Jamie Cui

ORCID: 0000-0002-7601-3225
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Advanced Graph Neural Networks
  • Stochastic Gradient Optimization Techniques
  • Complexity and Algorithms in Graphs
  • AI in cancer detection
  • Distributed systems and fault tolerance
  • Caching and Content Delivery
  • Graph Theory and Algorithms
  • Advanced Graph Theory Research
  • Blockchain Technology Applications and Security
  • Radiation Detection and Scintillator Technologies
  • Data Quality and Management
  • Tensor decomposition and applications
  • Radiomics and Machine Learning in Medical Imaging
  • Recommender Systems and Techniques
  • Face and Expression Recognition
  • Medical Imaging and Analysis
  • Nuclear Physics and Applications
  • Human Mobility and Location-Based Analysis
  • Non-Destructive Testing Techniques
  • Random Matrices and Applications

East China Normal University
2023-2024

As privacy issues are receiving increasing attention within the Natural Language Processing (NLP) community, numerous methods have been proposed to sanitize texts subject differential privacy. However, state-of-the-art text sanitization mechanisms based on a relaxed notion of metric local (MLDP) do not apply non-metric semantic similarity measures and cannot achieve good privacy-utility trade-offs. To address these limitations, we propose novel Customized Text (CusText) mechanism original...

10.18653/v1/2023.findings-acl.355 article EN cc-by Findings of the Association for Computational Linguistics: ACL 2022 2023-01-01

Social recommendation has shown promising improvements over traditional systems since it leverages social correlation data as an additional input. Most existing work assumes that all are available to the platform. However, in practice, user-item interaction (e.g.,rating) and user-user usually generated by different platforms, both of which contain sensitive information. Therefore, "How perform secure efficient across where highly-sparse nature" remains important challenge. In this work, we...

10.48550/arxiv.2202.07253 preprint EN cc-by arXiv (Cornell University) 2022-01-01

Logistic regression is an algorithm widely used for binary classification in various real-world applications such as fraud detection, medical diagnosis, and recommendation systems. However, training a logistic model with data from different parties raises privacy concerns. Secure Multi-Party Computation (MPC) cryptographic tool that allows multiple to train jointly without compromising privacy. The efficiency of the online phase becomes crucial when dealing large-scale practice. In this...

10.1145/3583780.3614998 preprint EN 2023-10-21

Knowledge Graph (KG) has attracted more and companies' attention for its ability to connect different types of data in meaningful ways support rich services. However, the isolation problem limits performance KG prevents further development. That is, multiple parties have their own KGs but they cannot share with each other due regulation or competition reasons. Therefore, how conduct privacy preserving becomes an important research question answer. related tasks collaboratively on basis...

10.48550/arxiv.2011.10180 preprint EN other-oa arXiv (Cornell University) 2020-01-01

10.1109/bibm62325.2024.10822730 article EN 2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2024-12-03

Recently, Niu, et. al. introduced a new variant of Federated Learning (FL), called Submodel (FSL). Different from traditional FL, each client locally trains the submodel (e.g., retrieved servers) based on its private data and uploads at choice to servers. Then all clients aggregate their submodels finish iteration. Inevitably, FSL introduces two privacy-preserving computation tasks, i.e., Private Retrieval (PSR) Secure Aggregation (SSA). Existing work fails provide loss-less scheme, or has...

10.48550/arxiv.2111.01432 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01

As privacy issues are receiving increasing attention within the Natural Language Processing (NLP) community, numerous methods have been proposed to sanitize texts subject differential privacy. However, state-of-the-art text sanitization mechanisms based on metric local (MLDP) do not apply non-metric semantic similarity measures and cannot achieve good trade-offs between utility. To address above limitations, we propose a novel Customized Text (CusText) mechanism original...

10.48550/arxiv.2207.01193 preprint EN other-oa arXiv (Cornell University) 2022-01-01

K-means is one of the most widely used clustering models in practice. Due to problem data isolation and requirement for high model performance, how jointly build practical secure multiple parties has become an important topic many applications industry. Existing work on this mainly two types. The first type efficiency advantages, but information leakage raises potential privacy risks. second provable inefficient even helpless large-scale sparsity scenario. In paper, we propose a new...

10.48550/arxiv.2208.06093 preprint EN other-oa arXiv (Cornell University) 2022-01-01

One way to classify private set intersection (PSI) for secure 2-party computation is whether the (a) revealed both parties or (b) hidden from while only computing function of matched payload exposed. Both aim provide cryptographic security avoiding exposing unmatched elements other. They may, however, be insufficient achieve and privacy in one practical scenario: when required information leaked through function's output must considered legal, ethical, competitive reasons. Two parties, such...

10.48550/arxiv.2208.13249 preprint EN cc-by arXiv (Cornell University) 2022-01-01
Coming Soon ...