Jianping Cai

ORCID: 0000-0003-1575-8239
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Stochastic Gradient Optimization Techniques
  • Adversarial Robustness in Machine Learning
  • Privacy, Security, and Data Protection
  • Neural Networks Stability and Synchronization
  • Higher Education and Teaching Methods
  • Nonlinear Dynamics and Pattern Formation
  • Mobile Crowdsensing and Crowdsourcing
  • Software Reliability and Analysis Research
  • Advanced Decision-Making Techniques
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Advanced Computational Techniques and Applications
  • Parallel Computing and Optimization Techniques
  • Human Mobility and Location-Based Analysis
  • Recommender Systems and Techniques
  • Service-Oriented Architecture and Web Services
  • Chaos control and synchronization
  • Educational Technology and Assessment
  • Education and Work Dynamics
  • Image and Video Stabilization
  • Ideological and Political Education
  • Logic, programming, and type systems
  • Software System Performance and Reliability

Fuzhou University
2020-2024

City University of Macau
2024

Xidian University
2023

Zhejiang University
2010-2018

Beijing University of Technology
2009-2013

Nanchang University
2011

Zhangzhou Normal University
2010

Kaifeng University
2006

Federated learning is a popular framework designed to perform the distributed machine while protecting client privacy. However, heterogeneous data distribution in real-world environments makes it difficult converge when performing model training. In this article, we propose federated gradient scheduling (FedGS), an improved historical sampling utilization method for optimizers that utilize gradients alleviate instability problem of information due non-IID. FedGS consists two main steps...

10.1109/jiot.2022.3203233 article EN IEEE Internet of Things Journal 2022-08-31

Centralized learning now faces data mapping and security constraints that make it difficult to carry out. Federated with a distributed architecture has changed this situation. By restricting the training process participants' local, federated addresses model needs of multiple sources while better protecting privacy. However, in real-world application scenarios, need achieve fairness addition privacy protection. In practice, could happen some participants specific motives may short join...

10.1109/jiot.2023.3238038 article EN IEEE Internet of Things Journal 2023-01-19

Federated learning (FL) provides a framework without participants sharing local raw data, but individual privacy is still at risk of disclosure through attacking the trained models. Due to strong guarantee, differential (DP) widely applied FL avoid leakage. Traditional private adds noise directly gradients. The continuous accumulated on parameter models severely impairs effectiveness. To solve this problem, we introduce idea differentially data release (DPCR) into and propose an based DPCR...

10.1109/tdsc.2024.3364060 article EN IEEE Transactions on Dependable and Secure Computing 2024-02-08

This paper proposes a maze exploring algorithm named "Partition-central Algorithm", which is used to find the shortest path in micromouse competition maze. A standard 16*16 units divided into 12 partitions this algorithm. Depending on absolute direction of and locations each partition, rules alter when walks optimize process. simulation program developed verify The test result shows that Partition-central has higher average efficiency compared with other algorithms.

10.1109/cit.2010.337 article EN 2010-06-01

Global synchronization in adaptive coupling networks is studied this paper. A new simple controller proposed based on a concept of asymptotically stable led by partial state variables. Under the update law, network can achieve global without calculating eigenvalues outer matrix. The law only dependent variables individual oscillators. Numerical simulations are given to show effectiveness method, which unified chaotic system chosen as nodes with different topologies.

10.1155/2010/826721 article EN cc-by Mathematical Problems in Engineering 2010-01-01

Federated learning (FL) is a novel machine framework in which models are built jointly by multiple parties. We investigate the privacy preservation of XGBoost, gradient boosting decision tree (GBDT) model, context FL. While recent work relies on cryptographic schemes to preserve model gradients, these methods computationally expensive. In this paper, we propose an adaptive privacy-preserving algorithm based differential (DP), more efficient. Our perturbs individual data computing mean per...

10.1145/3590003.3590051 article EN 2023-03-17

Integrating data from multiple parties to achieve cross-institutional machine learning is an important trend in Industry 4.0 era. However, the privacy risks sharing pose a significant challenge integration. To integrate without and meet large-scale samples’ modeling needs, we propose two vertical federation algorithms for ridge regression via least-squares solution two-party multi-party scenarios, respectively. Compared with state-of-the-art algorithms, our only need one round of calculation...

10.1109/tetc.2022.3215986 article EN IEEE Transactions on Emerging Topics in Computing 2022-11-03

Currently, financial institutions utilize personal sensitive information extensively in machine learning. It results significant privacy risks to customers. As an essential standard of privacy, differential is often applied learning recent years. To establish a prediction model credit card default under the premise protecting we consider problems customer data contribution difference and sample distribution imbalance, propose weighted SVM algorithm privacy. Through theoretical analysis, have...

10.1145/3411501.3419431 article EN 2020-11-04

Software license is the most well-used technology in copyright protection of commercial software and shareware, as well development management free open source software. There are several different types that allow controlled access services. The two popular fixed license, which gives rights for an identified workstation, floating restricts number simultaneous users to a certain bound. In this paper, we propose system, called MFFLS, efficiently implements

10.1109/icise.2009.889 article EN 2009-01-01

10.1109/icme57554.2024.10687918 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2024-07-15

Hierarchical trees are widely used in differentially private statistical releases. Existing fast specialized algorithms guarantee hierarchical consistency but not non-negativity, which may incur meaningless negative values due to randomness. Quadratic programming can achieve optimally non-negative consistent releases, traditional numerical-based methods face significant performance challenges when handling large-scale trees. In this article, we construct the element set of Lagrange...

10.1109/tdsc.2023.3253520 article EN IEEE Transactions on Dependable and Secure Computing 2023-03-07

Object detection has achieved significant progress in attaining high-quality performance without leaking private messages. However, traditional approaches cannot defend the poisoning attacks. Poisoning attacks can make predictive model unusable, which quickly causes recognition errors or even traffic accidents. In this paper, we propose a privacy-preserving object with (PR-PPOD) framework via distributed training help of CNN, ResNet18, and classical SSD network. Specifically, design...

10.1109/tnse.2022.3227119 article EN IEEE Transactions on Network Science and Engineering 2022-12-07

Being the core course of computer science, teaching "the Principle Computer Organization", concerning its training purpose and objective, should focus on nurturing students' ability discovering, analyzing solving problems with an overall perspective course, so as to lay a solid foundation for systematic wholeness improve professional well. And concept course-group is also proposed in paper, which means joint construction correlated courses under frame science syllabus unified planning,...

10.1109/trustcom.2011.180 article EN 2011-11-01

This paper introduces several new guiding ideologies in "the Principle of Computer Organization" course reform, based on the purpose application-oriented personnel training, namely teaching according to students aptitude, focusing students' capacity-building, emphasizing both theories and experiments. In practice curriculum teaching, we focus training enhancing self-learning ability through group collaborative learning examination reform. Meanwhile, try motivate study with process management...

10.1109/cit.2010.378 article EN 2010-06-01

When using differential privacy to publish high‐dimensional data, the huge dimensionality leads greater noise. Especially for binary it is easy be covered by excessive Most existing methods cannot address real data problems appropriately because they suffer from high time complexity. Therefore, in response above, we propose adaptive Bayesian network algorithm PrivABN data. This uses a new greedy accelerate construction of networks, which reduces complexity GreedyBayes O ( n m 4 ). In...

10.1155/2021/8693978 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01
Coming Soon ...