Denghui Zhang’s research while affiliated with Guangzhou University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (24)


Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
  • Article

April 2025

·

1 Read

Lijing Ren

·

Denghui Zhang

The widespread use of smart devices, such as phones and live-streaming cameras, has ushered in an era where digital images can be captured and shared on social networks anytime and anywhere. Sharing images demands more bandwidth and stricter security than text. This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. The limited computing power of smart devices complicates the encrypted transmission of images, creating substantial obstacles to implementing security policies on low-computing devices. To address privacy concerns regarding image sharing on social networks, we propose a lightweight data forwarding mechanism for resource-constrained environments. By integrating large-scale data forwarding with visual cryptography, we enhance data security and resource utilization while minimizing overhead. We introduce a downsampling-based non-expansive scheme to reduce pixel expansion and decrease encrypted image size without compromising decryption quality. Experimental results demonstrate that our method achieves a peak signal-to-noise ratio of up to 20.54 dB, and a structural similarity index of 0.72, outperforming existing methods such as random-grid. Our approach prevents size expansion while maintaining high decryption quality, addressing access control gaps, and enabling secure and efficient data exchange between interconnected systems.


STBCIoT: Securing the Transmission of Biometric Images in Customer IoT

May 2024

·

54 Reads

·

5 Citations

IEEE Internet of Things Journal

Denghui Zhang

·

·

·

[...]

·

The recent advancement of the Internet of Things (IoT) and information technology has led to the rapid expansion of interconnectivity among a billion devices across various applications. The advent of massive data has resulted in greater computational dependence, posing obstacles to applying security policies in energy-sensitive devices. However, public-key-based encryption algorithms are impractical or impossible to execute on these resource-limited terminals. In this paper, we propose a lightweight framework called STBCIoT based on a visual cryptography (VC) scheme to achieve low-latency encryption for large-scale data like biometric images. To reduce noise in encryption, we utilize central recognition and gray-level features of QR codes to integrate the visually friendly feature of QR into VC. we further propose a high-quality image generation model with the halftoning effect of VC to improve the quality of decrypted images. The experimental results demonstrate that our proposed method achieves high recognition performance on lossy decrypted images, effectively overcoming the performance limitations of traditional public key encryption methods for large-scale images.


Building Privacy-Preserving Medical Text Models With a Pre-Trained Transformer

January 2024

·

7 Reads

IEEE Internet of Things Journal

The rapid advancement of big data and artificial intelligence (AI) in healthcare heightens the urgency for accurate medical text sentiment analysis. The privacy protection of medical data has been a crucial concern due to its sensitivity. The Internet of Medical Things (IoMT) facilitates large-scale data collection at lower cost, enabling precision medicine. However, the decentralized IoMT poses novel challenges to centralized standard encryption schemes. In this paper, we propose a novel approach to building privacy-preserving sentiment models with a generative pre-trained transformer (GPT). We first convert sensitive medical text data into noise-like and distributed one-hot images. Then we introduce visual cryptography (VC) for lightweight and secure transmission of medical text across public networks in resource-limited IoMT devices. We adopt a cross-domain sentiment analysis framework that finetunes transformer-based language models for accurate sentiment analysis instead of training GPT in sentiment analysis from scratch. Experimental results show that the proposed approach improves the accuracy and effectiveness of sentiment analysis while maintaining privacy, thereby addressing a significant gap in biomedical text analysis.


Multi-Resolution Wavelet Fractal Analysis and Subtask Training for Enhancing Few-Shot Noisy Brainwave Recognition

September 2023

·

26 Reads

IEEE Journal of Biomedical and Health Informatics

The integration of healthcare monitoring with Internet of Things (IoT) networks radically transforms the management and monitoring of human well-being. Portable and lightweight electroencephalography (EEG) systems with fewer electrodes have improved convenience and flexibility while retaining adequate accuracy. However, challenges emerge when dealing with real-time EEG data from IoT devices due to the presence of noisy samples, which impedes improvements in brainwave detection accuracy. Moreover, high inter-subject variability and substantial variability in EEG signals present difficulties for conventional data augmentation and subtask learning techniques, leading to poor generalizability. To address these issues, we present a novel framework for enhancing EEG-based recognition through multi-resolution data analysis, capturing features at different scales using wavelet fractals. The original data can be expanded many times after continuous wavelet transform (CWT) and recombination, alleviating insufficient training samples. In the transfer stage of deep learning (DL) models, we adopt a subtask learning approach to train the recognition model to generalize efficiently. This incorporates wavelets at various scales instead of exclusively considering average prediction performance across scales and paradigms. Through extensive experiments, we demonstrate that our proposed DL-based method excels at extracting features from small-scale and noisy EEG data. This significantly improves healthcare monitoring performance by mitigating the impact of noise introduced by the external environment.





The proposed AI security framework based on the interpretability of the saliency map
The recognition performance of the models obtained by different transferred methods
The ROC curves of the GTSRB dataset of retrained networks
Adversarial samples generated by the FGSM method in the MNIST dataset
Adversarial samples generated by our method on the MNIST dataset

+2

An interpretability security framework for intelligent decision support systems based on saliency map
  • Article
  • Publisher preview available

April 2023

·

48 Reads

·

4 Citations

Benefiting from the high-speed transmission and super-low latency, the Fifth Generation (5G) networks are playing an important role in contemporary society. The accessibility and friendly experience provided by 5G results in the generation of massive data, which are recklessly transmitted in various forms and in turn, promote the development of big data and intelligent decision support systems (DSS). Although AI (Artificial Intelligence) can boost DSS to obtain high recognition performance on large-scale data, an adversarial sample generated by deliberately adding subtle noise to a clear sample will cause AI models to give false output with high confidence, which increases concerns about AI. It is necessary to enhance its interpretability and security when adopting AI in areas where decision-making is crucial. In this paper, we study the challenges posed by the next-generation DSS in the era of 5G and big data. To build trust in AI, the saliency map is adopted as a visualization method to reveal the vulnerability of neural networks. The visualization method is further taken to identify imperceptible adversarial samples and reasons for the misclassification of high-accuracy models. Finally, we conduct extensive experiments on large-scale datasets to verify the effectiveness of the visualization method in enhancing AI security for 5G-enabled DSS.

View access options

The limited error‐diffusion algorithm.
A high‐precision recognition model for encrypted remote sensing datasets.
Comparison of latency among our and classic methods for encrypting different numbers of remote sensing images.
The ROC curves of the UCMerced dataset from encrypted images.
Comparison of the original remote sensing images, recovered images, and their visualisation based on the Grad‐CAM++ method.
Privacy‐preserving remote sensing images recognition based on limited visual cryptography

February 2023

·

120 Reads

·

24 Citations

With the arrival of new data acquisition platforms derived from the Internet of Things (IoT), this paper goes beyond the understanding of traditional remote sensing technologies. Deep fusion of remote sensing and computer vision has hit the industrial world and makes it possible to apply Artificial intelligence to solve problems such as automatic extraction of information and image interpretation. However, due to the complex architecture of IoT and the lack of a unified security protection mechanism, devices in remote sensing are vulnerable to privacy leaks when sharing data. It is necessary to design a security scheme suitable for computation‐limited devices in IoT, since traditional encryption methods are based on computational complexity. Visual Cryptography (VC) is a threshold scheme for images that can be decoded directly by the human visual system when superimposing encrypted images. The stacking‐to‐see feature and simple Boolean decryption operation make VC an ideal solution for privacy‐preserving recognition for large‐scale remote sensing images in IoT. In this study, the secure and efficient transmission of high‐resolution remote sensing images by meaningful VC is achieved. By diffusing the error between the encryption block and the original block to adjacent blocks, the degradation of quality in recovery images is mitigated. By fine‐tuning the pre‐trained model from large‐scale datasets, we improve the recognition performance of small encryption datasets for remote sensing images. The experimental results show that the proposed lightweight privacy‐preserving recognition framework maintains high recognition performance while enhancing security.


Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images

February 2023

·

169 Reads

·

20 Citations

Deep neural networks (DNNs) can improve the image analysis and interpretation of remote sensing technology by extracting valuable information from images, and has extensive applications such as military affairs, agriculture, environment, transportation, and urban division. The DNNs for object detection can identify and analyze objects in remote sensing images through fruitful features of images, which improves the efficiency of image processing and enables the recognition of large-scale remote sensing images. However, many studies have shown that deep neural networks are vulnerable to adversarial attack. After adding small perturbations, the generated adversarial examples will cause deep neural network to output undesired results, which will threaten the normal recognition and detection of remote sensing systems. According to the application scenarios, attacks can be divided into the digital domain and the physical domain, the digital domain attack is directly modified on the original image, which is mainly used to simulate the attack effect, while the physical domain attack adds perturbation to the actual objects and captures them with device, which is closer to the real situation. Attacks in the physical domain are more threatening, however, existing attack methods generally generate the patch with bright style and a large attack range, which is easy to be observed by human vision. Our goal is to generate a natural patch with a small perturbation area, which can help some remote sensing images used in the military to avoid detection by object detectors and im-perceptible to human eyes. To address the above issues, we generate a rust-style adversarial patch generation framework based on style transfer. The framework takes a heat map-based interpretability method to obtain key areas of target recognition and generate irregular-shaped natural-looking patches to reduce the disturbance area and alleviates suspicion from humans. To make the generated adversarial examples have a higher attack success rate in the physical domain, we further improve the robustness of the adversarial patch through data augmentation methods such as rotation, scaling, and brightness, and finally, make it impossible for the object detector to detect the camouflage patch. We have attacked the YOLOV3 detection network on multiple datasets. The experimental results show that our model has achieved a success rate of 95.7% in the digital domain. We also conduct physical attacks in indoor and outdoor environments and achieve an attack success rate of 70.6% and 65.3%, respectively. The structural similarity index metric shows that the adversarial patches generated are more natural than existing methods.


Citations (16)


... In [136], the authors introduce a transmission system for large-scale images in order to avoid the high computational requirements of traditional cryptographic schemes. They generate a lossy encrypted dataset for the proposed low-noise encryption scheme and then they train the model using massive data transferred to the recognition network for the encrypted image by generating high-quality images from the halftoning decrypted images. ...

Reference:

A Comprehensive Survey on Generative AI Solutions in IoT Security
STBCIoT: Securing the Transmission of Biometric Images in Customer IoT
  • Citing Article
  • May 2024

IEEE Internet of Things Journal

... To address these challenges, privacy-preserving techniques must ensure that sensitive information is protected from unauthorized access while enabling IoT networks' functionality and convenience. Advanced encryption algorithms and secure communication protocols can help ensure that data remain private during transmission, preventing interception by malicious actors [4]. In an IoT environment, cryptography is used to protect sensitive data, such as personal information, device status, and environmental data, by encrypting them during transmission and ensuring that unauthorized parties cannot intercept or alter them. ...

Privacy‐preserving remote sensing images recognition based on limited visual cryptography

... Reference [13] recorded 82% accuracy, 87% dependability, and a 15% increase in percentage. Reference [14] obtained the maximum percentage increase of 35%, a dependability of 92%, and an accuracy of 90%. Reference [15] recorded 88% accuracy, 91% dependability, and a 25% increase in percentage. ...

An interpretability security framework for intelligent decision support systems based on saliency map

... These patches can be printed, placed in real-world environments, and still cause misclassification or mislocalization in deployed deep learning models. Their adversarial effect remains robust under different lighting conditions, transformations, and occlusions, allowing them to be successfully deployed in real world scenarios [32,11]. Furthermore, retraining-based defenses require extensive, labeled adversarial data, which is expensive to obtain and generalizes poorly to novel attack strategies [53]. ...

Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images

... Encrypting images involves altering their pixels to render them unreadable, thus safeguarding their confidentiality and integrity, particularly crucial for sensitive domains like military (Alnajim et al. 2023) and medical imagery (Liu and Xue 2023;Zhang et al. 2023). By introducing disturbances during the ciphering mechanism, the statistical correlations between the plain and cipher images are disrupted, making prediction challenging. ...

A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing

Computational Intelligence and Neuroscience

... Tenants that process sensitive or otherwise critical data may thus not be able to benefit from the shared satellite approach. We believe that research on trusted serverless computing [20,68,84] can be directly applied here. Conversely, the operator can largely treat the tenant service as an untrusted workload given the sandboxing in our serverless environment. ...

A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT
  • Citing Article
  • December 2022

... Then the adversarial samples generated using white-box attacks on the substitute model can then be used to attack the target network. There are also other solutiones, such as query-based attacks [16], [17], [19], [31], which add small perturbations to the image at a time and then query the output of the target network until the target network makes an incorrect judgement. ...

Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise
  • Citing Conference Paper
  • July 2022

... This paper investigates how Whisper hallucinates based on its responses to non-speech audio, effectively analyzing its vulnerability to "accidental" adversarial example attacks [14]. Firstly, we examine how the type of sound and its duration affects hallucination frequency and the created outputs. ...

Adversarial Example Attacks against ASR Systems: An Overview
  • Citing Conference Paper
  • July 2022

... SGX is also used in computer networks [36], [53], [72] to build libraries or frameworks for securing several traditional network devices. For instance, one solution [53] provides an attested connection between the gateway and host, redirecting the traffic via this trusted channel. ...

Enhancing the Privacy of Network Services through Trusted Computing

... To analyze the statistical deviations between the non-poisoned and poisoned datasets of MNIST, we require the poisoned dataset of MNIST. The poisoned MNIST sample of 16 sets were synthetically generated using Nicolas Carlini & Wagner et al. attack algorithms available from github source (13) . ...

Adversarial Attacks on ASR Systems: An Overview
  • Citing Preprint
  • August 2022