Kai Zhang

ORCID: 0000-0003-2079-6133
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Privacy, Security, and Data Protection
  • Cryptography and Data Security
  • Imbalanced Data Classification Techniques
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Natural Language Processing Techniques
  • Image Retrieval and Classification Techniques
  • Health disparities and outcomes
  • IoT and Edge/Fog Computing
  • Human Pose and Action Recognition
  • Computational Drug Discovery Methods
  • Anomaly Detection Techniques and Applications
  • Ethics in Clinical Research
  • Multimodal Machine Learning Applications
  • Advanced Computational Techniques and Applications
  • Crime, Illicit Activities, and Governance
  • Advanced Neural Network Applications
  • Adversarial Robustness in Machine Learning
  • Gait Recognition and Analysis
  • Vehicle License Plate Recognition
  • Artificial Intelligence in Healthcare and Education
  • Advanced Image and Video Retrieval Techniques
  • Biomedical Text Mining and Ontologies

Swinburne University of Technology
2021-2025

Xiamen University of Technology
2024

The University of Texas Health Science Center at Houston
2024

Lehigh University
2022

Wuhan University of Science and Technology
2019

NARI Group (China)
2017

Blockchain has gradually attracted widespread attention from the research community of IoT, due to its decentralization, consistency, and other attributes. It builds a secure robust system by generating backup locally for each participant node collectively maintain network. However, this feature brings some privacy concerns since all nodes can access chain data, users’ sensitive information under risk leakage. The local differential (LDP) mechanism be promising way address issue as it...

10.1109/jiot.2022.3145845 article EN IEEE Internet of Things Journal 2022-01-24

Notary cross-chain transaction technologies have obtained broad affirmation from industry and academia as they can avoid data islands enhance chain interoperability. However, the increased privacy concern in sharing makes participants hesitate to upload sensitive information without trust foundation of external network. To address this issue, paper proposes a differential private notary mechanism (DPNM) preserve blockchain interoperations. It establishes fully trusted organization conduct...

10.1109/tifs.2025.3527357 article EN IEEE Transactions on Information Forensics and Security 2025-01-01

The post-processed Differential Privacy (DP) framework has been routinely adopted to preserve privacy while maintaining important invariant characteristics of datasets in data-release applications such as census data. Typical include non-negative counts and total population. Subspace DP proposed population guaranteeing for sub-populations. Non-negativity post-processing identified inherently incur fairness issues. In this work, we study unfairness ( <italic...

10.1109/tifs.2025.3528222 article EN IEEE Transactions on Information Forensics and Security 2025-01-01

Federated learning (FL) can be essential in knowledge representation, reasoning, and data mining applications over multi-source graphs (KGs). A recent study FedE first proposes an FL framework that shares entity embeddings of KGs across all clients. However, embedding sharing from would incur a severe privacy leakage. Specifically, the known used to infer whether specific relation between two entities exists private client. In this paper, we introduce novel attack method aims recover...

10.18653/v1/2022.findings-emnlp.43 article EN cc-by 2022-01-01

Applying sparsity- and overfitting-aware eXtreme Gradient Boosting (XGBoost) for classification in federated learning allows many participants to train a series of trees collaboratively. Since various local multiclass distributions global aggregation diversity, model performance plummets as convergence slowly accuracy decreases. Worse still, neither the nor server can detect this problem make timely adjustments. In paper, we provide new local-global class imbalance inconsistency...

10.1109/tai.2023.3254519 article EN IEEE Transactions on Artificial Intelligence 2023-03-08

The cross-modal molecule retrieval (Text2Mol) task aims to bridge the semantic gap between molecules and natural language descriptions. A solution this nontrivial problem relies on a graph convolutional network (GCN) attention with contrastive learning for reasonable results. However, there exist following issues. First, mechanism is only in favor of text representations cannot provide helpful information representations. Second, GCN-based encoder ignores edge features importance various...

10.1109/tai.2023.3254518 article EN IEEE Transactions on Artificial Intelligence 2023-03-08

In recent years, money laundering has become much easier to be achieved but more challenging detected than before, which enormous adversary effects on finance, military, and other related fields. the real-time scenario, every case a unique structure in terms of transactions. It is not sufficient detect suspicious behavior by just following probability theory, where usually thresholds are given experts. Since crime prevalent sophisticated nowadays, it will increase complexity detection if...

10.1109/mis.2021.3057590 article EN IEEE Intelligent Systems 2021-01-01

A number of solutions have been proposed to tackle the user privacy-preserving issue. Most existing schemes, however, focus on methodology and techniques from perspective data processing. In this paper, we propose a lightweight scheme for identity applied cryptography. The basic idea is break association relationships between User his behaviors ensure that can access or services as usual while real will not be revealed. To end, an interactive zero-knowledge proof protocol executed CSP User....

10.1109/smc.2019.8913866 article EN 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2019-10-01

Federated learning is a promising paradigm that allows multiple clients to collaboratively train model without sharing the local data. However, presence of heterogeneous devices in federated learning, such as mobile phones and IoT with varying memory capabilities, would limit scale hence performance could be trained. The mainstream approaches address limitations focus on width-slimming techniques, where different subnetworks reduced widths locally then server aggregates subnetworks. global...

10.48550/arxiv.2303.04887 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Credit card defaults cost the economy tens of billions dollars every year. However, financial institutions rarely collaborate to build more comprehensive models due legal regulations and competition. Federated XGBoost is an emerging paradigm that enables several companies a classification model cooperatively without transferring local data others. The conventional suffers from inverse inference according splitting nodes selection class imbalance problem severely. Utilising characteristic...

10.1504/ijbic.2022.126793 article EN International Journal of Bio-Inspired Computation 2022-01-01

This paper introduces FedSecurity, an end-to-end benchmark designed to simulate adversarial attacks and corresponding defense mechanisms in Federated Learning (FL). FedSecurity comprises two pivotal components: FedAttacker, which facilitates the simulation of a variety during FL training, FedDefender, implements defensive counteract these attacks. As open-source library, enhances its usability compared from-scratch implementations that focus on specific attack/defense scenarios based...

10.48550/arxiv.2306.04959 preprint EN cc-by-nc-nd arXiv (Cornell University) 2023-01-01

In the platform of supervisory control system based on SOA, message bus provides facilities data exchange between different processes in computers as an important middleware. With continuous expansion application scope and scale, quantity via increases rapidly. It is urgent to improve performance provide better quality service. Furthermore, new generation carries out partitions according function or region into cooperative subsystems for flexibility. Message needs be redesigned meet...

10.1109/ei2.2017.8245405 article EN 2017-11-01

Federated learning (FL) can be essential in knowledge representation, reasoning, and data mining applications over multi-source graphs (KGs). A recent study FedE first proposes an FL framework that shares entity embeddings of KGs across all clients. However, embedding sharing from would incur a severe privacy leakage. Specifically, the known used to infer whether specific relation between two entities exists private client. In this paper, we introduce novel attack method aims recover...

10.48550/arxiv.2203.09553 preprint EN cc-by arXiv (Cornell University) 2022-01-01

We consider a federated representation learning framework, where with the assistance of central server, group $N$ distributed clients train collaboratively over their private data, for representations (or embeddings) set entities (e.g., users in social network). Under this key step aggregating local embeddings trained privately at clients, we develop secure embedding aggregation protocol named \scheme, which leverages all potential opportunities among while providing privacy guarantees and...

10.48550/arxiv.2206.09097 preprint EN other-oa arXiv (Cornell University) 2022-01-01

As a very popular framework, federated learning can help heterogeneous participants cooperate training global models without the local data being exposed. It not only takes advantage of massive raw data, but also fundamentally protects privacy participants. An unavoidable challenge is that class imbalance brought by many will seriously affect model performance and even damage convergence. Introducing Focal loss to dynamically adjust weight samples in process good choice for relieving this...

10.1109/ispa-bdcloud-socialcom-sustaincom57177.2022.00072 article EN 2022-12-01

Abstract To resolve the communication overhead problem of anonymous users, we propose a location privacy protection method based on cache technology. In particular, first place center edge server nodes to reduce interaction between servers and users. this way, risk leaks can be reduced. Furthermore, improve caching hit rate, prediction system Markov chain is designed protect trajectory mobile Simulations show that algorithm users transmission delay.

10.1088/1742-6596/2138/1/012010 article EN Journal of Physics Conference Series 2021-12-01
Coming Soon ...