Kun He

ORCID: 0000-0003-3472-419X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Adversarial Robustness in Machine Learning
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Anomaly Detection Techniques and Applications
  • Advanced Steganography and Watermarking Techniques
  • Advanced Neural Network Applications
  • Chaos-based Image/Signal Encryption
  • Dam Engineering and Safety
  • Rice Cultivation and Yield Improvement
  • Advanced Graph Neural Networks
  • Mobile Ad Hoc Networks
  • GABA and Rice Research
  • Genetic diversity and population structure
  • Spam and Phishing Detection
  • Digital and Cyber Forensics
  • Molecular Biology Techniques and Applications
  • Forensic and Genetic Research
  • Advanced Statistical Methods and Models
  • Genomics and Phylogenetic Studies
  • Advanced Authentication Protocols Security
  • Topic Modeling

Huazhong University of Science and Technology
2012-2025

Wuhan University
2016-2025

Hebei Medical University
2025

Heilongjiang Vocational Institute of Ecological Engineering
2024

National Engineering Research Center of Electromagnetic Radiation Control Materials
2024

Sichuan University
2005-2024

State Key Laboratory of Hydraulics and Mountain River Engineering
2019-2024

Nanjing Tech University
2024

Mahasarakham University
2024

META Health
2023

Reconstruction of gene regulatory networks (GRNs), which explicitly represent the causality developmental or process, is utmost interest and has become a challenging computational problem for understanding complex mechanisms in cellular systems. However, all existing methods inferring GRNs from expression profiles have their strengths weaknesses. In particular, many properties GRNs, such as topology sparseness non-linear dependence, are generally regulation mechanism but seldom taken into...

10.1093/bioinformatics/btr626 article EN Bioinformatics 2011-11-15

Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts recent years, causing massive financial losses. Rule-based detection approaches rely on pre-defined rules with limited capabilities and domain knowledge dependency. Additionally, using static information like opcodes transactions for machine learning models fails to effectively characterize the contracts, resulting poor reliability interpretability.

10.1145/3597503.3623318 article EN 2024-02-06

In recent years, real-world attacks against PKI take place frequently. For example, malicious domains' certificates issued by compromised CAs are widespread, and revoked still trusted clients. spite of a lot research to improve the security SSL/TLS connections, there some problems unsolved. On one hand, although log-based schemes provided certificate audit service quickly detect CAs' misbehavior, data consistency log servers ignored. other checking is neglected due incomplete, insecure...

10.1109/infocom.2018.8486344 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Dynamic Searchable Symmetric Encryption (DSSE) enables users to search on the encrypted database stored a semi-trusted server while keeping and update information under acceptable leakage. However, most existing DSSE schemes are not efficient enough in practice due complex structures cryptographic primitives. Moreover, storage cost client side grows linearly with number of keywords database, which induces unaffordable when size keyword set is large. In this article, we focus secure dynamic...

10.1109/tifs.2020.3033412 article EN IEEE Transactions on Information Forensics and Security 2020-10-23

Transfer learning, successful in knowledge translation across related tasks, faces a substantial privacy threat from membership inference attacks (MIAs). These attacks, despite posing significant risk to ML model's training data, remain limited-explored transfer learning. The interaction between teacher and student models learning has not been thoroughly explored MIAs, potentially resulting an under-examined aspect of vulnerabilities within In this paper, we propose new MIA vector against...

10.48550/arxiv.2501.11577 preprint EN arXiv (Cornell University) 2025-01-20

Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables user to check the integrity outsourced files and efficiently update in cloud server. Although researchers have proposed many dynamic PoS schemes singleuser environments, problem multi-user environments has not been investigated sufficiently. A practical storage system needs secure client-side cross-user deduplication technique, which allows skip uploading process obtain ownership immediately, when other owners...

10.1109/tc.2016.2560812 article EN publisher-specific-oa IEEE Transactions on Computers 2016-04-29

Location-based service (LBS) has gained increasing popularity recently, but protecting users' privacy in LBS remains challenging. Depending on whether a trusted third party (TTP) is used, existing solutions can be classified into: TTP-based and TTP-free. The former relies TTP for user protection, which creates single-point-failure thus impractical reality. latter does not require any TTP, usually introduces redundant point-of-interest (POI) records query result incurs significant computation...

10.1109/tmc.2018.2811481 article EN IEEE Transactions on Mobile Computing 2018-03-01

As an important security property of cloud storage, data integrity has not been sufficiently studied under the multi-writer model, where a group users work on shared files collaboratively and any member can update by modification, insertion, deletion operations. Existing works such model would bring large storage cost to third-party verifiers. Furthermore, best our knowledge, none existing for supports fully dynamic operations, which implies that cannot freely perform In this paper, we...

10.1109/tdsc.2019.2925800 article EN IEEE Transactions on Dependable and Secure Computing 2019-07-07

It is well known that each Public Key Infrastructure (PKI) system forms a closed security domain and only recognizes certificates in its own (such as medical systems, financial 5G networks). When users need to access services other domains, their identities often cannot be recognized or PKI systems require extremely complex operations authenticate the users' identities. This cross-domain authentication problem. The distributed consensus feature of blockchain provides technical approach solve...

10.1109/tdsc.2021.3092375 article EN IEEE Transactions on Dependable and Secure Computing 2021-06-28

Blockchain is a technology with decentralization and immutability features has been employed for auditing by many applications. However, sometimes limits the application of blockchain technology. For example, vulnerable smart contracts on cannot be redacted due to immutability. The existing redactable solutions either have low efficiency or violate feature. Moreover, those lack mechanisms tracing redaction history checking block consistency. In this paper, we present an efficient...

10.1109/tifs.2022.3192716 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts recent years, causing massive financial losses. Existing detection methods primarily focus on rule-based approaches and machine learning techniques that utilize static information as features. However, these significant limitations. Rule-based rely pre-defined rules with limited capabilities domain knowledge dependency. Using like opcodes for fails to effectively characterize contracts, resulting poor reliability...

10.1145/3707458 article EN ACM Transactions on Software Engineering and Methodology 2024-12-10

Unmanned aerial vehicles (UAVs) have emerged as a promising technology to provide low-latency mobile edge computing (MEC) services. To fully utilize the potential of UAV-assisted MEC in practice, both technical and economic challenges need be addressed: how optimize UAV trajectory for online task offloading incentivize participation UAVs without compromising privacy user equipment (UE). In this work, we consider unique features UAVs, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tnet.2024.3364141 article EN IEEE/ACM Transactions on Networking 2024-02-20

Wireless mesh networks are widely applied in many fields such as industrial controlling, environmental monitoring, and military operations. Network coding is promising technology that can improve the performance of wireless networks. In particular, network suitable for fixed backbone usually unlimited energy. However, collision a severe problem affecting performance. To avoid this, routing should be effectively designed with an optimum combination opportunity validity. this paper, we propose...

10.1109/tpds.2013.303 article EN IEEE Transactions on Parallel and Distributed Systems 2014-01-31

Secure access is one of the fundamental problems in wireless mobile networks. Digital signature a widely used technique to protect messages' authenticity and nodes' identities. From practical perspective, ensure quality services networks, ideally process verification should introduce minimum delay. Batch cryptography powerful tool reduce time. However, most existing works focus on designing batch algorithms for networks without sufficiently considering impact invalid signatures, which can...

10.1109/tmc.2016.2604820 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2016-08-31

Inference outsourcing enables model owners to deploy their machine learning models on cloud servers serve users. In this paradigm, the privacy of and users should be considered. Existing solutions focus Convolutional Neural Networks (CNNs) but efficiency is much lower than GALA, which a solution that only protects user privacy. Furthermore, these adopt approximations reduce accuracy thus require retrain models. paper, we present an efficient CNN inference both Specifically, design secure...

10.1109/tifs.2023.3287072 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Node tokenized graph Transformers (GTs) have shown promising performance in node classification. The generation of token sequences is the key module existing GTs which transforms input into sequences, facilitating representation learning via Transformer. In this paper, we observe that generations only focus on first-order neighbors constructed similarity graphs, leads to limited usage nodes generate diverse further restricting potential for To end, propose a new method termed SwapGT. SwapGT...

10.48550/arxiv.2502.08101 preprint EN arXiv (Cornell University) 2025-02-11
Coming Soon ...