Xi He

ORCID: 0000-0001-8680-9967
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Mobile Crowdsensing and Crowdsourcing
  • Privacy, Security, and Data Protection
  • Recycling and Waste Management Techniques
  • Municipal Solid Waste Management
  • Human Mobility and Location-Based Analysis
  • Recommender Systems and Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Data Visualization and Analytics
  • Adversarial Robustness in Machine Learning
  • Parallel Computing and Optimization Techniques
  • Stochastic Gradient Optimization Techniques
  • Fractional Differential Equations Solutions
  • Graph Theory and Algorithms
  • Data Management and Algorithms
  • Complexity and Algorithms in Graphs
  • Network Security and Intrusion Detection
  • Machine Learning in Healthcare
  • Software-Defined Networks and 5G
  • Advanced Graph Neural Networks
  • Electric Power System Optimization
  • Iterative Methods for Nonlinear Equations
  • Complex Network Analysis Techniques
  • Cloud Data Security Solutions

University of Waterloo
2019-2024

Harvard University
2024

Chongqing University of Posts and Telecommunications
2022-2024

Macau University of Science and Technology
2022

Wuzhou University
2022

Duke University
2014-2022

Lanzhou Jiaotong University
2016

Southern Polytechnic State University
2014

China Three Gorges University
2013-2014

Institute of Applied Mathematics
2013

Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database utility downstream analysis data. In this paper, we present Blowfish, class inspired by Pufferfish framework, that provides rich interface trade-off. particular, allow data publishers to extend differential using policy, which specifies (a) secrets, or information must be kept secret, and (b) constraints may known about While secret specification allows increased lessening protection certain...

10.1145/2588555.2588581 preprint EN 2014-06-18

Private record linkage (PRL) is the problem of identifying pairs records that are similar as per an input matching rule from databases held by two parties do not trust one another. We identify three key desiderata a PRL solution must ensure: (1) perfect precision and high recall pairs, (2) proof end-to-end privacy, (3) communication computational costs scale subquadratically in number records. show all existing solutions for PRL? including secure 2-party computation (S2PC), their variants...

10.1145/3133956.3134030 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

Abstract Organizations often collect private data and release aggregate statistics for the public’s benefit. If no steps toward preserving privacy are taken, adversaries may use released to deduce unauthorized information about individuals described in dataset. Differentially algorithms address this challenge by slightly perturbing underlying with noise, thereby mathematically limiting amount of that be deduced from each release. Properly calibrating these algorithms—and turn disclosure risk...

10.2478/popets-2022-0058 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2022-03-03

With the severe plastic pollution issue worldwide, restrictions or bans on bags have become most popular policy intervention. As essential participants in reducing consumption, residents and enterprises are vital implementing bag restriction law (PBRL). Through a questionnaires survey of 630 consumers 50 enterprises, this study investigates residents’ enterprises’ perceptions behavioural changes toward PBRL Macao identifies key influence factors. The results show that respondents (95%) began...

10.3390/su14137792 article EN Sustainability 2022-06-26

A private data federation enables clients to query the union of from multiple providers without revealing any extra information client or other providers. Unfortunately, this strong end-to-end privacy guarantee requires cryptographic protocols that incur a significant performance overhead as high 1,000 x compared executing same in clear. As result, federations are impractical for common database workloads. This gap reveals following key challenge federation: offering significantly fast and...

10.14778/3407790.3407854 article EN Proceedings of the VLDB Endowment 2020-08-01

Local sensitivity of a query Q given database instance D, i.e. how much the output Q(D) changes when tuple is added to D or deleted from has many applications including analysis, outlier detection, and in differential privacy. However, it NP-hard find local conjunctive terms size query, even for class acyclic queries. Although complexity polynomial fixed, naive algorithms are not efficient large databases queries involving multiple joins. In this paper, we present novel approach compute...

10.1145/3318464.3389762 preprint EN 2020-05-29

We present a method for producing unbiased parameter estimates and valid confidence regions/intervals under the constraints of differential privacy, formal framework limiting individual information leakage from sensitive data.Prior work in this area is limited that it tailored to calculating intervals specific statistical procedures, such as mean estimation or simple linear regression.While other recent can produce more general sets they either yield only approximately estimates, are...

10.5705/ss.202022.0276 article EN Statistica Sinica 2024-01-01

An efficient parallel priority queue is at the core of effort in parallelizing important non-numeric irregular computations such as discrete event simulation scheduling and branch-and-bound algorithms. GPGPUs can provide powerful computing platform for if an implementation available. In this paper, aiming fine-grained applications, we develop heap system employing CUDA. To our knowledge, first on many-core architectures, thus represents a breakthrough. By allowing wide nodes to enable...

10.1109/hipc.2012.6507490 article EN 2012-12-01

Sports data visualization can be a useful tool for analyzing or presenting sports data. In this paper, we present new technique visualizing tennis match It is designed as supplement to online live streaming blogging of matches. retrieve directly from web site and display 2D interactive view statistics. Therefore, it easily integrated with the current platforms used by many news organizations. The addresses limitations coverage matches providing quick overview also great amount details on...

10.2352/issn.2470-1173.2016.1.vda-504 article EN Electronic Imaging 2016-02-14

Hyperparameter optimization is a ubiquitous challenge in machine learning, and the performance of trained model depends crucially upon their effective selection. While rich set tools exist for this purpose, there are currently no practical hyperparameter selection methods under constraint differential privacy (DP). We study honest differentially private which process tuning accounted overall budget. To end, we i) show that standard composition outperform more advanced techniques many...

10.1609/aaai.v36i7.20749 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2022-06-28

A private data federation is a set of autonomous databases that share unified query interface offering in-situ evaluation SQL queries over the union sensitive its members. Owing to privacy concerns, these systems do not have trusted collector can see all their and member cannot learn about individual records other engines. Federations currently achieve this goal by evaluating obliviously using secure multiparty computation. This hides intermediate result cardinality each operator...

10.48550/arxiv.1810.01816 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Differential privacy (DP) allows data analysts to query databases that contain users' sensitive information while providing a quantifiable guarantee users. Recent interactive DP systems such as APEx provide accuracy guarantees over the responses, but fail support large number of queries with limited total budget, they process incoming independently from past queries. We present an interactive, accuracy-aware engine, CacheDP , which utilizes differentially private cache answer current...

10.14778/3574245.3574246 article EN Proceedings of the VLDB Endowment 2022-12-01

Organizations are increasingly relying on data to support decisions. When contains private and sensitive information, the owner often desires publish a synthetic database instance that is similarly useful as true data, while ensuring privacy of individual records. Existing differentially synthesis methods aim generate based applications, but they fail in keeping one most fundamental properties structured -- underlying correlations dependencies among tuples attributes (i.e., structure data)....

10.48550/arxiv.2012.15713 preprint EN cc-by-nc-nd arXiv (Cornell University) 2020-01-01

Differential privacy has become an appealing choice for analyzing sensitive data while offering strong protection, even complex types like graphs. Despite a decade of academic efforts in designing differentially private algorithms graph analysis, few works have been used practice. This is due to their complexity the guarantees and parameter/environmental configurations, or scalability issues large datasets.

10.1145/3448016.3452756 article EN Proceedings of the 2022 International Conference on Management of Data 2021-06-09

Particle Swarm Optimization (PSO) has attracted many researchers attention to solve variant benchmark and real-world optimization problems because of its simplicity, effective performance fast convergence. However, it suffers from premature convergence quickly losing diversity. To enhance performance, this paper proposes a novel disruption strategy, originating astrophysics, shift the abilities between exploration exploitation. The proposed Disruption PSO (DPSO) been evaluated on set...

10.4028/www.scientific.net/amm.380-384.1216 article EN Applied Mechanics and Materials 2013-08-30
Coming Soon ...