Wenzhi Chen

ORCID: 0000-0003-1674-4701
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Security and Verification in Computing
  • Software-Defined Networks and 5G
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • 3D Shape Modeling and Analysis
  • Cryptography and Data Security
  • Distributed and Parallel Computing Systems
  • Cloud Data Security Solutions
  • Adversarial Robustness in Machine Learning
  • Advanced Memory and Neural Computing
  • Software System Performance and Reliability
  • Computer Graphics and Visualization Techniques
  • Human Pose and Action Recognition
  • Advanced Computational Techniques and Applications
  • Luminescence Properties of Advanced Materials
  • Generative Adversarial Networks and Image Synthesis
  • Interconnection Networks and Systems
  • Speech and Audio Processing
  • Human Motion and Animation
  • Embedded Systems Design Techniques

Zhejiang University of Science and Technology
2013-2025

Zhejiang University
2016-2025

Chongqing University of Posts and Telecommunications
2025

Durham University
2024

University of Shanghai for Science and Technology
2024

Jilin University
2022

Simon Fraser University
2006-2020

Shanghai Jiao Tong University
2017

Beijing University of Posts and Telecommunications
2009-2016

Xiamen University
2015

Vehicular ad-hoc networks (VANETs) have drawn much attention of researchers. The vehicles in VANETs frequently join and leave the networks, therefore restructure network dynamically automatically. Forwarded messages vehicular are primarily multimedia data, including structured plain text, sound, video, which require access control with efficient privacy preservation. Ciphertext-policy attribute-based encryption (CP-ABE) is adopted to meet requirements. However, solutions based on traditional...

10.1109/tits.2017.2653103 article EN IEEE Transactions on Intelligent Transportation Systems 2017-01-31

In recent years researchers have made noticeable progresses in mesh denoising, that is, recovering high-quality 3D models from meshes corrupted with noise (raw or synthetic). Nevertheless, these state of the art approaches still fall short for robustly handling various noisy models. The main technical challenge robust denoising is to remove while maximally preserving geometric features. particular, this issue becomes more difficult considerable amount noise. paper we present a novel scheme...

10.1109/tvcg.2015.2500222 article EN IEEE Transactions on Visualization and Computer Graphics 2015-11-12

Point set filtering, which aims at reconstructing noise-free point sets from their corresponding noisy inputs, is a fundamental problem in 3D geometry processing. The main challenge of filtering to preserve geometric features the underlying while same time removing noise. State-of-the-art methods still struggle with this issue: some are not designed recover sharp features, and others cannot well especially fine-scale features. In paper, we propose novel approach for robust feature-preserving...

10.1109/tvcg.2017.2725948 article EN IEEE Transactions on Visualization and Computer Graphics 2017-07-11

A large amount of valuable information resides in a decentralized attributed social graph, where each user locally maintains limited view the graph. However, there exists conflicting requirement between publishing an graph and protecting privacy sensitive contained user's local data. In this paper, we aim to collect generate graphs manner while providing differential (LDP) for collected Existing LDP-based synthetic generation methods either fail preserve important properties (such as...

10.1109/tifs.2020.2985524 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

Emerging cloud-native distributed databases rely on local NVMe SSDs to provide high-performance and highavailable data services many cloud applications. However, the database clusters suffer from low utilization of storage because imbalance between CPU capacities within each node. For instance, OceanBase cluster, with hundreds PB capacity, only utilizes around 40% its storage. Although disaggregated (EBS) can enhance by provisioning independently demand, they performance bottlenecks high...

10.1109/hpca57654.2024.00079 article EN 2024-03-02

10.1016/j.cagd.2017.02.011 article EN publisher-specific-oa Computer Aided Geometric Design 2017-03-02

Model merging is a widespread technology in large language models (LLMs) that integrates multiple task-specific LLMs into unified one, enabling the merged model to inherit specialized capabilities of these LLMs. Most are sourced from open-source communities and have not undergone rigorous auditing, potentially imposing risks merging. This paper highlights an overlooked privacy risk: \textit{an unsafe could compromise other involved merging.} Specifically, we propose PhiMM, attack approach...

10.48550/arxiv.2502.11533 preprint EN arXiv (Cornell University) 2025-02-17

Large Language Models (LLMs) pose significant privacy risks, potentially leaking training data due to implicit memorization. Existing attacks primarily focus on membership inference (MIAs) or extraction attacks, but reconstructing specific personally identifiable information (PII) in LLM's remains challenging. In this paper, we propose R.R. (Recollect and Rank), a novel two-step stealing attack that enables attackers reconstruct PII entities from scrubbed where the have been masked. first...

10.48550/arxiv.2502.12658 preprint EN arXiv (Cornell University) 2025-02-18

10.1109/icassp49660.2025.10889984 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Mobile virtualization has emerged fairly recently and is considered a valuable way to mitigate security risks on Android devices. However, major challenges in mobile include runtime, hardware, resource overhead, compatibility. In this paper, we propose lightweight solution named Condroid, which based container technology. Condroid utilizes isolation namespaces feature control cgroups feature. By leveraging them, can host multiple independent virtual machines single kernel support mutilple...

10.1109/tc.2015.2389791 article EN IEEE Transactions on Computers 2015-01-09

Prompt-tuning has emerged as an attractive paradigm for deploying large-scale language models due to its strong downstream task performance and efficient multitask serving ability. Despite wide adoption, we empirically show that prompt-tuning is vulnerable task-agnostic backdoors, which reside in the pretrained can affect arbitrary tasks. The state-of-the-art backdoor detection approaches cannot defend against backdoors since they hardly converge reversing triggers. To address this issue,...

10.14722/ndss.2024.23238 preprint EN 2024-01-01

In recent years, DeepFake technologies have seen widespread adoption in various domains, including entertainment and film production. However, they also been maliciously employed for disseminating false information engaging video fraud. Existing detection methods often experience significant performance degradation when confronted with unknown forgeries or exhibit limitations dealing low-quality images. To address this challenge, we introduce <italic...

10.1109/tdsc.2024.3364679 article EN IEEE Transactions on Dependable and Secure Computing 2024-02-21

Ba5-x(BO3)2(B2O5):xSm3+(0.01≤ x ≤ 0.15) orange-red phosphors were synthesized by conventional solid state reaction method. Its crystal structure, luminescence properties and concentration quenching mechanism investigated. This phosphor can be effectively excited 403 nm near ultraviolet light with the emission peaks located at 563, 600 648 nm, features a satisfactory performance. It is shown that optimal of Sm3+ ions in Ba5(BO3)2(B2O5):Sm3+ 7 mol%. The charge compensated behaviors, where Li+,...

10.1149/2.0121505jss article EN ECS Journal of Solid State Science and Technology 2015-01-01
Coming Soon ...