Chao Li

ORCID: 0000-0003-3114-2776
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Coding theory and cryptography
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Energy Efficient Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Internet Traffic Analysis and Secure E-voting
  • graph theory and CDMA systems
  • Advanced Computational Techniques and Applications
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Adversarial Robustness in Machine Learning
  • Peer-to-Peer Network Technologies
  • Cloud Computing and Resource Management
  • Advanced Graph Neural Networks
  • Cloud Data Security Solutions
  • AI in cancer detection
  • Digital and Cyber Forensics
  • Advanced MIMO Systems Optimization
  • Advanced Measurement and Detection Methods
  • Complex Network Analysis Techniques
  • Cooperative Communication and Network Coding
  • Neural Networks and Applications

Chinese Academy of Sciences
2017-2025

Institute of Genetics and Developmental Biology
2025

Wuhan University
2010-2024

Beijing Jiaotong University
2019-2024

Guangzhou University
2019-2024

Zhejiang Lab
2023

China Electronic Information Industry Development
2023

Inspur (China)
2023

Huawei Technologies (China)
2022-2023

Tsinghua University
2011-2023

Automatic emotion recognition from speech, which is an important and challenging task in the field of affective computing, heavily relies on effectiveness speech features for classification.Previous approaches to have mostly focused extraction carefully hand-crafted features.How model spatio-temporal dynamics effectively still under active investigation.In this paper, we propose a method tackle problem emotional relevant feature by leveraging Attention-based Bidirectional Long Short-Term...

10.21437/interspeech.2018-1477 article EN Interspeech 2022 2018-08-28

While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, lack security practice raises risk privacy-sensitive user data leakage. Securing transmission among IoT devices is therefore a critical capability environments such as Intelligent Connected Vehicles, Smart Home, City and so forth. However, cryptographic communication scheme challenged by limited resource low-cost devices, even negligible extra CPU usage battery-powered sensors would result in...

10.1109/access.2020.2978525 article EN cc-by IEEE Access 2020-01-01

With the growth of participating clients, centralized parameter server (PS) will seriously limit scale and efficiency Federated Learning (FL). A straightforward approach to up FL system is construct a Parallel (PFL) with multiple PSes. However, it unclear whether PFL can really achieve faster convergence rate or not. Even if answer yes, non-trivial design highly efficient average algorithm for system. In this paper, we propose completely parallelizable called P-FedAvg under architecture....

10.1109/infocom42981.2021.9488877 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2021-05-10

Using X-ray diffraction combined with Rietveld method and chemical analysis hydrofluoric acid (HF) solution, the content composition of glass phase a class F fly ash are quantified, initial Si/Al ratio is calculated as well. The dissolution Si4+ Al3+ in different solution (HF, NaOH, NaF) various concentrations reaction time NaOH was studied. dissolved compared value, following conclusions drawn: (1) only very small part Si Al knowing available Al; (2) influenced by alkali concentration. When...

10.1111/j.1551-2916.2010.04337.x article EN Journal of the American Ceramic Society 2011-02-16

We propose a simple yet effective method to reduce the redundancy of DenseNet by substantially decreasing number stacked modules replacing original bottleneck our SMG module, which is augmented local residual. Furthermore, module equipped with an efficient two-stage pipeline, aims DenseNet-like architectures that need integrate all previous outputs, i.e., squeezing incoming informative but redundant features gradually hierarchical convolutions as hourglass shape and then exciting it...

10.1609/aaai.v34i07.6948 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2020-04-03

Aiming to the vision of 6G, integrated sensing and communication (ISAC), as potential techniques deal with increasing demands native perception ability, has recently attracted a lot attention. In order guide system optimization evaluate novel ISAC techniques, accurate realistic wireless channel model for is essential. This article proposes framework modeling extended based on 3GPP model, which can be used simulation performance analysis 6G techniques. We first overview principles...

10.1109/mcom.001.2200420 article EN IEEE Communications Magazine 2022-11-15

An increasing number of data centers today start to incorporate renewable energy solutions cap their carbon footprint. However, the impact on large-scale center design is still not well understood. In this paper, we model and evaluate driven by intermittent energy. Using real-world source traces, show that power utilization load tuning frequency are two critical metrics for designing sustainable high-performance centers. Our characterization reveals fluctuation together with supply introduce...

10.1145/1993744.1993791 article EN 2011-06-07

With large available continuous bandwidth, millimeter wave (mmWave) bands hold promise as a carrier frequency for fifth generation (5G) wireless communications. Moreover, mmWave also play an important role in radar detections. Based on this observation, we propose communication and detection integrated network architecture railways, not only to increase the capacity of railway systems, but realize train operation environment enhance safety. To overcome aggravated path loss bands, directional...

10.1109/vtcspring.2016.7504133 article EN 2016-05-01

With the rapid development and widespread use of wearable wireless sensors, data aggregation technique becomes one most important research areas. However, sensitive collected by sensor nodes may be leaked at intermediate aggregator nodes. So, privacy preservation is becoming an increasingly issue in security aggregation. In this paper, we propose a privacy-preserving model, which adopts mixed structure. Data integrity verified both cluster head base station. Some adopt slicing technology to...

10.1155/2015/104286 article EN cc-by Journal of Electrical and Computer Engineering 2015-01-01

Federated collaborative filtering (Fed-CF) is a variant of federated learning (FL) models, which can protect user privacy in recommender systems. In Fed-CF, the recommendation model collectively trained across multiple decentralized clients by exchanging gradients only. However, nature Fed-CF makes it vulnerable to shilling attacks, be realized inserting fake ratings target items distort results. Unfortunately, previous detection algorithms cannot work well FL framework, as all original data...

10.1109/srds51746.2020.00026 article EN 2020-09-01

The advent of the big data era has brought unprecedented demands. integration computing resources with network in force enables possibility distributed collaborative training. However, unencrypted training is vulnerable to threats such as gradient inversion attacks and model theft. To address this issue, are usually protected by cryptographic methods. semantic meaninglessness encrypted makes it difficult prevent potential poisoning free-riding attacks. In paper, we propose a fairness...

10.3390/math12050718 article EN cc-by Mathematics 2024-02-28

In this paper, we present WoSense, a device-free and real-time behavior analysis system leveraging only WiFi infrastructures. WoSense aims to remotely recognize various human behaviors like surfing, gaming working around computers, which are considered be an essential part of our daily lives both at work home. The key is exploit the signal distortions on channel data caused by gestures finger hand movements, then identify possible via composite gestures. Therefore, two critical challenges...

10.1109/glocom.2018.8647547 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

Federated learning (FL) is an emerging paradigm through which decentralized devices can collaboratively train a common model. However, serious concern the leakage of privacy from exchanged gradient information between clients and parameter server (PS) in FL. To protect information, adopt differential (DP) to add additional noises distort original gradients before they are uploaded PS. Nevertheless, model accuracy will be significantly impaired by DP noises, making impracticable real systems....

10.1109/jiot.2021.3102030 article EN IEEE Internet of Things Journal 2021-08-03

The probability distribution of probabilistic shaping 64 quadrature amplitude modulation (PS-64QAM) is uneven. traditional M-ary support vector machine (SVM) algorithm incompatible with the data set uneven distribution. In order to solve problem, we propose a novel nonlinear equalizer (NLE) for PS-64QAM based on constellation segmentation (CS) and SVM, called CS SVM NLE. performance NLE has been demonstrated in 120 Gb/s coherent optical communication system. experimental results show that...

10.3390/electronics11050671 article EN Electronics 2022-02-22

With the development of high-efficiency solar cells, issue industrial Si photovoltaic (PV) cells' light-induced degradation (LID) became even more serious. In this paper, a method for quick LID treatments was developed. A high-intensity monochromatic light source used to realize treatment, and 940-nm light-emitting diodes (LEDs) were selected build treatment platform. The photon flux density output from can reach 1.32 × 1023 m−2 s−1. From simulation calculation, photons 1.27× s−1 be utilized...

10.1063/1.4994578 article EN Journal of Renewable and Sustainable Energy 2017-09-01

Recently, Cross-Modal Hamming space Retrieval (CMHR) regains ever-increasing attention, mainly benefiting from the excellent representation capability of deep neural networks. On other hand, vulnerability networks exposes a cross-modal retrieval system to various safety risks (e.g., adversarial attack). However, attacking remains underexplored. In this paper, we propose an effective Adversarial Attack on Deep Retrieval, dubbed AACH, which fools target CMHR model in black-box setting....

10.1109/iccv48922.2021.00222 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01
Coming Soon ...