Cheng Huang

ORCID: 0000-0003-3769-7211
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Caching and Content Delivery
  • Advanced Data Storage Technologies
  • Blockchain Technology Applications and Security
  • Peer-to-Peer Network Technologies
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • Mobile Crowdsensing and Crowdsourcing
  • Distributed systems and fault tolerance
  • Vehicular Ad Hoc Networks (VANETs)
  • Cooperative Communication and Network Coding
  • Privacy, Security, and Data Protection
  • Multimedia Communication and Technology
  • Advanced Wireless Network Optimization
  • Coding theory and cryptography
  • Network Security and Intrusion Detection
  • Cellular Automata and Applications
  • Software-Defined Networks and 5G
  • Cloud Computing and Resource Management
  • Security in Wireless Sensor Networks
  • Electric Power System Optimization
  • Indoor and Outdoor Localization Technologies
  • Spam and Phishing Detection

Fudan University
2007-2025

Aarhus University
2024-2025

Chongqing University
2025

University of Waterloo
2016-2024

Sichuan University
2024

Southwest University of Science and Technology
2024

Deyang Stomatological Hospital
2024

Commercial Aircraft Corporation of China (China)
2024

Shanghai Jiao Tong University
2019-2022

Huawei Technologies (China)
2022

Consider a linear [ <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</i> , xmlns:xlink="http://www.w3.org/1999/xlink">k</i> xmlns:xlink="http://www.w3.org/1999/xlink">d</i> ] <sub xmlns:xlink="http://www.w3.org/1999/xlink">q</sub> code xmlns:xlink="http://www.w3.org/1999/xlink">C</i> . We say that the xmlns:xlink="http://www.w3.org/1999/xlink">i</i> th coordinate of has locality xmlns:xlink="http://www.w3.org/1999/xlink">r</i> if value at this...

10.1109/tit.2012.2208937 article EN IEEE Transactions on Information Theory 2012-08-03

P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, provide a platform for scalable content distribution, as long there is interest content. P2P-based video-on-demand (P2P-VoD) new challenge technology. Unlike live content, P2P-VoD has less synchrony in users sharing video therefore it much more difficult to alleviate loading at same time maintaining performance. To compensate, small storage...

10.1145/1402946.1403001 article EN ACM SIGCOMM Computer Communication Review 2008-08-17

Video-on-demand in the Internet has become an immensely popular service recent years. But due to its high bandwidth requirements and popularity, it is also a costly provide. We consider design potential benefits of peer-assisted video-on-demand, which participating peers assist server delivering VoD content. The assistance done such way that provides same user quality experience as pure client-server distribution. focus on single-video approach, whereby peer only redistributes video...

10.1145/1282380.1282396 article EN 2007-08-27

P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, provide a platform for scalable content distribution, as long there is interest content. P2P-based video-on-demand (P2P-VoD) new challenge technology. Unlike live content, P2P-VoD has less synchrony in users sharing video therefore it much more difficult to alleviate loading at same time maintaining performance. To compensate, small storage...

10.1145/1402958.1403001 article EN 2008-08-17

To reduce storage overhead, cloud file systems are transitioning from replication to erasure codes. This process has revealed new dimensions on which evaluate the performance of different coding schemes: amount data used in recovery and when performing degraded reads. We present an algorithm that finds optimal number codeword symbols needed for any XOR-based code produces schedules use a minimum data. differentiate popular codes based this criterion demonstrate differences improve I/O...

10.5555/2208461.2208481 article EN 2012-02-14

To flexibly explore the trade-offs between storage space and access efficiency in reliable data systems, we describe two classes of erasure resilient coding schemes: basic generalized pyramid codes. The codes can be simply derived from any existing codes, thus all known efficient encoding/decoding techniques directly apply. are radically advanced new which further improve and/or reliability upon We also establish a necessary condition for failure pattern to ever recoverable, show that...

10.1109/nca.2007.37 article EN 2007-07-01

Vehicular fog computing extends the paradigm to conventional vehicular networks. This allows us support more ubiquitous vehicles, achieve better communication efficiency, and address limitations in networks terms of latency, location awareness, real-time response (typically required smart traffic control, driving safety applications, entertainment services, other applications). Such requirements are particularly important adversarial environments (e.g., urban warfare battlefields Internet...

10.1109/mcom.2017.1700322 article EN IEEE Communications Magazine 2017-11-01

Proper data placement schemes based on erasure correcting codes are one of the most important components for a highly available storage system. For such schemes, low decoding complexity (or recovering) node failures is essential practical systems. In this paper, we describe new coding scheme, which call STAR code, triple (erasures). The code an extension double-erasure-correcting EVENODD and modification generalized triple-erasure-correcting code. Maximum Distance Separable (MDS) thus...

10.1109/tc.2007.70830 article EN IEEE Transactions on Computers 2008-05-29

Network codes designed specifically for distributed storage systems have the potential to provide dramatically higher efficiency same availability. One main challenge in design of such is exact repair problem: if a node storing encoded information fails, order maintain level reliability we need create at new node. open problems this emerging area has been simple coding schemes that allow and low cost failed nodes high data rates. In particular, all prior known explicit constructions rates...

10.1109/infcom.2012.6195703 preprint EN 2012-03-01

Consider a systematic linear code where some (local) parity symbols depend on few prescribed symbols, whereas other (heavy) may all data symbols. Such codes have been studied recently in the context of erasure coding for storage, local parities facilitate fast recovery any single symbol when it is erased, heavy provide tolerance to large number simultaneous erasures. A as above maximally recoverable, if corrects patterns, which are information theoretically correctable given dependence...

10.1109/tit.2014.2332338 article EN IEEE Transactions on Information Theory 2014-06-30

A highly accurate client-independent geolocation service stands to be an important goal for the Internet. Despite extensive research effort and significant advances in this area, has not yet been met. Motivated by fact that best results date are achieved utilizing additional 'hints' beyond inherently inaccurate delay-based measurements, we propose a novel method fundamentally escalates use of external information. In particular, many entities (e.g., businesses, universities, institutions)...

10.5555/1972457.1972494 article EN 2011-03-30

We design flexible schemes to explore the tradeoffs between storage space and access efficiency in reliable data systems. Aiming at this goal, two new classes of erasure-resilient codes are introduced -- Basic Pyramid Codes (BPC) Generalized (GPC). Both require slightly more than conventional schemes, but significantly improve critical performance read during failures unavailability. As a by-product, we establish necessary matching condition characterize limit failure recovery, that is,...

10.1145/2435204.2435207 article EN ACM Transactions on Storage 2013-03-01

In this paper, we quantify the potential gains of hybrid CDN-P2P for two leading CDN companies, Akamai and Limelight. We first develop novel measurement methodology mapping topologies networks. then consider ISP-friendly P2P distribution schemes which work in conjunction with CDNs to localize traffic within regions ISPs. To evaluate these schemes, use recent, real-world traces: a video-on-demand trace large-scale software update trace. find that can significantly reduce cost content...

10.1145/1496046.1496064 article EN 2008-05-28

With the pervasiveness of location-aware mobile electronic devices and advances wireless communications, location-based services (LBS), which can help people enjoy a convenient life, has attracted considerable interest recently. However, privacy issues LBS are still challenging today. Aiming at challenges, in this paper, we present new efficient privacy-preserving query scheme outsourced cloud, i.e., EPQ, for pervasive smartphones. In EPQ scheme, provider's data first to cloud server an...

10.1109/tvt.2015.2499791 article EN IEEE Transactions on Vehicular Technology 2015-11-11

It is believed that automated valet parking (AVP) system has great potential to mitigate the headache for future smart city, as it can provide on-demand services, bringing immense benefits from energy saving vehicles time drivers. For an AVP system, reservation indispensable part so accomplish in accordance with reserved information. However, requests may not only reveal driver identity, but also disclose his/her sensitive locations, e.g., most visited places, which are of concerns users. To...

10.1109/tvt.2018.2870167 article EN IEEE Transactions on Vehicular Technology 2018-09-13

Secure and efficient access authentication is one of the most important security requirements for vehicular networks, but it difficult to fulfill due potential attacks long delay caused by high vehicle mobility, etc. Most existing protocols, either do not consider like single point failure or focus on reducing delay. To address these issues, we introduce an edge-assisted decentralized (EADA) architecture, which provides secure more communication-efficient enabling server delegate its...

10.1109/tits.2020.3024000 article EN IEEE Transactions on Intelligent Transportation Systems 2020-09-24

In mobile crowdsensing, location-based task recommendation requires each data requester to submit a task-related geometric range crowdsensing service providers such that they can match suitable workers within this range. Generally, trusted server (i.e., database owner) should be deployed protect location privacy during the process, which is not desirable in practice. paper, we propose privacy-preserving (PPTR) schemes with query without owner. Specifically, first PPTR scheme linear search...

10.1109/tmc.2021.3080714 article EN IEEE Transactions on Mobile Computing 2021-05-17

In this article, we aim to design an architecture for privacy-preserved credit data and model sharing guarantee the secure storage of information in a distributed environment. The proposed optimizes privacy by instead revealing actual data. This article also proposes efficient mechanism combined with deletable Bloom filter uniform consensus training computation process. addition, propose authority control contract verification certification results under federated learning. Extensive...

10.1109/tii.2022.3151917 article EN IEEE Transactions on Industrial Informatics 2022-02-16

Secure cross-domain authorization and authentication (AA) enable application service providers (ASPs) to allow users for resource access from different trusted domains. In this article, we propose a unified blockchain-assisted secure AA framework smart city, which can guarantee transparent while preserving user privacy. the framework, ASPs flexibly delegate their capabilities blockchain, authorized by be authenticated blockchain where events are publicly audited traced. Since is accessible,...

10.1109/jiot.2022.3154632 article EN IEEE Internet of Things Journal 2022-02-25

We consider exact repair of failed nodes in maximum distance separable (MDS) code based distributed storage systems. It is well known that an (n, k) MDS can tolerate failure (erasure) up to n - k disks, when the used store information elements over disks. The focus this paper optimal recovery, terms bandwidth amount data be downloaded a node for single node. When fails, it has been previously shown by Dimakis et. al. at least equation units, each disk stores ℒ units data. achievability lower...

10.1109/isit.2011.6033730 article EN 2011-07-01

In this article, we propose an accountable and efficient data sharing scheme for industrial IoT (IIoT), named (ADS), in which a owner can pursue the responsibility of receiver if latter leaks some sensitive shared to public profits while without permission (i.e., accountability). Specifically, ADS is built upon adaptive decentralized oblivious transfer protocol together with zero-knowledge proof technique, enables receiver's private key be hidden from yet correctly embedded into during...

10.1109/tii.2020.2982942 article EN IEEE Transactions on Industrial Informatics 2020-03-31

Data are generated by Internet of Things (IoT) devices and centralized at a cloud server, that can later be traded with third parties, i.e., data marketing, to enable various data-intensive applications. However, the approach is recently under debate due lack (1) transparent distributed marketplace management, (2) marketing fairness for both IoT users (data sellers) parties buyers). In this paper, we propose Blockchain-Cloud Transparent Marketing (Block-DM) consortium management executable...

10.1109/tc.2022.3150724 article EN publisher-specific-oa IEEE Transactions on Computers 2022-01-01
Coming Soon ...