Wei Zhang

ORCID: 0000-0002-3416-704X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Stochastic Gradient Optimization Techniques
  • Caching and Content Delivery
  • Security in Wireless Sensor Networks
  • Quantum Mechanics and Applications
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Advanced Steganography and Watermarking Techniques
  • Data Quality and Management
  • Advanced Database Systems and Queries
  • Chaos-based Image/Signal Encryption
  • Complexity and Algorithms in Graphs
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Flood Risk Assessment and Management
  • Advanced Malware Detection Techniques
  • Solar Radiation and Photovoltaics
  • Advanced Authentication Protocols Security
  • Age of Information Optimization
  • Ethics and Social Impacts of AI
  • Network Security and Intrusion Detection
  • Cryospheric studies and observations
  • Mobile Crowdsensing and Crowdsourcing

Hong Kong University of Science and Technology
2024

University of Hong Kong
2024

Chinese People's Armed Police Force Engineering University
2023

Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application
2023

Ministry of Natural Resources
2023

Nanjing University
2023

North China University of Science and Technology
2022

Changsha University
2022

Hunan University
2013-2021

Fudan University
2018

Most commonly used distributed machine learning systems are either synchronous or centralized asynchronous. Synchronous algorithms like AllReduce-SGD perform poorly in a heterogeneous environment, while asynchronous using parameter server suffer from 1) communication bottleneck at servers when workers many, and 2) significantly worse convergence the traffic to is congested. Can we design an algorithm that robust being efficient maintaining best-possible rate? In this paper, propose...

10.48550/arxiv.1710.06952 preprint EN other-oa arXiv (Cornell University) 2017-01-01

With the advent of cloud computing, it has become increasingly popular for data owners to outsource their public servers while allowing users retrieve this data. For privacy concerns, secure searches over encrypted motivated several research works under single owner model. However, most in practice do not just serve one owner; instead, they support multiple share benefits brought by computing. In paper, we propose schemes deal with preserving ranked multi-keyword search a multi-owner model...

10.1109/tc.2015.2448099 article EN IEEE Transactions on Computers 2015-06-22

With the advent of cloud computing, it becomes increasingly popular for data owners to outsource their public servers while allowing users retrieve these data. For privacy concerns, secure searches over encrypted motivated several researches under single owner model. However, most in practice do not just serve one owner, instead, they support multiple share benefits brought by servers. In this paper, we propose schemes deal with ranked multi-keyword search a multi-owner To enable perform...

10.1109/dsn.2014.36 article EN 2014-06-01

With the development of cloud storage, more data owners are inclined to outsource their services. For privacy concerns, sensitive should be encrypted before outsourcing. There various searchable encryption schemes ensure availability. However, existing search pay little attention efficiency users' queries, especially for multi-owner scenario. In this paper, we proposed a tree-based ranked multi-keyword scheme multiple owners. Specifically, by considering large amount in cloud, utilize TF ×...

10.1109/access.2018.2828404 article EN cc-by-nc-nd IEEE Access 2018-01-01

With the advent of cloud computing, more and people tend to outsource their data cloud. As a fundamental utilization, secure keyword search over encrypted has attracted interest many researchers recently. However, most existing researches are based on an ideal assumption that server is "curious but honest", where results not verified. In this paper, we consider challenging model, would probably behave dishonestly. Based explore problem result verification for ranked search. Different from...

10.1109/tcc.2015.2481389 article EN IEEE Transactions on Cloud Computing 2015-09-23

Federated learning is a new type of distributed framework that allows multiple participants to share training results without revealing their data privacy. As privacy becomes more important, it difficult collect from owners make machine predictions due the lack security. Data forced be stored independently between companies, creating "data silos". With goal safeguarding and security, federated greatly expands amount data, effectively improving shortcomings traditional deep learning, bringing...

10.1016/j.dcan.2022.11.006 article EN cc-by-nc-nd Digital Communications and Networks 2022-11-17

The e-healthcare cloud system has shown its potential to improve the quality of healthcare and individuals' life. Unfortunately, security privacy impede widespread deployment application. There are several research works focusing on preserving electronic record (EHR) data. However, these have two main limitations. First, they only support `black or white' access control policy. Second, suffer from inference attack. In this paper, for first time, we design an attack-resistant with...

10.1109/tsc.2018.2790943 article EN IEEE Transactions on Services Computing 2018-01-08

High-speed Internet becomes more widely accessible, the cost of connecting devices is reducing, are being created with Wi-Fi abilities and sensors built into those devices, technology costs cost-effective. All these things creating a ``storm" for Things (IoT) era. With emergence Things, connect through internet, there many that providing data. The If want to share data aim achieving abstract knowledge, they need pass network. Some provide sensitive information can be time. We should protect...

10.1109/ispa/iucc.2017.00137 article EN 2017-12-01

Recently, Goutham et al. proposed an ID-based user authentication with key agreement on elliptic curve cryptography(ECC), which is suitable to be applied in client-serverenvironment. The scheme mainly negotiates a temporary session between two parties. However, we find that the contains some security flaws, such as incomplete anonymity, no provision for updating private and so on. In light of this, propose new version anonymous protocol used client-server environment, especially, calculation...

10.1109/trustcom/bigdatase/icess.2017.234 article EN 2017-08-01

The cloud-assisted industrial Internet of Things (IIoT) architecture can sustain highly available computation and massive storage services for modern systems. When data owners store IIoT to remote cloud platforms, the security will face tough challenges. Cryptographic technologies endow an ability guarantee confidentiality. However, traditional encryption techniques make access control searching malfunctioning. Recently emerging attribute-based keyword search (ABKS) primitive achieves...

10.1109/tii.2022.3192304 article EN IEEE Transactions on Industrial Informatics 2022-07-19

Rule mining, for discovering valuable relations between items in large databases, has been a popular and well researched method years. However, such old but important technique faces huge challenges difficulties the era of cloud computing although which affords both storage scalability: 1) data are outsourced to due explosion high management cost, 2) moreover, usually encrypted first before being privacy's sake. Existing privacy-preserving rule mining methods only assume distributed model...

10.1109/aina.2015.235 article EN 2015-03-01

Organizations and individuals nowadays are more willing to outsource their data save storage management costs, especially with the push of cloud computing which offers both computation scalability. However, data, once being released a server, is no longer under its owner's control, privacy security herein become primary concern. To this end, users usually encrypt private before outsourcing it, however makes mining be very thorny challenging as big encrypted. Under such new circumstance, we...

10.1109/bigdataservice.2015.9 article EN 2015-03-01

In the scenario of cloud computing, it is necessary to consider privacy protection audio content as well copyright and authentication simultaneously. this paper, we propose an encrypted multipurpose watermarking scheme based on storage computing. We firstly perform domain discrete wavelet transform obtain coefficients. By using spread spectrum method, embed robust fragile watermarks into different sub-bands. then algorithms extract from watermarked audio. Some experiments are conducted...

10.1109/trustcom/bigdatase.2018.00023 article EN 2018-08-01

Searchable encryption enables users to perform a keyword-based search over encrypted data. Most of the existing searchable schemes are based on single cloud server model, which has some limitations, such as point failure and malicious insiders. In contrast, multicloud model higher data availability security. However, directly moving keyword would cause larger storage costs, security cannot be distinctly improved. addition, different from cloud, challenge is how effectively verify query...

10.1109/jsyst.2021.3069200 article EN IEEE Systems Journal 2021-04-22

A novel quantum group signature scheme is proposed based on Chinese Remainder Theorem (CRT), in order to improve the security of signature. The generation and verification can be successfully conducted only if all participants cooperate with each other message owner's arbitrator's help. parallel algorithm applied efficiently compare restored original message. All operations signing verifying phase executed circuits. It has a wide application E-payment system, Online contract, notarization etc.

10.4236/jsea.2013.65b004 article EN cc-by Journal of Software Engineering and Applications 2013-01-01

10.1109/asp-dac58780.2024.10473807 article EN 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC) 2024-01-22

Federated learning has become an effective method to realize collaborative among multiple data centers. However, the problem of privacy leakage not been perfectly solved. We proposed a scheme based on homomorphic encryption with random masks cope private caused by honest but curious participants. Through combining Paillier mask, security process is enhanced trivial computation and communication cost. Experimental results show that decryption time reduced more than half after using CRT...

10.1109/nana60121.2023.00084 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2023-08-01

Audio has become increasingly important in modern social communication and mobile Internet, e.g., the employment of voice messaging Apps. In scenario cloud computing, we need to consider privacy protection audio content integrity simultaneously. this paper, study application an encrypted fragile watermarking a privacy-preserving authentication system cloud. We firstly implement computation Mel-frequency cepstral coefficient domain (MFCC-ED) with additive homomorphic encryption. By performing...

10.1109/trustcom/bigdatase.2018.00021 article EN 2018-08-01

With the continuous progress of society, economic level has also been greatly improved, and people are paying more attention to intelligent humanized management in their lives. At same time, environmental problems hidden safety hazards increasing, posing a serious threat human life property. People have higher pursuit for quality life. In order ensure that personal, property other related information not leaked, national security construction is affected, one important issues. However,...

10.1109/icetci55101.2022.9832098 article EN 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI) 2022-05-27
Coming Soon ...