Jiahao Ding

ORCID: 0000-0002-2867-4133
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Stochastic Gradient Optimization Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Distributed Sensor Networks and Detection Algorithms
  • Sparse and Compressive Sensing Techniques
  • Wireless Communication Security Techniques
  • Age of Information Optimization
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Time Series Analysis and Forecasting
  • Adversarial Robustness in Machine Learning
  • Adhesion, Friction, and Surface Interactions
  • Blockchain Technology Applications and Security
  • Ethics and Social Impacts of AI
  • Transportation and Mobility Innovations
  • Plant Virus Research Studies
  • Privacy, Security, and Data Protection
  • Mechanical stress and fatigue analysis
  • Domain Adaptation and Few-Shot Learning
  • Anomaly Detection Techniques and Applications
  • Plant and Fungal Interactions Research
  • Cryptography and Data Security
  • Traffic Prediction and Management Techniques
  • Plant Disease Resistance and Genetics
  • Vehicular Ad Hoc Networks (VANETs)

Hebei Medical University
2025

Tsinghua University
2021-2024

Peking University
2024

University of Houston
2018-2023

North China University of Science and Technology
2022-2023

Shanghai Jiao Tong University
2020-2023

Donghua University
2022

Huazhong Agricultural University
2022

Guangdong University of Technology
2021

University of Shanghai for Science and Technology
2018

Federated learning is a promising tool in the Internet-of-Things (IoT) domain for training machine model decentralized manner. Specifically, data owners (e.g., IoT device consumers) keep their raw and only share local computation results to train global of owner an service provider). When executing federated task, contribute communication resources. In this situation, have face privacy issues where attackers may infer property or recover based on shared information. Considering these...

10.1109/jiot.2021.3050163 article EN IEEE Internet of Things Journal 2021-01-10

Federated learning (FL) through its novel applications and services has enhanced presence as a promising tool in the Internet of Things (IoT) domain. Specifically, multiaccess edge computing setup with host IoT devices, FL is most suitable since it leverages distributed client data to train high-performance deep (DL) models while keeping private. However, underlying neural networks (DNNs) are huge, preventing direct deployment onto resource-constrained memory-limited devices. Besides,...

10.1109/jiot.2022.3145865 article EN publisher-specific-oa IEEE Internet of Things Journal 2022-01-24

The transportation network company (TNC) services efficiently pair the passengers with vehicles/drivers through mobile applications, such as Uber, Lyft, Didi, etc. TNC definitely facilitate traveling of passengers, while it is equally important to effectively and intelligently schedule routes cruising vehicles improve drivers' revenues. From side, most critical question address how reduce time, efficiency/earnings by using their own provide services. In this paper, we propose a deep...

10.1109/jiot.2019.2902815 article EN IEEE Internet of Things Journal 2019-03-05

Deep learning holds a great promise of revolutionizing healthcare and medicine. Unfortunately, various inference attack models demonstrated that deep puts sensitive patient information at risk. The high capacity neural networks is the main reason behind privacy loss. In particular, in training data can be unintentionally memorized by network. Adversarial parties extract given ability to access or query this paper, we propose novel privacy-preserving mechanism for networks. Our approach adds...

10.1109/wacv48630.2021.00121 article EN 2021-01-01

Machine learning is increasingly becoming a powerful tool to make decisions in wide variety of applications, such as medical diagnosis and autonomous driving. Privacy concerns related the training data unfair behaviors some with regard certain attributes (e.g., sex, race) are more critical. Thus, constructing fair machine model while simultaneously providing privacy protection becomes challenging problem. In this paper, we focus on design classification fairness differential guarantees by...

10.1609/aaai.v34i01.5402 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2020-04-03

Indoor location-based services (LBS) are widely used in large-scale indoor buildings, such as high-rise hospitals and multi-story shopping malls. At the same time, location privacy protection three-dimensional (3D) space has recently attracted considerable attention. Currently, most existing schemes focus on two-dimensional (2D) fail to prevent inference attacks when user's data include height dimension, i.e., 3D geolocation. Enlightened by concept of differential privacy, this paper we...

10.1109/twc.2021.3132464 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2021-12-10

Objective To use the United States National Health and Nutrition Examination Study (NHANES) to develop validate a risk-prediction nomogram for cognitive impairment in people aged over 60 years. Methods A total of 2,802 participants (aged ≥ years) from NHANES were analyzed. The least absolute shrinkage selection operator (LASSO) regression model multivariable logistic analysis used variable development. ROC-AUC, calibration curve, decision curve (DCA) evaluate nomogram’s performance. Results...

10.3389/fnins.2023.1195570 article EN cc-by Frontiers in Neuroscience 2023-08-17

The rapid development of indoor location-based services (LBS) has raised concerns about location privacy protection in the 3-dimensional (3D) space. existing 2-dimensional (2D) mechanisms (LPPMs) cannot effectively resist attacks 3D environments. Furthermore, users may have various sensitive attributes at different locations and times. In this paper, we first formally study relationship between two complementary notions geo-indistinguishability distortion (i.e., expected inference error)...

10.1109/tdsc.2023.3335374 article EN IEEE Transactions on Dependable and Secure Computing 2023-11-22

To embrace the era of big data, there has been growing interest in designing distributed machine learning to exploit collective computing power local nodes. Alternating Direction Method Multipliers (ADMM) is one most popular methods. This method applies iterative computations over datasets at each agent and computation results exchange between neighbors. During this process, data privacy leakage arises when performing sensitive data. Although many differentially private ADMM algorithms have...

10.1109/bigdata47090.2019.9005716 article EN 2021 IEEE International Conference on Big Data (Big Data) 2019-12-01

Deep learning has attracted broad interest in healthcare and medical communities. However, there been little research into the privacy issues created by deep networks trained for applications. Recently developed inference attack algorithms indicate that images text records can be reconstructed malicious parties have ability to query networks. This gives rise concern electronic health containing sensitive patient information are vulnerable these attacks. paper aims attract from researchers...

10.48550/arxiv.2011.00177 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Collaborative learning has received huge interests due to its capability of exploiting the collective computing power wireless edge devices. However, during process, model updates using local private samples and large-scale parameter exchanges among agents impose severe privacy concerns communication bottleneck. In this paper, address these problems, we propose two differentially (DP) efficient algorithms, called Q-DPSGD-1 Q-DPSGD-2. Q-DPSGD-1, each agent first performs by a DP gradient...

10.1609/aaai.v35i8.16887 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2021-05-18

The advance in mobile communications has escalated the use of transportation network company (TNC) services by residents. TNC efficiently pair passengers with vehicles/drivers through applications such as Uber, Lyft, Didi, etc. definitely facilitate traveling passengers, while it is equally important to effectively and intelligently schedule routes cruising vehicles improve drivers' revenues. From side, most critical question address how reduce time, efficiency/earnings using their own...

10.1109/glocom.2018.8647546 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

Machine learning has a vast outreach in principal applications and uses large amount of data to train the models, prompting viable easy use Learning as Service (MLaaS). This flexible paradigm however, could have immense privacy implications since training often contains sensitive features, adversarial access such models pose security risk. In attacks model inversion attack on system used for face recognition, an adversary output (target label) reconstruct input (image target individual from...

10.1109/globecom42002.2020.9322508 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2020-12-01

With the wide range application of machine learning in healthcare for helping humans drive crucial decisions, data privacy becomes an inevitable concern due to utilization sensitive such as patients records and registers a company. Thus, constructing preserving model while still maintaining high accuracy challenging problem. In this article, we propose two differentially private algorithms, i.e., Output Perturbation with aGM (OPERA) Gradient (GRPUA) empirical risk minimization, useful method...

10.1109/tbdata.2020.2997732 article EN publisher-specific-oa IEEE Transactions on Big Data 2020-05-26

As a promising method of central model training on decentralized device data while securing user privacy, Federated Learning (FL) is becoming popular in the Internet Things (IoT) design. However, when collected by IoT devices are highly skewed non-independent and identically distributed (non-IID) manner, accuracy vanilla FL cannot be guaranteed. Although there exist various solutions that try to address bottleneck with non-IID data, most them suffer from extra intolerable communication...

10.1142/s0218126622502358 article EN Journal of Circuits Systems and Computers 2022-04-25

In recent years, generative adversarial network (GAN) has attracted great attention due to its impressive performance and potential numerous applications, such as data augmentation, real-like image synthesis, compression improvement, etc. The generator in GAN learns the density of distribution from real order generate high fidelity fake samples latent space deceive discriminator. Despite advantages, can easily memorize training because model complexity deep neural networks. Thus, a with...

10.1109/globecom38437.2019.9014134 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01
Coming Soon ...