang +5 位作者 Lixin Fan Chee Seng Chan Jian Han Lim Kam Woh Ng Ding Sheng Ong Bowen Li 《Machine Intelligence Research》 EI CSCD 2023年第1期19-37,共19页
In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using... In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using these models is facing more and more privacy and legal challenges.To bridge the gap between data privacy and the need for data fusion,an emerging AI paradigm feder-ated learning(FL)has emerged as an approach for solving data silos and data privacy problems.Based on secure distributed AI,feder-ated learning emphasizes data security throughout the lifecycle,which includes the following steps:data preprocessing,training,evalu-ation,and deployments.FL keeps data security by using methods,such as secure multi-party computation(MPC),differential privacy,and hardware solutions,to build and use distributed multiple-party machine-learning systems and statistical models over different data sources.Besides data privacy concerns,we argue that the concept of“model”matters,when developing and deploying federated models,they are easy to expose to various kinds of risks including plagiarism,illegal copy,and misuse.To address these issues,we introduce FedIPR,a novel ownership verification scheme,by embedding watermarks into FL models to verify the ownership of FL models and protect model intellectual property rights(IPR or IP-right for short).While security is at the core of FL,there are still many articles re-ferred to distributed machine learning with no security guarantee as“federated learning”,which are not satisfied with the FL definition supposed to be.To this end,in this paper,we reiterate the concept of federated learning and propose secure federated learning(SFL),where the ultimate goal is to build trustworthy and safe AI with strong privacy-preserving and IP-right-preserving.We provide a com-prehensive overview of existing works,including threats,attacks,and defenses in each phase of SFL from the lifecycle perspective. 展开更多
关键词 Federated learning privacy-preserving machine learning SECURITY decentralized learning intellectual property protection
原文传递
Privacy-preserving integration of multiple institutional data for single-cell type identification with scPrivacy
4
作者 Shaoqi Chen Bin Duan +7 位作者 Chenyu Zhu Chen Tang Shuguang Wang Yicheng Gao Shaliu Fu Lixin Fan Qiang Yang Qi Liu 《Science China(Life Sciences)》 SCIE CAS CSCD 2023年第5期1183-1195,共13页
The rapid accumulation of large-scale single-cell RNA-seq datasets from multiple institutions presents remarkable opportunities for automatically cell annotations through integrative analyses.However,the privacy issue... The rapid accumulation of large-scale single-cell RNA-seq datasets from multiple institutions presents remarkable opportunities for automatically cell annotations through integrative analyses.However,the privacy issue has existed but being ignored,since we are limited to access and utilize all the reference datasets distributed in different institutions globally due to the prohibited data transmission across institutions by data regulation laws.To this end,we present scPrivacy,which is the first and generalized automatically single-cell type identification prototype to facilitate single cell annotations in a data privacy-preserving collaboration manner.We evaluated scPrivacy on a comprehensive set of publicly available benchmark datasets for single-cell type identification to stimulate the scenario that the reference datasets are rapidly generated and distributed in multiple institutions,while they are prohibited to be integrated directly or exposed to each other due to the data privacy regulations,demonstrating its effectiveness,time efficiency and robustness for privacy-preserving integration of multiple institutional datasets in single cell annotations. 展开更多
关键词 PRESERVING INTEGRATION utilize
原文传递
A Phonetic-Semantic Pre-Training Model for Robust Speech Recognition
5
作者 Xueyang Wu Rongzhong Lian +4 位作者 Di Jiang Yuanfeng Song Weiwei Zhao Qian Xu Qiang Yang 《CAAI Artificial Intelligence Research》 2022年第1期1-7,共7页
Robustness is a long-standing challenge for automatic speech recognition(ASR)as the applied environment of any ASR system faces much noisier speech samples than clean training corpora.However,it is impractical to anno... Robustness is a long-standing challenge for automatic speech recognition(ASR)as the applied environment of any ASR system faces much noisier speech samples than clean training corpora.However,it is impractical to annotate every types of noisy environments.In this work,we propose a novel phonetic-semantic pre-training(PSP)framework that allows a model to effectively improve the performance of ASR against practical noisy environments via seamlessly integrating pre-training,self-supervised learning,and fine-tuning.In particular,there are three fundamental stages in PSP.First,pre-train the phone-to-word transducer(PWT)to map the generated phone sequence to the target text using only unpaired text data;second,continue training the PWT on more complex data generated from an empirical phone-perturbation heuristic,in additional to self-supervised signals by recovering the tainted phones;and third,fine-tune the resultant PWT with real world speech data.We perform experiments on two real-life datasets collected from industrial scenarios and synthetic noisy datasets,which show that the PSP effectively improves the traditional ASR pipeline with relative character error rate(CER)reductions of 28.63%and 26.38%,respectively,in two real-life datasets.It also demonstrates its robustness against synthetic highly noisy speech datasets. 展开更多
关键词 pre-training automatic speech recognition self-supervised learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部