Shui Jiang

ORCID: 0000-0003-0718-1003
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Power Systems and Technologies
  • Peer-to-Peer Network Technologies
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Brain Tumor Detection and Classification
  • Advanced Neural Network Applications
  • Privacy-Preserving Technologies in Data
  • Domain Adaptation and Few-Shot Learning
  • Integrated Circuits and Semiconductor Failure Analysis
  • Smart Grid and Power Systems
  • Distributed Control Multi-Agent Systems
  • Network Security and Intrusion Detection
  • Speech and Audio Processing
  • Embedded Systems Design Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Adversarial Robustness in Machine Learning
  • Speech and dialogue systems
  • Stochastic Gradient Optimization Techniques
  • Thermal Analysis in Power Transmission
  • Privacy, Security, and Data Protection
  • Service-Oriented Architecture and Web Services
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • VLSI and Analog Circuit Testing
  • Power Line Inspection Robots

Chinese University of Hong Kong
2023-2025

University of Wisconsin–Madison
2025

Fujian Normal University
2024

Zhejiang University
2021-2023

Shanghai Institute of Computing Technology
2005-2006

East China University of Technology
2005

Hsin Sheng College of Medical Care and Management
2002

Consumer electronic devices often involve processing and analyzing a large amount of user personal data. Nevertheless, owing to apprehensions regarding privacy security, users are hesitant transmit this sensitive data centralized cloud servers for training. The combination mobile edge computing federated learning (FL) enables local access computational power storage resources, allowing them engage in distributed model training while safeguarding privacy. However, these resources not...

10.1109/tce.2024.3351648 article EN IEEE Transactions on Consumer Electronics 2024-01-09

Quantum circuit simulator (QCS) is essential for designing quantum algorithms because it assists researchers in understanding how operations work without access to expensive computers. Traditional array-based QCSs suffer from exponential time and memory complexities. To address this problem, Decision Diagram (DD) was introduced compress simulation data by exploring the regularity. However, irregular structures, DD-based incurs significant runtime overhead. overcome challenge, we present...

10.1145/3673038.3673073 article EN cc-by 2024-08-08

Voice assistants can be manipulated by various malicious voice commands, yet existing attacks require a nearby speaker to play the attack commands. In this paper, we show that even when no speakers are available, commands utilizing capacitors inside electronic devices, i.e., convert into and call it CapSpeaker. Essentially, emit acoustic noises due inverse piezoelectric effect, varying voltage across capacitor make vibrate thus noises. Forcing is challenging because (1) frequency responses...

10.1145/3460120.3485389 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Abstract The goal of the ShanghaiGrid is to provide information services people. It aims construct a metropolitan‐area service infrastructure and establish an open standard for widespread upper‐layer applications from both communities government. Information Service Grid Toolkit typical application called Traffic are discussed in detail. Copyright © 2005 John Wiley & Sons, Ltd.

10.1002/cpe.1020 article EN Concurrency and Computation Practice and Experience 2005-10-20

Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise many threats, like piracy IC intellectual property or insertion hardware Trojans, i.e., malicious circuit modifications.

10.1145/3569052.3571878 article EN 2023-03-22

Ransomware is a kind of computer malware that has spread widely in recent years, such as DarkSide, which around the world recently. It's reported DarkSide extorted ${\$}$ 90 million nine months. It extorts ransom from users by encrypting user files and other methods, causing huge economic losses to users, including commercial organizations individuals. Existing ransomware detection methods include hostbased network-based methods. However, these are either hard deploy or have possibility be...

10.1109/icpads56603.2022.00061 article EN 2023-01-01

Sparse deep neural networks (DNNs) leverage sparse representations to achieve faster inference and lower memory footprint. However, deploying DNNs comes with challenges, such as irregular access patterns, workload imbalance, etc. To address these IEEE HPEC has organized the DNN Graph Challenge (SDGC), seeking new methods from high-performance computing community. For many years, SDGC yielded innovative works on accelerating inference. none of them have identified redundant global that...

10.1109/hpec58863.2023.10363578 article EN 2023-09-25

Recent studies have exposed that voice assistants can be manipulated by various commands without being noticed, however, existing attacks require a nearby speaker to play the attack commands. In this paper, we demonstrate even speaker, use capacitors inside electronic devices produce malicious commands, i.e., convert into speakers and call it <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CapSpeaker</monospace> . The underlying principle...

10.1109/tdsc.2023.3326184 article EN IEEE Transactions on Dependable and Secure Computing 2023-10-20

The nearest goal of ShanghaiGrid is going to connect all supercomputers in this metropolis together form a sharing environment for massive storage and grid computing. first stage projects comprise four sub-projects, including: research on environment, protocols standards information infrastructure; development system software establishment major intra-grid nodes; peer-to-peer based virtual platform; the application traffic-jam control guidance. This paper introduces background ShanghaiGrid,...

10.1504/ijguc.2005.007057 article EN International Journal of Grid and Utility Computing 2005-01-01

Reinforcement learning (RL) is pivotal in empowering Unmanned Aerial Vehicles (UAVs) to navigate and make decisions efficiently intelligently within complex dynamic surroundings. Despite its significance, RL hampered by inherent limitations such as low sample efficiency, restricted generalization capabilities, a heavy reliance on the intricacies of reward function design. These challenges often render single-method approaches inadequate, particularly context UAV operations where high costs...

10.3390/fi16030105 article EN cc-by Future Internet 2024-03-20

Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise many security threats, like piracy IC intellectual property or insertion hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically protect the physical layouts against post-design Trojans. Toward that end, propose TroLLoc, a novel scheme for closure employs, first time, logic...

10.48550/arxiv.2405.05590 preprint EN arXiv (Cornell University) 2024-05-09

The goal of the ShanghaiGrid is to provide information services people. It aims construct a metropolitan-area service infrastructure and establish an open standard for widespread upper-layer applications from both communities government. This paper introduces Information Service Grid Toolkit in detail.

10.1109/scc.2005.91 article EN 2005-01-01

Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise many threats, like piracy IC intellectual property or insertion hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts against post-design Trojans. Toward that end, propose a multiplexer-based logic-locking scheme is (i) devised for layout-level...

10.48550/arxiv.2211.07997 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...