Lin Cong’s research while affiliated with China Agricultural University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Visualization of different image data enhancement methods: (a) rotation; (b) salt-and-pepper noise; (c) contrast adjustment; (d) shearing; (e) cropping; (f) flipping.
Overview of the proposed method.
Architecture of the data obfuscation strategy proposed in this paper.
Architecture of the probability density extraction module.
Visualization of different data obfuscation methods: (a) obfuscation method based on gradient information; (b,c) two methods based on Gaussian noise; (d) the proposed method.

+7

A Novel Data Obfuscation Framework Integrating Probability Density and Information Entropy for Privacy Preservation
  • Article
  • Full-text available

January 2025

·

9 Reads

·

1 Citation

Haolan Cheng

·

Chenyi Qiang

·

Lin Cong

·

[...]

·

Chunli Lv

Data privacy protection is increasingly critical in fields like healthcare and finance, yet existing methods, such as Fully Homomorphic Encryption (FHE), differential privacy (DP), and federated learning (FL), face limitations like high computational complexity, noise interference, and communication overhead. This paper proposes a novel data obfuscation method based on probability density and information entropy, leveraging a probability density extraction module for global data distribution modeling and an information entropy fusion module for dynamically adjusting the obfuscation intensity. In medical image classification, the method achieved precision, recall, and accuracy of 0.93, 0.89, and 0.91, respectively, with a throughput of 57 FPS, significantly outperforming FHE (0.82, 23 FPS) and DP (0.84, 25 FPS). Similarly, in financial prediction tasks, it achieved precision, recall, and accuracy of 0.95, 0.91, and 0.93, with a throughput of 54 FPS, surpassing traditional approaches. These results highlight the method’s ability to balance privacy protection and task performance effectively, offering a robust solution for advancing privacy-preserving technologies.

Download

Enhancing Data Privacy Protection and Feature Extraction in Secure Computing Using a Hash Tree and Skip Attention Mechanism

November 2024

·

12 Reads

This paper addresses the critical challenge of secure computing in the context of deep learning, focusing on the pressing need for effective data privacy protection during transmission and storage, particularly in sensitive fields such as finance and healthcare. To tackle this issue, we propose a novel deep learning model that integrates a hash tree structure with a skip attention mechanism. The hash tree is employed to ensure data integrity and security, enabling the rapid verification of data changes, while the skip attention mechanism enhances computational efficiency by allowing the model to selectively focus on important features, thus minimizing unnecessary processing. The primary objective of our research is to develop a secure computing model that not only safeguards data privacy but also optimizes feature extraction capabilities. Our experimental results on the CIFAR-10 dataset demonstrate significant improvements over traditional models, achieving a precision of 0.94, a recall of 0.89, an accuracy of 0.92, and an F1-score of 0.91, notably outperforming standard self-attention and CBAM. Additionally, the visualization of results confirms that our approach effectively balances efficient feature extraction with robust data privacy protection. This research contributes a new framework for secure computing, addressing both the security and efficiency concerns prevalent in current methodologies.

Citations (1)


... This research adds to the literature by presenting a scheme for balancing usability, efficiency, and security in protecting data in the cloud. Cheng et al. (2025) [14] present a new data obfuscation system that combines probability density functions and information entropy to better preserve privacy. Classic anonymization and encryption techniques tend to impair data utility, which hinders the ability to derive useful insights from protected datasets. ...

Reference:

Privacy-Preserving Data Protection: A Novel Mechanism for Maximizing Availability without Compromising Confidentiality
A Novel Data Obfuscation Framework Integrating Probability Density and Information Entropy for Privacy Preservation