Yifeng Cai

ORCID: 0000-0002-0049-6670
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Security and Verification in Computing
  • Advanced Sensor and Energy Harvesting Materials
  • Internet Traffic Analysis and Secure E-voting
  • Innovative Energy Harvesting Technologies
  • Energy Harvesting in Wireless Networks
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Distributed Sensor Networks and Detection Algorithms
  • Security in Wireless Sensor Networks
  • Mobile Crowdsensing and Crowdsourcing
  • Cognitive Radio Networks and Spectrum Sensing
  • Multimodal Machine Learning Applications
  • Domain Adaptation and Few-Shot Learning
  • Wireless Communication Security Techniques
  • Cancer Genomics and Diagnostics
  • Nanoparticle-Based Drug Delivery
  • Underwater Vehicles and Communication Systems
  • Ultrasound and Hyperthermia Applications
  • Energy Efficient Wireless Sensor Networks
  • Radiation Effects in Electronics
  • Pancreatic and Hepatic Oncology Research
  • Stochastic Gradient Optimization Techniques
  • Chronic Myeloid Leukemia Treatments

Peking University
2021-2025

The First Affiliated Hospital, Sun Yat-sen University
2021-2024

Sun Yat-sen University
2021-2024

Software (Spain)
2023-2024

Shell (Netherlands)
2021

Princess Margaret Cancer Centre
2019

Shanghai First People's Hospital
2019

University of Freiburg
2015-2018

Huazhong University of Science and Technology
2012-2014

The increasing of pre-trained models has significantly facilitated the performance on limited data tasks with transfer learning. However, progress learning mainly focuses optimizing weights models, which ignores structure mismatch between model and target task. This paper aims to improve from another angle - in addition tuning weights, we tune order better match To this end, propose TransTailor, targeting at pruning for improved Different traditional pipelines, prune fine-tune according...

10.1609/aaai.v35i10.17046 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2021-05-18

Modern Federated Learning (FL) has become increasingly essential for handling highly heterogeneous mobile devices. Current approaches adopt a partial model aggregation paradigm that leads to sub-optimal accuracy and higher training overhead. In this paper, we challenge the prevailing notion of partial-model propose novel "full-weight aggregation" method named Moss, which aggregates all weights within models preserve comprehensive knowledge. Evaluation across various applications demonstrates...

10.1145/3712274 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2025-03-03

Cognitive radio networks allow opportunistic spectrum access and can significantly improve spectral efficiency. To achieve higher sensing accuracy, cognitive systems often require cooperation among secondary users. One of the most important aspects in collaborative is data fusion algorithm which combines results from users to produce final channel status hypothesis. However, plenty factors may affect performance certain rule, for example, individual node's number involved nodes, like. If...

10.1109/mnet.2014.6724102 article EN IEEE Network 2014-01-01

Harvesting energy from ambient vibrations with piezoelectric transducers is an alternative solution for the surging needs of self-powered devices, such as IoT condition and structural monitoring or biomedical implants. A limiting factor transducer narrow bandwidth due to high mechanical quality factor. Therefore, output power drops significantly when excitation frequency deviates resonant in a real environment. One introduce time delays into active harvesting-interface concepts Synchronous...

10.1109/isscc.2018.8310227 article EN 2022 IEEE International Solid- State Circuits Conference (ISSCC) 2018-02-01

Crowdsourcing Federated learning (CFL) is a new crowdsourcing development paradigm for the Deep Neural Network (DNN) models, also called "software 2.0". In practice, privacy of CFL can be compromised by many attacks, such as free-rider adversarial gradient leakage and inference attacks. Conventional defensive techniques have low efficiency because they deploy heavy encryption or rely on Trusted Execution Environments (TEEs). To improve protecting from these this paper proposes FedSlice to...

10.1109/icse48619.2023.00049 article EN 2023-05-01

Federated learning (FL) has emerged as an effective solution to decentralized and privacy-preserving machine for mobile clients. While traditional FL demonstrated its superiority, it ignores the non-iid (independently identically distributed) situation, which widely exists in scenarios. Failing handle situations could cause problems such performance decreasing possible attacks. Previous studies focus on "symptoms" directly, they try improve accuracy or detect attacks by adding extra steps...

10.1145/3494966 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2021-12-27

Providing machine learning services is becoming profit business for IT companies. It estimated that the AI-related will bring trillions of dollars to global economy. When selling services, companies should consider two important aspects: security DNN model and inference latency. The models are expensive train represent precious intellectual property. latency because modern usually deployed time-sensitive tasks affects user's experience. Existing solutions cannot achieve a good balance...

10.1145/3536168.3543299 article EN 2022-07-15

This paper presents a piezoelectric energy harvesting interface circuit with technique to broaden the bandwidth by introducing two time delays into conventional synchronous-electrical-charge-extraction (SECE) scheme. The adaptively adjusts these for maximum power output at off-resonant frequencies. is increased 71% while consumption of itself low level 0.85μW. chip fabricated in 0.35μm CMOS process technology.

10.1109/esscirc.2017.8094540 article EN 2017-09-01

One of the most crucial functionalities cognitive radio networks is spectrum sensing. Completing this task in an accurate manner requires opportunistic access. Traditionally, sensing has been performed through energy detection by each individual secondary user. In order to increase accuracy, measurements are aggregated using different fusion functions. However, even though collaborative can accuracy under benign settings, it prone falsification attacks, where malicious users report fake...

10.1109/dyspan.2014.6817799 article EN 2014-04-01

The rapid digitization of various services has led to the emergence super apps, providing an array utilities under one application. A common usage scenario such platforms, as Alipay, involves shared accounts by multiple users, typically within a family. However, this use poses unique challenge security protocols designed prevent unauthorized access, they can misinterpret legitimate multi-user behavior fraudulent activity. In paper, we explore complexities involved in accurately discerning...

10.1145/3605762.3624426 article EN 2023-11-23

This paper presents a novel system design of an adaptive time-controlled energy harvesting interface circuit for broadening the bandwidth piezoelectric transducers. The proposed monitors excitation frequency and delays switching activity accordingly to achieve optimal impedance matching. theory calculating time delay values are described in detail. Simulation result shows that is able generate nearly as much power theoretical limitation over large range frequency, increases from 3.7 Hz more...

10.1109/iscas.2015.7168614 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2015-05-01

Federated learning (FL) has emerged as an effective solution to decentralized and privacy-preserving machine for mobile clients. While traditional FL demonstrated its superiority, it ignores the non-iid (independently identically distributed) situation, which widely exists in scenarios. Failing handle situations could cause problems such performance decreasing possible attacks. Previous studies focus on "symptoms" directly, they try improve accuracy or detect attacks by adding extra steps...

10.48550/arxiv.2110.11619 preprint EN other-oa arXiv (Cornell University) 2021-01-01

In the area of performance analysis wireless networks, one critical issue is hidden terminal problem, which considered as severest reasons for degradation network performance. this paper, we incorporate reactive jamming scheme with distributed coordination function (DCF) in IEEE 802.11 based local networks (WLANs) to improve throughput presence terminals. proposed protocol, schedule access point (AP) broadcast signal reactively hinder simultaneous transmission Both analytical and numerical...

10.1109/wcnc.2013.6554715 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2013-04-01

Fine-tuning is a typical mechanism to achieve model adaptation for mobile/web users, where trained by the cloud further retrained fit target user task. While traditional fine-tuning has been proved effective, it only utilizes local data adaptation, failing take advantage of valuable knowledge from other users. In this paper, we attempt extend local-user multi-user fed-tuning with help Federated Learning (FL). Following new paradigm, propose EEFT, framework aiming Efficient and Effective...

10.1145/3543507.3583212 article EN Proceedings of the ACM Web Conference 2022 2023-04-26

Indoor localization is important to many location based applications and services. Many indoor methods have been proposed they can be roughly categorized into two groups: One on the distance estimation between a target point Access Points (APs); other Received Signal Strength (RSS) fingerprint map. However, approaches all assume that locations of (APs) are known beforehand. In this paper, we consider scenario APs not known, use measured RSS (Received Strength) at some location-known...

10.1109/icc.2012.6364884 article EN 2012-06-01

In the context of hepatocellular carcinoma (HCC) treatment, this study introduces a biomimetic "bomb" approach to target HCC by utilizing macrophages (MAs) as ultrasound-responsive carriers. This advanced drug delivery system (MAs-DOX/PFP/Ms, MAs-DPM) encapsulates doxorubicin (DOX) and perfluoropentane (PFP) is designed precisely HCC. MAs-DPM exhibits excellent loading capacity biocompatibility, can effectively release DOX enhance ultrasound imaging capabilities under irradiation (UI)....

10.1016/j.matdes.2024.113202 article EN cc-by-nc-nd Materials & Design 2024-07-26

Trusted Execution Environments (TEE) are used to safeguard on-device models. However, directly employing TEEs secure the entire DNN model is challenging due limited computational speed. Utilizing GPU can accelerate DNN's computation speed but commercial widely-available GPUs usually lack security protection. To this end, scholars introduce TSDP, a method that protects privacy-sensitive weights within and offloads insensitive GPUs. Nevertheless, current methods do not consider presence of...

10.48550/arxiv.2411.09945 preprint EN arXiv (Cornell University) 2024-11-14

Trusted Execution Environments (TEE) are used to safeguard on-device models. However, directly employing TEEs secure the entire DNN model is challenging due limited computational speed. Utilizing GPU can accelerate DNN's computation speed but commercial widely-available GPUs usually lack security protection. To this end, scholars introduce TEE-shielded partition (TSDP), a method that protects privacy-sensitive weights within and offloads insensitive GPUs. Nevertheless, current methods do not...

10.1145/3707453 article EN ACM Transactions on Software Engineering and Methodology 2024-12-18

The increasing of pre-trained models has significantly facilitated the performance on limited data tasks with transfer learning. However, progress learning mainly focuses optimizing weights models, which ignores structure mismatch between model and target task. This paper aims to improve from another angle - in addition tuning weights, we tune order better match To this end, propose TransTailor, targeting at pruning for improved Different traditional pipelines, prune fine-tune according...

10.48550/arxiv.2103.01542 preprint EN other-oa arXiv (Cornell University) 2021-01-01

In this paper, we proposed a method to fuse data from radar and IR sensor in Extend Kalman probability hypothesis density (EK-GMPHD) filter. Firstly the multi-target is estimated with infrared (IR) using EK-GMPHD filter, then filtering results are fused measurements through sequential way, state updated at tracking system. Under false alarms, missed detections dense targets environment, has high reliability when multi-target. Simulation experiments presented demonstrate performance of method.

10.1109/icinfa.2010.5512253 article EN 2010-06-01

Background: Normal karyotype acute myeloid leukemia (NK AML) currently does not have a universal measurable residual disease (MRD) target, thus making next generation sequencing (NGS) more attractive as an MRD monitoring tool. Also, there is limited knowledge on selecting consolidation therapy based the status at time of first achievement complete remission (CR1) in NK AML between allogeneic hematopoietic cell transplantation (allo‐HCT) and chemotherapy. Aims: Current study aims to...

10.1097/01.hs9.0000564700.06449.e7 article EN cc-by-nc-nd HemaSphere 2019-06-01

Abstract Background: Although some improvements in the management of pancreatic cancer (PC) have been made, no major breakthroughs terms biomarker discovery or effective treatment emerged. Here, we applied artificial intelligence (AI)-based methods to develop a model diagnose PC and predict survival outcome. Methods: Multiple bioinformatics methods, including RankProd, were performed identify differentially expressed genes (DEGs) PC. A Back Propagation (BP) was constructed, followed by...

10.21203/rs.3.rs-151851/v1 preprint EN cc-by Research Square (Research Square) 2021-02-08

Summary Majority of the deep learning techniques in seismic image analysis focus on solving one task at a time and ignore richness presence many other structures vicinity their correlation with interest hand. These approaches work best identification simple shallow areas survey where signal-to-noise ratio is high struggle deeper as signal becomes weaker. In addition, it challenge to acquire right data quality labels train models for some fundamental challenges geoscience. this paper, we...

10.3997/2214-4609.202130009 article EN 2021-01-01
Coming Soon ...