- Distributed and Parallel Computing Systems
- Power Systems and Technologies
- Peer-to-Peer Network Technologies
- Physical Unclonable Functions (PUFs) and Hardware Security
- Brain Tumor Detection and Classification
- Advanced Neural Network Applications
- Privacy-Preserving Technologies in Data
- Domain Adaptation and Few-Shot Learning
- Integrated Circuits and Semiconductor Failure Analysis
- Smart Grid and Power Systems
- Distributed Control Multi-Agent Systems
- Network Security and Intrusion Detection
- Speech and Audio Processing
- Embedded Systems Design Techniques
- Mobile Crowdsensing and Crowdsourcing
- Adversarial Robustness in Machine Learning
- Speech and dialogue systems
- Stochastic Gradient Optimization Techniques
- Thermal Analysis in Power Transmission
- Privacy, Security, and Data Protection
- Service-Oriented Architecture and Web Services
- Cryptography and Data Security
- User Authentication and Security Systems
- VLSI and Analog Circuit Testing
- Power Line Inspection Robots
Chinese University of Hong Kong
2023-2025
University of Wisconsin–Madison
2025
Fujian Normal University
2024
Zhejiang University
2021-2023
Shanghai Institute of Computing Technology
2005-2006
East China University of Technology
2005
Hsin Sheng College of Medical Care and Management
2002
Consumer electronic devices often involve processing and analyzing a large amount of user personal data. Nevertheless, owing to apprehensions regarding privacy security, users are hesitant transmit this sensitive data centralized cloud servers for training. The combination mobile edge computing federated learning (FL) enables local access computational power storage resources, allowing them engage in distributed model training while safeguarding privacy. However, these resources not...
Quantum circuit simulator (QCS) is essential for designing quantum algorithms because it assists researchers in understanding how operations work without access to expensive computers. Traditional array-based QCSs suffer from exponential time and memory complexities. To address this problem, Decision Diagram (DD) was introduced compress simulation data by exploring the regularity. However, irregular structures, DD-based incurs significant runtime overhead. overcome challenge, we present...
Voice assistants can be manipulated by various malicious voice commands, yet existing attacks require a nearby speaker to play the attack commands. In this paper, we show that even when no speakers are available, commands utilizing capacitors inside electronic devices, i.e., convert into and call it CapSpeaker. Essentially, emit acoustic noises due inverse piezoelectric effect, varying voltage across capacitor make vibrate thus noises. Forcing is challenging because (1) frequency responses...
Abstract The goal of the ShanghaiGrid is to provide information services people. It aims construct a metropolitan‐area service infrastructure and establish an open standard for widespread upper‐layer applications from both communities government. Information Service Grid Toolkit typical application called Traffic are discussed in detail. Copyright © 2005 John Wiley & Sons, Ltd.
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise many threats, like piracy IC intellectual property or insertion hardware Trojans, i.e., malicious circuit modifications.
Ransomware is a kind of computer malware that has spread widely in recent years, such as DarkSide, which around the world recently. It's reported DarkSide extorted ${\$}$ 90 million nine months. It extorts ransom from users by encrypting user files and other methods, causing huge economic losses to users, including commercial organizations individuals. Existing ransomware detection methods include hostbased network-based methods. However, these are either hard deploy or have possibility be...
Sparse deep neural networks (DNNs) leverage sparse representations to achieve faster inference and lower memory footprint. However, deploying DNNs comes with challenges, such as irregular access patterns, workload imbalance, etc. To address these IEEE HPEC has organized the DNN Graph Challenge (SDGC), seeking new methods from high-performance computing community. For many years, SDGC yielded innovative works on accelerating inference. none of them have identified redundant global that...
Recent studies have exposed that voice assistants can be manipulated by various commands without being noticed, however, existing attacks require a nearby speaker to play the attack commands. In this paper, we demonstrate even speaker, use capacitors inside electronic devices produce malicious commands, i.e., convert into speakers and call it <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CapSpeaker</monospace> . The underlying principle...
The nearest goal of ShanghaiGrid is going to connect all supercomputers in this metropolis together form a sharing environment for massive storage and grid computing. first stage projects comprise four sub-projects, including: research on environment, protocols standards information infrastructure; development system software establishment major intra-grid nodes; peer-to-peer based virtual platform; the application traffic-jam control guidance. This paper introduces background ShanghaiGrid,...
Reinforcement learning (RL) is pivotal in empowering Unmanned Aerial Vehicles (UAVs) to navigate and make decisions efficiently intelligently within complex dynamic surroundings. Despite its significance, RL hampered by inherent limitations such as low sample efficiency, restricted generalization capabilities, a heavy reliance on the intricacies of reward function design. These challenges often render single-method approaches inadequate, particularly context UAV operations where high costs...
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise many security threats, like piracy IC intellectual property or insertion hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically protect the physical layouts against post-design Trojans. Toward that end, propose TroLLoc, a novel scheme for closure employs, first time, logic...
The goal of the ShanghaiGrid is to provide information services people. It aims construct a metropolitan-area service infrastructure and establish an open standard for widespread upper-layer applications from both communities government. This paper introduces Information Service Grid Toolkit in detail.
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise many threats, like piracy IC intellectual property or insertion hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts against post-design Trojans. Toward that end, propose a multiplexer-based logic-locking scheme is (i) devised for layout-level...