- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Caching and Content Delivery
- Advanced Data Storage Technologies
- Cloud Data Security Solutions
- Peer-to-Peer Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Renal cell carcinoma treatment
- Distributed systems and fault tolerance
- Security and Verification in Computing
- Renal and Vascular Pathologies
- Advanced Database Systems and Queries
- FinTech, Crowdfunding, Digital Finance
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Ubiquitin and proteasome pathways
- Chronic Kidney Disease and Diabetes
- Mollusks and Parasites Studies
- Parallel Computing and Optimization Techniques
- IoT and Edge/Fog Computing
- Epigenetics and DNA Methylation
- Access Control and Trust
- Parasite Biology and Host Interactions
Beijing Tsinghua Chang Gung Hospital
2022-2025
Tsinghua University
2022-2025
Agricultural Genomics Institute at Shenzhen
2023-2024
Chinese Academy of Agricultural Sciences
2023-2024
Ministry of Agriculture and Rural Affairs
2023-2024
Syracuse University
2015-2024
Fourth Hospital of Inner Mongolia
2024
Inner Mongolia Agricultural University
2024
Changchun University of Science and Technology
2024
Wuhan University of Science and Technology
2023-2024
Advanced artificial intelligence techniques, such as federated learning, has been applied to broad areas, e.g., image classification, speech recognition, smart city, and healthcare. Despite intensive research on existing schemes are vulnerable attacks can hardly meet the security requirements for real-world applications. The problem of designing a secure learning framework ensure correctness training procedure not sufficiently studied remains open. In this paper, we propose VFChain,...
Abstract Motivation: Genome-wide association studies (GWAS) have been widely used in discovering the between genotypes and phenotypes. Human genome data contain valuable but highly sensitive information. Unprotected disclosure of such information might put individual’s privacy at risk. It is important to protect human data. Exact logistic regression a bias-reduction method based on penalized likelihood discover rare variants that are associated with disease susceptibility. We propose HEALER...
Blockchain technology has attracted much attention due to the great success of cryptocurrencies. Owing its immutability property and consensus protocol, blockchain offers a new solution for trusted storage computation services. To scale up services, prior research suggested hybrid architecture, where only small meta-data are stored onchain raw data outsourced off-chain storage. protect integrity, cryptographic proof can be constructed online queries over in system. However, previous schemes...
Recently somatic mutations of KCNJ5, ATP1A1, ATP2B3, and CACNA1D have been identified in patients with aldosterone-producing adenoma (APA). The present study sequenced the DNA tissues blood samples from Chinese APA for gene mutations.Among 114 patients, 86 (75.4%) were KCNJ5 mutations, including 3 previously reported (G151R, L168R, T158A) 2 other unreported mutations. One patient presented both a point mutation (E147) an insertion mutation, whereas another had 36-base duplication,...
The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount samples, which can grow beyond capability single institution. Federated analysis holds promise enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as are being exchanged...
In biomedical research, data sharing and information exchange are very important for improving quality of care, accelerating discovery, promoting the meaningful secondary use clinical data. A big concern in is protection patient privacy because inappropriate leakage can put at risk. this study, we deployed a grid logistic regression framework based on Secure Multi-party Computation (SMAC-GLORE). Unlike our previous work GLORE, SMAC-GLORE protects not only patient-level data, but also all...
State monitoring is widely used for detecting critical events and abnormalities of distributed systems. As the scale such systems grows degree workload consolidation increases in Cloud data centers, node failures performance interferences, especially transient ones, become norm rather than exception. Hence, state tasks are often exposed to impaired communication caused by dynamics on different nodes. Unfortunately, existing approaches designed under assumption always-online nodes reliable...
This work presents ChainFS, a middleware system that secures cloud storage services using minimally trusted Blockchain. ChainFS hardens the cloud-storage security against forking attacks. The exposes file-system interface to end users. Internally, stores data files in and exports minimal necessary functionalities Blockchain for key distribution file operation logging. We implement on Ethereum S3FS closely integrate it with FUSE clients Amazon S3 storage. measure performance demonstrate low overhead.
operates on a blockchain full node maintained directly by the DApp owner (i.e., an in-house RPC node) or set of nodes hosted third party third-party service) intended to ease deployment.Given ever-growing states (e.g., 130 GB and 1.8 TB for fully synced archived Ethereum node, respectively, as 2018), service plays increasingly important role in ecosystem, scaling clients low-end mobile devices web browsers.Major blockchains today flock roll out supports, which spawn good number services...
This paper presents <small>iBatch</small> , a middleware system running on top of an operational Ethereum network to enable secure batching smart-contract invocations against untrusted relay server off-chain. does so at low overhead by validating the server's batched in smart contracts without additional states user nonces. The mechanism supports variety policies, ranging from conservative aggressive batching, and can be configured adaptively current workloads. automatically rewrites...
Stream processing applications use online analytics to ingest high-rate data sources, process them on-the-fly, and generate live results in a timely manner. The flow graph representation of these facilitates the specification stream computing tasks with ease, also lends itself possible runtime exploitation parallelization on multicore processors. While graphs naturally contain rich set opportunities, exploiting is challenging due combinatorial number configurations. Furthermore, best...
Big data business can leverage and benefit from the Clouds, most optimized, shared, automated, virtualized computing infrastructures. One of important challenges in processing big Clouds is how to effectively partition ensure efficient distributed data. In this paper we present a Scalable yet customizable PArtitioning framework, called SPA, for RDF graph We choose datasets as our focus investigation two reasons. First, Linking Open Data cloud has put forwards good number with tens billions...
DHT is a widely used building block for scalable P2P systems. However, as uniform hashing employed in DHTs destroys data locality, it not trivial task to support complex queries (e.g., range and k-nearest-neighbor queries) DHT-based In order efficient processing of such queries, popular solution build indexes on top the DHT. Unfortunately, existing over-DHT indexing schemes suffer from either query inefficiency or high maintenance cost. this paper, we propose LIGhtweight Hash Tree (LIGHT)—a...
On an Ethereum node, txpool (a.k.a. mempool) is a buffer storing unconfirmed transactions and controls what downstream services can see, such as mining transaction propagation. This work presents the first security study on designs.
In emerging information networks, it is crucially important to provide efficient search on distributed documents while preserving their owners' privacy, for which privacy indexes or PPI presents a possible solution. An understudied problem the techniques how differentiated preservation in presence of multi-keyword document search. The differentiation necessary as terms and phrases bear innate differences semantic meanings. this paper, we present ϵ-MPPI, first work with quantitatively...
The recent shift towards write-intensive workload on big data (e.g., financial trading, social user-generated streams)has pushed the proliferation of log-structured key-value stores, represented by Google's BigTable [1], Apache HBase [2] andCassandra [3]. While providing key-based access with aPut/Get interface, these stores do not support value-based methods, which significantly limits their applicability in modern web and database applications. In this paper, we present DELI, a DEferred...
Today's blockchain systems store detailed runtime information in the format of transactions and blocks, which are valuable not only to understand finance blockchain-based ecosystems but also audit security on-chain applications. However, exploring this “big data” is challenging due data heterogeneity huge amount. Existing exploration techniques either incomplete or inefficient, making them inapt time-sensitive This paper presents <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Mix-zones are recognized as an alternative and complementary approach to spatial cloaking based location privacy protection. break the continuity of exposure by ensuring that users' movements cannot be traced while they reside in a mix-zone. In this paper we provide overview various known attacks make mix-zones on road networks vulnerable illustrate set counter measures network attack resilient. Concretely, categorize vulnerabilities into two classes: one due characteristics user mobility,...
Log-Structured-Merge (LSM) Tree gains much attention recently because of its superior performance in write-intensive workloads. LSM uses an append-only structure memory to achieve low write latency; at capacity, in-memory data are flushed other storage media (e.g. disk). Consequently, read access is slower comparing write. These specific features LSM, including no in-place update and asymmetric read/write raise unique challenges index maintenance for LSM. The structural difference between...
In emerging information networks, having a privacy preserving index (or PPI) is critically important for locating of interest data sharing across autonomous providers while privacy. An understudied problem PPI techniques how to provide controllable preservation, given the innate difference concerns regarding different owners. this paper we present personalized index, coined ε-PPI, which guarantees quantitative preservation differentiated by personal identities. We devise new common-identity...
As one of the 100 most-threatening invasive alien species, giant African snail (Achatina immaculata) has successfully invaded and established itself in most areas southern China. Protection against recurrent pathogen infections is vital to biological invasion. Enhanced immune protection been previously found other invertebrates, but not unique system snail. In present study, survival rate was recorded following a second infection with lethal doses Escherichia coli after previous first...