Xiangyun Tang

ORCID: 0000-0002-5511-0720
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Adversarial Robustness in Machine Learning
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • UAV Applications and Optimization
  • Misinformation and Its Impacts
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Stochastic Gradient Optimization Techniques
  • IoT and Edge/Fog Computing
  • Advanced Image Processing Techniques
  • Advanced Wireless Network Optimization
  • Image Enhancement Techniques
  • Complex Network Analysis Techniques
  • Recommender Systems and Techniques
  • Cloud Data Security Solutions
  • Patient Dignity and Privacy
  • Multimodal Machine Learning Applications

Minzu University of China
2023-2025

Beijing Institute of Technology
2018-2022

State Key Laboratory of Cryptology
2019

Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As typical ML model, support vector machine (SVM) enables efficient classification and thereby finds its applications real-world scenarios, such as disease diagnosis anomaly detection. Training an SVM classifier usually requires collection labeled IoT multiple entities, raising great concerns about privacy. Most the existing solutions rely on...

10.1109/jiot.2019.2901840 article EN IEEE Internet of Things Journal 2019-02-26

Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, cross-domain has been proposed to improve performance. However, when participating detection, the domain of each SDN needs provide large amount real data, from which private information may be leaked. multiparty privacy protection schemes often achieve guarantees by sacrificing accuracy or...

10.1109/jsac.2018.2815442 article EN IEEE Journal on Selected Areas in Communications 2018-03-01

Machine learning (ML) techniques are expected to be used for specific applications in Vehicular Social Networks (VSNs). Support vector machine (SVM) is one of the typical ML methods and widely its high efficiency. Due limitation data sources, collected by different entities usually contain attributes that quite different. However, some real-world scenarios, when training an SVM classifier, many face same problem they lacking with adequate attributes. Thus multiple required share combine a...

10.1109/tvt.2019.2957425 article EN IEEE Transactions on Vehicular Technology 2019-12-03

Federated learning (FL) protects training data in clients by collaboratively local machine models of for a global model, instead directly feeding the to server. However, existing studies show that FL is vulnerable various attacks, resulting leakage or interfering with model training. Specifically, an adversary can analyze gradients and infer clients' data, poison generate inaccurate model. It extremely challenging guarantee strong privacy protection while ensuring robustness None achieve...

10.1109/tdsc.2023.3239007 article EN IEEE Transactions on Dependable and Secure Computing 2023-01-23

With the rapid advances in information and communication technologies, Internet of Things (IoT) has become large complex, bearing tremendous amounts data running devices various scenarios. Leveraging artificial intelligence (AI) IoT can achieve superior extraction, analytics, decision making, which resulted revolutionized AI (AIoT). AIoT alleviate pressure storage, computation, communication. Despite promising features brought by combining technologies into infrastructure, systems still face...

10.1109/jiot.2023.3268705 article EN IEEE Internet of Things Journal 2023-04-20

Heterogeneous networks, as a critical component of modern communication technology, have experienced rapid development in recent years [...]

10.3390/electronics14030568 article EN Electronics 2025-01-31

Real-time forwarding prediction for predicting online contents' popularity is beneficial to various social applications enhancing interactive behaviors. Cascade graphs, formed by propagation, play a vital role in real-time prediction. Existing cascade graph modeling methods are inadequate embed graphs that have hub structures and deep paths, or they fail handle the short-term outbreak of amount. To this end, we propose novel method includes an effective approach embedding variation sensitive...

10.1609/aaai.v35i1.16137 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2021-05-18

Empowered by promising artificial intelligence, the traditional Internet of Things is evolving into Artificial Intelligence (AIoT), which an important enabling technology for Industry 4.0. Collaborative learning a key AIoT to build machine (ML) models on distributed datasets. However, there are two critical concerns collaborative AIoT: privacy leakage sensitive data and dishonest computation. Specifically, contains information users, cannot be openly shared model learning. Furthermore,...

10.1109/mwc.003.2100598 article EN IEEE Wireless Communications 2022-06-01

In developing smart city, the growing popularity of machine learning (ML) that appreciates high-quality training data sets generated from diverse Internet-of-Things (IoT) devices raises natural questions about privacy guarantees can be provided in such settings. Privacy-preserving ML an aggregation scenario enables a model demander to securely train models with sensitive IoT gathered devices. The existing solutions are generally server aided, cannot deal collusion threat between servers or...

10.1109/jiot.2021.3060764 article EN IEEE Internet of Things Journal 2021-02-20

Sentiment Quantification aims to detect the overall sentiment polarity of users from a set reviews corresponding target. Existing methods equally treat and aggregate individual reviews' judge polarity. However, confidence each review is not equal in quantification where perturbation arising high- low-confidence may degrade accuracy Quantification. Specifically, fake with deceptive sentiments are low confidence, which perturbs prediction. Whereas, some generated by responsible high...

10.1109/taffc.2023.3301956 article EN IEEE Transactions on Affective Computing 2023-08-04

Semantic communication has emerged as a promising technique that can integrate the meaning and context of information into process. It goes beyond raw data transmission enables sender receiver to transmit recover semantic messages through their respective knowledge bases. However, it is challenging achieve secure due complicated security privacy threats in communication. In this article, we first introduce background architecture Then, sort out multiple potential existing each step Following...

10.1109/mnet.2023.3327111 article EN IEEE Network 2023-10-23

Community detection has been a subject of extensive research due to its broad applications across social media, computer science, biology, and complex systems. Modularity stands out as predominant metric guiding community detection, with numerous algorithms aimed at maximizing modularity. However, modularity encounters resolution limit problem when identifying small structures. To tackle this challenge, paper presents novel approach by defining structure information from the perspective...

10.3390/electronics13061119 article EN Electronics 2024-03-19

In the realms of Internet Things (IoT) and artificial intelligence (AI) security, ensuring integrity quality visual data becomes paramount, especially under low-light conditions, where image enhancement emerges as a crucial technology. However, current methods for enhancing images conditions still face some challenging issues, including inability to effectively handle uneven illumination distribution, suboptimal denoising performance, insufficient correlation among branch network. Addressing...

10.3390/electronics13040788 article EN Electronics 2024-02-17

In this paper, we propose a system framework of Pub/Sub-based multimodal data transmission to mobile terminals. For various sensors, classify the in different topics, but transmit them uniform channel, with mechanisms. case, terminals receive via mechanisms, push notification and request-response connection. The proposed makes more efficient flexible.

10.1145/3643832.3661408 article EN 2024-06-03
Coming Soon ...