Zhuotao Lian

ORCID: 0000-0003-2938-6368
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Mobile Crowdsensing and Crowdsourcing
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Wireless Communication Security Techniques
  • Advanced Malware Detection Techniques
  • Wireless Body Area Networks
  • IoT and Edge/Fog Computing
  • Stochastic Gradient Optimization Techniques
  • Traffic Prediction and Management Techniques
  • Indoor and Outdoor Localization Technologies
  • Caching and Content Delivery
  • Chaos-based Image/Signal Encryption
  • Advanced Neural Network Applications
  • Human Mobility and Location-Based Analysis
  • Smart Systems and Machine Learning
  • Software-Defined Networks and 5G
  • Privacy, Security, and Data Protection
  • AI in cancer detection
  • Biometric Identification and Security
  • Advanced Steganography and Watermarking Techniques
  • Age of Information Optimization
  • Artificial Intelligence in Healthcare and Education

Kyushu University
2024

University of Aizu
2021-2023

The Internet of Medical Things (IoMT) has a bright future with the development smart mobile devices. Information technology is also leading changes in healthcare industry. IoMT devices can detect patient signs and provide treatment guidance even instant diagnoses through technologies, such as artificial intelligence (AI) wireless communication. However, conventional centralized machine learning approaches are often difficult to apply within because difficulty large-scale collection data...

10.1109/tcss.2022.3216802 article EN IEEE Transactions on Computational Social Systems 2022-11-21

Although AI-empowered schemes bring some sound solutions to stimulate more reasonable energy distribution between charging stations (CSs) and CS providers, frequent data sharing them is possible incur many security privacy breaches. To solve these problems, federated learning (FL) an ideal solution that only requires CSs upload local models instead of detailed data. the CSs' electricity consumption need not be exposed server directly, FL-based still have been excavated several threats such...

10.1109/mce.2021.3116917 article EN IEEE Consumer Electronics Magazine 2021-09-30

The rapid development of Internet Things (IoT) stimulates the innovation for health-related devices such as remote patient monitoring, connected inhalers and ingestible sensors. Simultaneously, with aid numerous equipments, a great number collected data can be used disease prediction or diagnosis model establishment. However, potential leak will also bring privacy security issues in interaction period. To deal these existing issues, we propose decentralized, efficient, privacy-enhanced...

10.1109/tnse.2022.3175945 article EN IEEE Transactions on Network Science and Engineering 2022-05-20

The rapid growth of artificial intelligence (AI), blockchain technology, and edge computing services have enabled the Internet Medical Things (IoMT) to provide various healthcare patients, including neural network-based disease diagnosis, heart rate monitoring, fall detection. Generally, end devices should transmit collected patient data a centralized server for further model training, but at same time, patient's privacy may be risk. In addition, due diversity conditions, one-size-fits-all...

10.1109/tsusc.2023.3279111 article EN IEEE Transactions on Sustainable Computing 2023-05-23

Federated learning can collaboratively train a global model without gathering clients' private data. Many works focus on reducing communication cost by designing kinds of client selection method or averaging algorithm. But they all consider whether the will participant not, and training time could not be reduced as data size update for each is changed. We proposed COFEL, novel federated system which both reduce layer-based parameter enhance privacy protection applying local differential...

10.1109/icc42927.2021.9500632 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

Abstract Central management of electronic medical systems faces a major challenge because it requires trust in single entity that cannot effectively protect files from unauthorized access or attacks. This makes difficult to provide some services central systems, such as file search and verification, although they are needed. gap motivated us develop system based on blockchain has several characteristics: decentralization, security, anonymity, immutability, tamper-proof. The proposed provides...

10.1038/s41598-021-04124-8 article EN cc-by Scientific Reports 2022-01-07

In recent years, federated learning has attracted more and attention as it could collaboratively train a global model without gathering the users' raw data. It brought many challenges. this paper, we proposed layer-based system with privacy preservation. We successfully reduced communication cost by selecting several layers of to upload for averaging enhanced protection applying local differential privacy. evaluated our in non independently identically distributed scenario on three datasets....

10.1587/transinf.2021bcp0006 article EN IEICE Transactions on Information and Systems 2022-01-31

With the improvement of computing power and development network technology, Internet Things (IoT) devices are widely used in many industries. But it also faces various security threats. Anomaly detection is a commonly method, but traditional methods face shortcomings such as low accuracy. Therefore, this paper, we introduce decentralized federated learning method for anomaly detection, using neural networks to improve accuracy take advantage characteristics protect local data security. The...

10.1145/3488932.3527285 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022-05-24

In the era of Internet Things (IoT) and AI-driven smart environments, human behavior recognition has emerged as a pivotal technology underpinning broad spectrum intelligent applications. However, achieving high accuracy while preserving user privacy remains critical challenge. To tackle this problem, paper introduces novel privacy-preserving method for WiFi-based recognition. It employs three-dimensional convolutional neural networks(3D-CNNs) enhanced with an attention-enabled autoencoder...

10.58346/jowua.2025.i1.006 article EN Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications 2025-03-31

Traffic sign recognition (TSR) is vital for vehicle safety and navigation, especially in the era of autonomous cars. Internet Vehicles (IoV) provide a promising infrastructure vehicular networks due to their agility interoperability. However, privacy concerns network restrictions hinder collection massive data from distributed automotive sensors IoV. To address these challenges, this article proposes application federated learning (FL) model sparsification optimize traffic vehicles. FL...

10.1109/jiot.2023.3312348 article EN IEEE Internet of Things Journal 2023-09-06

Abstract Federated generative adversarial networks are designed to collaborate across the communication and privacy-constrained edge servers participating in training. However, Internet of Things scenario, local updates uploaded by can lead risk privacy breaches. Gradient-sanitized-based approaches transmit sanitized sensitive data with strict guarantees, but gradient clipping perturbation severely degrade convergence performance. In this paper, our proposed algorithm enhances terminated raw...

10.1093/comjnl/bxac060 article EN The Computer Journal 2022-04-14

Device-free localization technology aims to find a target by analyzing the signal strength difference between transmitter and receiver deployed in area advance. Up now, device-free has been applied wide range of applications scenarios, such as intrusion detection, environment modeling, activity recognition. However, some sensors remain at potential risk that values have tampered, or even devices are physically damaged, which leads inaccurate location results whole system crash. To solve...

10.1155/2022/2323293 article EN cc-by Mobile Information Systems 2022-06-24

The Internet of Things (IoT) has evolved into a global platform dramatically facilitating human life through intelligent services. It is straightforward for people to access smart devices IoT. However, the easy accessibility IoT also led unprecedented security challenges To ensure basic structure IoT, we need establish barrier that can filter malicious and achieve integration intrusion detection systems (IDS) with gateways. This paper establishes threat models DoS, Replay, MITM, Loophole...

10.1109/jiot.2023.3289206 article EN IEEE Internet of Things Journal 2023-07-07

For data isolated islands and privacy issues, federated learning has been extensively invoking much interest since it allows clients to collaborate on training a global model using their local without sharing any with third party. However, the existing frameworks always need sophisticated condition configurations (e.g., driver configuration of standalone graphics card like NVIDIA, compile environment) that bring inconvenience for large-scale development deployment. To facilitate deployment...

10.1109/icc45855.2022.9838421 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

The development and popularity of social networks have made information dissemination unprecedentedly convenient speedy. However, the spread fake news can often cause serious harm to society individuals. Therefore, machine learning-based detection methods become increasingly important. existing work needs collect sufficient user-side data for training, which also boosts privacy leakage risk users. this article proposes an intelligent system based on federated learning (FL) called FIND, train...

10.1109/tcss.2023.3304649 article EN IEEE Transactions on Computational Social Systems 2023-08-21
Coming Soon ...