Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah Jun 2021

Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah

Dissertations, Theses, and Capstone Projects

Secure Multi-Party Computation (MPC) allows a group of parties to compute a join function on their inputs without revealing any information beyond the result of the computation. We demonstrate secure function evaluation protocols for branching programs, where the communication complexity is linear in the size of the inputs, and polynomial in the security parameter. Our result is based on the circular security of the Paillier's encryption scheme. Our work followed the breakthrough results by Boyle et al. [9; 11]. They presented a Homomorphic Secret Sharing scheme which allows the non-interactive computation of Branching Programs over shares of the secret inputs. …


Applying Deep Learning On Financial Sentiment Analysis, Cuiyuan Wang Jun 2021

Applying Deep Learning On Financial Sentiment Analysis, Cuiyuan Wang

Dissertations, Theses, and Capstone Projects

Portfolio Investment has always been appealing to investors and researchers. In the past, people tend to use historical trading information of the securities to predict the return or manage the portfolio. Nowadays, the literature has been proved that the market sentiment could predict asset prices. Specifically, it has been shown that the stock market movement is related to financial news and social media events. Thus, it becomes necessary to extract the sentiment of the financial news. We explicitly introduce the application of dictionary methods, traditional machine learning models and deep learning models on text classification. The experiment results show that …


Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi Jan 2021

Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi

Dissertations and Theses

One effective way of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Despite the increased accuracy of IDSs, distributed or coordinated attacks can still go undetected because of the single vantage point of the IDSs. Due to this reason, there is a need for attack characteristics' exchange among different IDS nodes. Another reason for IDS coordination is that a zero-day attack (an attack without a known signature) experienced in organizations located in different regions is not the same. Collaborative efforts of the participating IDS nodes can stop more attack threats if IDS nodes exchange these attack characteristics …