- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Quantum Computing Algorithms and Architecture
- Complexity and Algorithms in Graphs
- Stochastic Gradient Optimization Techniques
- Blockchain Technology Applications and Security
- Quantum Information and Cryptography
- Semantic Web and Ontologies
- Quantum-Dot Cellular Automata
- Cloud Data Security Solutions
- Mobile Crowdsensing and Crowdsourcing
- Advanced Steganography and Watermarking Techniques
- IoT and Edge/Fog Computing
- Adversarial Robustness in Machine Learning
- Domain Adaptation and Few-Shot Learning
- Misinformation and Its Impacts
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Residue Arithmetic
- Natural Language Processing Techniques
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Service-Oriented Architecture and Web Services
- Advanced Thermodynamics and Statistical Mechanics
- Advanced Algorithms and Applications
- Wireless Networks and Protocols
Huazhong University of Science and Technology
2008-2025
Jining Normal University
2009-2025
Nanning Normal University
2022-2023
City University College of Science and Technology
2023
Jiangsu University
2022
Channel reassignment is to assign again on the assigned channel resources in order use more efficiently. Software-Defined Networking (SDN) based Internet of Things (SDN-IoT) a promising paradigm improve communication performance network, since it allows software-defined routers (SDRs) with help SDN controller appropriately schedule traffic loads meet better transaction corresponding channels one link. However, existing works have many limitations. In this paper, we develop joint...
There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine and sharing of sensitive data a new technology called internet things (IIoTs). Most suggested security mechanisms vulnerable several cybersecurity threats due their reliance on cloud-based services, external trusted authorities, centralized architectures; they have high computation costs, low performance, exposed single authority failure...
Traffic and the movement of people are inextricably associated with potential spread COVID-19. In Intelligent Transportation System (ITS), Deep Learning (DL) traffic detection approaches driven by transportation big data have significant application values in monitoring, counting classifying vehicle information during COVID-19 epidemic blockade, while DL medical diagnostic technology is also very important. However, due to concerns about privacy security, traditional data-centralized...
With the rapid proliferation of social networks, individuals now have greater access to news with increased speed. Simultaneously, there has been a heightened emphasis on detecting and mitigating dissemination fake news. One notable limitation existing detection models is their inability effectively integrate multi-modal features, as they typically only establish connections between unimodal neglecting potential synergies complementarity among different modes. To address this issue, we...
In radio frequency identification system (RFID), the efficiency in which reader identifies multiple tags is closely related to methods solve collision of tags. At present, a reasonable solution introduction 4-ary query tree (or n-ary tree) reduce time slots and additional used decrease idle timeslots. The advantage anti-collision algorithm that it able timeslots, but also increases To these excessive timeslots anticollision brings, an based on adaptive pruning (A4PQT) proposed this paper. On...
Oblivious transfer plays a fundamental role in the area of secure distributed computation. In particular, this primitive is used to search items decentralized databases. Using variant smooth projective hash previously presented by Zeng , we construct practical framework for <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">t</i> -out-of- xmlns:xlink="http://www.w3.org/1999/xlink">n</i> oblivious plain model without any set-up assumption. It can be...
Federated Learning (FL), a distributed learning paradigm optimizing communication costs and enhancing privacy by uploading gradients instead of raw data, now confronts security challenges. It is particularly vulnerable to Byzantine poisoning attacks potential breaches via inference attacks. While homomorphic encryption secure multi-party computation have been employed design robust FL mechanisms, these predominantly rely on Euclidean distance or median-based metrics often fall short in...
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct data using uploaded users in FL. To mitigate this issue, researchers have combined computing techniques with these may not ensure the Byzantine robustness aggregation or integrity aggregated outcomes. Most current robust FL methods assess differences between and benchmarks direction, allowing adversaries to poison against magnitude. Furthermore, cannot...
In recent years, deep learning models have gained significant traction and found extensive applications in the realm of PM2.5 concentration prediction. sequences are rich frequency information; however, existing prediction lack ability to capture information. Therefore, we propose Time-frequency domain, Bidirectional Long Short-Term Memory (BiLSTM), attention (TF-BiLSTM-attention) model. First, model uses Discrete Cosine Transform (DCT) convert time domain information into its corresponding...
Federated Learning (FL) offers a collaborative training framework, aggregating model parameters from decentralized clients. Many existing models, however, assume static, predetermined data classes within FLa frequently unrealistic assumption. Real-time additions clients can degrade global recognition of established due to catastrophic forgetting. This is exacerbated when new clients, unfamiliar previous participants, join sporadically. Additionally, there's an imperative for client privacy....
Blind signature offer the protection for sender's privacy and become an important primitive electronic commerce. In this paper, we present a technique of matrix-vector-blinding lattice-based blind signature. Building on result, propose two hierarchical ID-based schemes from lattice with without random oracle, which are secure against quantum attacks. We apply latest "lattice basis delegation in fixed dimension" ABB10's[1] scheme to our constructions contribute shorter public key Both proven...
Braid group is a new considerable public key cryptography platform for the quantum computer ages, but almost all current intractable braid problems used cryptosystems are flawy. The security of cryptosystem can't depend only on hardness conjugacy problems. By taking advantage non-conjugate transformation and multiple variant equations groups, two proposed, these comes from enlarged amount variants. A related algorithm analysis its correctness, security, efficiency parameter choice...
We present a framework for fully-simulatable $h$-out-of-$n$ oblivious transfer ($OT^{n}_{h}$) with security against non-adaptive malicious adversaries. The costs six communication rounds and at most $40n$ public-key operations in computational overhead. Compared the known protocols that works plain mode (where there is no trusted common reference string available) proven to be secure under standard model random oracle available), instantiation based on decisional Diffie-Hellman assumption of...
Today, we are in the era of big data, and data becoming more important, especially private data. Secure Multi-party Computation (SMPC) technology enables parties to perform computing tasks without revealing original However, underlying implementation SMPC is too heavy, such as garbled circuit (GC) oblivious transfer(OT). Every time a piece added, resources consumed by GC OT will increase lot. Therefore, it unacceptable process large-scale single task. In this work, propose novel theory...
In this paper, we develop a generic controlled alternate quantum-walk model (called CQWMP) by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose hash function QHFM-P) based on model. The statistical properties of the proposed scheme are stable respect to coin parameters underlying walks; certain parameter values, collision resistance property QHFM-P is better than that state-of-the-art functions discrete walks. Moreover, can also maintain near-ideal...