- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Technology and Data Analysis
- Conducting polymers and applications
- Simulation and Modeling Applications
- Safety and Risk Management
- Internet Traffic Analysis and Secure E-voting
- Tactile and Sensory Interactions
- Evacuation and Crowd Dynamics
- Adversarial Robustness in Machine Learning
- Big Data Technologies and Applications
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
- Advanced Sensor and Energy Harvesting Materials
- Cooperative Communication and Network Coding
East China Normal University
2006-2025
Shanghai Key Laboratory of Trustworthy Computing
2020-2023
Federated learning is increasingly popular, as it allows us to circumvent challenges due data islands, by training a global model using from one or more owners/sources. However, in edge computing, resource-constrained end devices are vulnerable be compromised and abused facilitate poisoning attacks. Privacy-preserving another important property consider when dealing with sensitive user on devices. Most existing approaches only either defending against attacks supporting privacy, but not both...
Blockchain can be utilized to enhance both security and efficiency for location-based service (LBS) in vehicular social networks (VSNs), due its inherent decentralization, anonymity, trust properties. Unfortunately, the existing approaches either lack effective authentication, which is vulnerable man-in-the-middle attack, or require an online certificate authority (CA) where frequent interactions with resource-constrained vehicles are required. To address these challenging issues, this...
Proxy Re-Encryption (PRE), a special cryptographic primitive, can efficiently perform ciphertext conversion on the cloud. To enable data owner (i.e. delegator) to authorize file access path according different priorities of users delegatees), autonomous proxy re-encryption (AP-PRE) was proposed, where delegator generate in order delegatees' priority. If one delegatee does not hold decryption right, be converted new that decrypted by next with lower priority path. Although AP-PRE enables...
Recommender systems facilitate personalized service provision through the statistical analysis and model training of user historical data (e.g., browsing behavior, travel history, etc). To address underpinning privacy implications associated with such systems, a number privacy-preserving recommendation approaches have been presented. There are, however, limitations in many these approaches. For example, that apply public key (fully) homomorphic encryption (FHE) on different users. ratings...
Abstract Biomimetic sensors that mimic human skin perception have received enormous attention in motion detection and human–robot interaction. However, the narrow working range limits response linearity of mechanical stimuli. Especially ultrafast active is needed to detect react potential collision. Inspired by structure, a hierarchical structure with poly(ethylene oxide)‐based ionic conductive polymer electrolytes polyurethane designed. The observable synergistic sensing mechanism works...