Bo Li

ORCID: 0000-0003-4207-5070
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Data Stream Mining Techniques
  • Imbalanced Data Classification Techniques
  • Machine Learning and Data Classification
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Sentiment Analysis and Opinion Mining
  • Advanced Statistical Methods and Models
  • Text and Document Classification Technologies
  • Food Supply Chain Traceability
  • Target Tracking and Data Fusion in Sensor Networks
  • Web Data Mining and Analysis
  • Cryptography and Data Security
  • Face recognition and analysis
  • Advanced Algorithms and Applications
  • Geophysical Methods and Applications
  • Energy Load and Power Forecasting
  • Smart Agriculture and AI
  • Face and Expression Recognition
  • Inertial Sensor and Navigation
  • Privacy, Security, and Data Protection
  • Time Series Analysis and Forecasting
  • Advanced Malware Detection Techniques
  • Water Systems and Optimization
  • Solar Radiation and Photovoltaics

Xihua University
2024

China Southern Power Grid (China)
2023

Central China Normal University
2023

Hong Kong University of Science and Technology
2004-2022

University of Hong Kong
2004-2022

International University of the Caribbean
2021

University of Illinois Urbana-Champaign
2020

Concordia University
2019

East China Jiaotong University
2015

This paper studies model-inversion attacks, in which the access to a model is abused infer information about training data. Since its first introduction by~\cite{fredrikson2014privacy}, such attacks have raised serious concerns given that data usually contain privacy sensitive information. Thus far, successful only been demonstrated on simple models, as linear regression and logistic regression. Previous attempts invert neural networks, even ones with architectures, failed produce convincing...

10.1109/cvpr42600.2020.00033 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020-06-01

In Machine Learning, the emergence of \textit{the right to be forgotten} gave birth a paradigm named \textit{machine unlearning}, which enables data holders proactively erase their from trained model. Existing machine unlearning techniques focus on centralized training, where access all holders' training is must for server conduct process. It remains largely underexplored about how achieve when full becomes unavailable. One noteworthy example Federated Learning (FL), each participating...

10.1109/infocom48880.2022.9796721 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Clothing-change person re-identification (CC Re-ID) has attracted increasing attention in recent years due to its application prospect. Most existing works struggle adequately extract the ID-related information from original RGB images. In this paper, we propose an Identity-aware Feature Decoupling (IFD) learning framework mine identity-related features. Particularly, IFD exploits a dual stream architecture that consists of main and stream. The takes clothing-masked images as inputs derives...

10.48550/arxiv.2501.05851 preprint EN arXiv (Cornell University) 2025-01-10

Quantifying the importance of each training point to a learning task is fundamental problem in machine and estimated scores have been leveraged guide range data workflows such as summarization domain adaption. One simple idea use leave-one-out error indicate its importance. Recent work has also proposed Shapley value, it defines unique value distribution scheme that satisfies set appealing properties. However, calculating values often expensive, which limits applicability real-world...

10.1109/cvpr46437.2021.00814 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2021-06-01

10.1007/s13042-022-01766-6 article EN International Journal of Machine Learning and Cybernetics 2023-01-19

As requirements for communication security grow, cryptographic processing becomes another type of application domain. However, algorithms are all computationally intensive. This work compares and analyzes architectural characteristics many widespread on the Intel IXP2800 network processor. It also investigates several implementation optimization principles that can improve overall performance. The results reported here applicable to other processors because they have similar components architectures.

10.1109/mm.2004.54 article EN IEEE Micro 2004-09-01

As the requirements of smart, reliable and precise location for a vehicle, model fusion algorithm with big data selection accuracy correction is established to achieve low-cost location. In this paper, simple inertial navigation various positioning system sources different errors are intelligently selected, Kalman filtering used fuse information by function model, four kinds GPS, SINS, DR TDOA chosen simulate algorithm. The simulation results in MATLAB environment show that proposed...

10.12783/dtcse/wicom2018/26274 article EN DEStech Transactions on Computer Science and Engineering 2018-11-15

The Internet of Things could benefit in several ways from mining data streams on connected objects rather than the cloud.In particular, limiting network communication with cloud services would improve user privacy and reduce energy consumption devices.Besides, applications leverage computing power for improved scalability.

10.21105/joss.01485 article EN cc-by The Journal of Open Source Software 2019-07-25

Deep neural networks (DNNs) have been found to be vulnerable backdoor attacks, raising security concerns about their deployment in mission-critical applications. While existing defense methods demonstrated promising results, it is still not clear how effectively remove backdoor-associated neurons backdoored DNNs. In this paper, we propose a novel called \emph{Reconstructive Neuron Pruning} (RNP) expose and prune via an unlearning then recovering process. Specifically, RNP first unlearns the...

10.48550/arxiv.2305.14876 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Things agriculture is an important development direction of networking applications, technology in the field for has brought immeasurable impetus and prospects immeasurable.In things, how can production process data collected processing, analysis display, making it better agricultural services needed to solve critical issues.Data processing located information application layer through integration scientific management decisions, achieve control.

10.2991/icmmita-15.2015.11 article EN cc-by-nc Advances in computer science research 2015-01-01

Under cloudy weather, PV power will fluctuate dramatic due to the sporty cloud shading. However, most existing prediction models do not utilize map sufficiently. In this paper, we propose a novel method improve accuracy through combining features and hybrid neural network. Firstly, extract static dynamic of ground-based using image processing techniques. Secondly, establish an model based on ensemble empirical mode decomposition-bi-long short-term memory (EEMD-BiLSTM) with numerical weather...

10.1117/12.2684718 article EN 2023-10-19

Currently, the authenticity of historical data on photovoltaic power is compromised due to artificial restrictions and equipment failure during measurement communication. To address this issue ensure reliable follow-up research, paper proposes a method for identifying reconstructing outliers in with high outlier proportions. Initially, characteristics PV output its influencing factors are analyzed, leading classification types. Next, various basic identification models integrated using LSCP...

10.1109/powercon58120.2023.10331532 article EN 2021 International Conference on Power System Technology (POWERCON) 2023-09-21
Coming Soon ...