Meng Li

ORCID: 0000-0003-3553-0813
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Crystallization and Solubility Studies
  • X-ray Diffraction in Crystallography
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Transportation Planning and Optimization
  • Advanced Steganography and Watermarking Techniques
  • Transportation and Mobility Innovations
  • Network Security and Intrusion Detection
  • Traffic Prediction and Management Techniques
  • Traffic control and management
  • Crystallography and molecular interactions
  • Vehicular Ad Hoc Networks (VANETs)
  • Higher Education and Teaching Methods
  • Advanced Battery Technologies Research
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Privacy, Security, and Data Protection
  • Smart Parking Systems Research
  • IoT and Edge/Fog Computing
  • Speech and Audio Processing
  • Chaos-based Image/Signal Encryption
  • Vehicle emissions and performance
  • Sparse and Compressive Sensing Techniques

Hefei University of Technology
2013-2025

University of Jinan
2015-2025

Chongqing Technology and Business University
2020-2025

University of Guelph
2024

Shenzhen University
2024

Chinese Academy of Sciences
2018-2024

Shanxi Electromechanical Design and Research Institute
2024

Taiyuan University of Technology
2020-2024

Beijing University of Civil Engineering and Architecture
2024

South China Normal University
2024

Federated learning enables resource-constrained edge compute devices, such as mobile phones and IoT to learn a shared model for prediction, while keeping the training data local. This decentralized approach train models provides privacy, security, regulatory economic benefits. In this work, we focus on statistical challenge of federated when local is non-IID. We first show that accuracy reduces significantly, by up 55% neural networks trained highly skewed non-IID data, where each client...

10.48550/arxiv.1806.00582 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Carpooling enables passengers to share a vehicle reduce traveling time, carbon emissions, and traffic congestion. However, the majority of lean find local drivers, but querying remote cloud server leads an unnecessary communication overhead increased response delay. Recently, fog computing is introduced provide data processing with low latency, it also raises new security privacy concerns because users' private information (e.g., identity location) could be disclosed when these are shared...

10.1109/jiot.2018.2868076 article EN IEEE Internet of Things Journal 2018-08-31

Energy trading in Industrial Internet of Things (IIoT), a fundamental approach to realize Industry 4.0, plays vital role satisfying energy demands and optimizing system efficiency. Existing research works utilize utility company distribute nodes with the help brokers. Afterwards, they apply blockchain provide transparency, immutability, auditability peer-to-peer (P2P) trading. However, their schemes are constructed on weak security model do not consider cheating attack initiated by sellers....

10.1109/tii.2020.2974537 article EN IEEE Transactions on Industrial Informatics 2020-02-17

Wav2vec 2.0 is a recently proposed self-supervised framework for speech representation learning.It follows two-stage training process of pre-training and fine-tuning, performs well in recognition tasks especially ultra-low resource cases.In this work, we attempt to extend the speaker verification language identification.First, use some preliminary experiments indicate that wav2vec can capture information about language.Then demonstrate effectiveness on two respectively.For verification,...

10.21437/interspeech.2021-1280 article EN Interspeech 2022 2021-08-27

Cruising for a vacant and economical parking spot causes not only time-consuming frustrating driving experiences, but fuel waste air pollution. Public spots in crowded cities are scarce expensive. On the contrary, private usually have low utilization rates, suppliers willing to provide their extra resources due maintenance cost by charging fees. Given this situation, it is imperative call smart system that collects provides (e.g., around home or workplace) ease public concerns. However, when...

10.1109/tdsc.2018.2850780 article EN IEEE Transactions on Dependable and Secure Computing 2018-06-26

Fog computing has enabled the extension of cloud functions to network edge by assisting and users in terms communication, computation, storage with a widely spread deployment devices or fog nodes, as they become more powerful capacities functionalities. Smart grid is becoming next-generation power will automate reliable electricity distribution for millions customers. However, data transmitted smart communications reached terabyte level mishandling meter readings may lead customers' privacy...

10.1109/mcom.2019.1700859 article EN IEEE Communications Magazine 2019-04-25

Traffic monitoring system empowers cloud server and drivers to collect real-time driving information acquire traffic conditions. However, are more interested in local traffic, sending reports a faraway wastes lot of bandwidth incurs long response delay. Recently, fog computing is introduced provide location-sensitive latency-aware data management vehicular crowdsensing, but it new privacy concerns since drivers' could be disclosed. Although these messages encrypted before transmission,...

10.1109/tsc.2019.2903060 article EN IEEE Transactions on Services Computing 2019-03-04

Amomum villosum, also known as Fructus Amomi, has been used to treat digestive diseases such abdominal pain, vomiting, and dysentery. Volatile terpenoids are the active metabolites in essential oil of Amomi. Nevertheless, downstream genes responsible for activating biosynthesis A. villosum still remain unclear. Here, we report use an integrative volatile terpenoid profiling transcriptomics analysis mining corresponding involved biosynthesis. Ten terpene synthase (TPS) were discovered, two...

10.3389/fpls.2018.00846 article EN cc-by Frontiers in Plant Science 2018-06-20

Traffic speed forecasting plays an increasingly essential role in successful intelligent transportation systems. However, this still remains a challenging task when the accuracy requirement is demanding. To improve prediction and achieve timely performance, capture of intrinsically spatio-temporal dependencies creation parallel model architecture are required. Accordingly, we propose novel end-to-end deep learning framework named Graph Attention Temporal Convolutional Network (GATCN). The...

10.1080/21680566.2020.1822765 article EN Transportmetrica B Transport Dynamics 2020-09-23

Wireless sensor network (WSN) nodes owing to their openness, are susceptible several threats, one of which is dishonest recommendation attacks providing false trust values that favor the attacker. In this letter, a malicious node detection strategy proposed based on fuzzy model and artificial bee colony algorithm (ABC) (FTM-ABC). The (FTM) introduced calculate indirect trust, ABC applied optimize for detecting attacks. Besides, fitness function includes recommended deviation interaction...

10.1109/lwc.2021.3070630 article EN IEEE Wireless Communications Letters 2021-04-02

E-commerce platforms incorporate reputation systems that allow customers to rate suppliers following financial transactions. Existing cannot defend the centralized server against arbitrarily tampering with supplier’s reputation. Furthermore, they do not offer access across platforms. Rates are faced privacy leakages because rating activities correlated (e.g., identity and rating). Meanwhile, raters could be malicious initiate multiple attacks abnormal attacks. Determining how address these...

10.1109/tnsm.2021.3098439 article EN IEEE Transactions on Network and Service Management 2021-08-10

Federated learning (FL), as a distributed machine paradigm, enables multiple users to train models locally using individual data and then update global model in privacy-preserving aggregated manner. However, FL, the parameters are at risk of privacy breach. Furthermore, aggregation server may forge results. To address these problems, this paper, we propose SVCA, secure verifiable chained for federated (PPFL) scheme. Specifically, first group construct structure, employ secret sharing prevent...

10.1109/jiot.2024.3363712 article EN IEEE Internet of Things Journal 2024-02-08

Face and voice are two of the most popular traits used for authentication tasks in daily life, as they can be easily captured using low-cost visual audio sensors on smartphones, laptops, tablets, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">etc</i> . Many bimodal biometric schemes based these have been presented to provide higher accuracy than unimodal systems. However, inflexibility due requirement submitting simultaneously, lack template...

10.1109/tifs.2024.3364092 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

A growing number of utility companies are starting to use cellular wireless networks transmit data in the smart grid. Consequently, millions users' daily energy consumption sent by meters. However, broadcast transfer manner communication makes it naturally vulnerable cyber attacks. Since meter readings can easily be leaked, patterns could inferred. Hence, privacy at home is under serious threat. This article begins introducing existing work on stealing from networks. Then three types big...

10.1109/mwc.2018.1700157 article EN IEEE Wireless Communications 2018-02-01
Coming Soon ...