- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Spam and Phishing Detection
- Privacy, Security, and Data Protection
- Adversarial Robustness in Machine Learning
- Metal Alloys Wear and Properties
- Risk and Safety Analysis
- Metamaterials and Metasurfaces Applications
- Neural Networks and Applications
- Cloud Data Security Solutions
- Metallurgy and Material Forming
- Manufacturing Process and Optimization
- Orbital Angular Momentum in Optics
- Security and Verification in Computing
- Geoscience and Mining Technology
- Advanced Algorithms and Applications
- Physical Unclonable Functions (PUFs) and Hardware Security
- Recycling and utilization of industrial and municipal waste in materials production
- Advanced machining processes and optimization
- Advanced Antenna and Metasurface Technologies
- Advanced ceramic materials synthesis
China General Nuclear Power Corporation (China)
2016-2025
University of Kansas
2015-2024
China Aerospace Science and Technology Corporation
2024
Jinan University
2019-2024
Ningxia University
2007-2024
Guangdong Ocean University
2023-2024
Dalian Polytechnic University
2024
Changchun University of Chinese Medicine
2024
Health First
2022-2023
Xinjiang University
2007-2023
With the exponential growth of cyber-physical systems (CPSs), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls been introduced for generation CPS. However, there lacks a systematic review CPS literature. In particular, heterogeneity components diversity made it difficult to study problem with one generalized model. this paper, we systematize existing research on under unified framework. The framework consists three orthogonal coordinates: 1) from...
In this paper, we present a distributed incremental data aggregation approach, in which is performed at all smart meters involved routing the from source meter to collector unit. With carefully constructed tree, route covers entire local neighborhood or any arbitrary set of designated nodes with minimum overhead. To protect user privacy, homomorphic encryption used secure en route. Therefore, participate aggregation, without seeing intermediate final result. way, our approach supports...
Abstract Chirality describes mirror symmetry breaking in geometric structures or certain physical quantities. The interaction between chiral structure and light provides a rich collection of means for studying the chirality substances. Recently, optical metasurfaces have emerged as planar quasi-planar photonic devices composed subwavelength unit cells, offering distinct appealing responses to circularly polarized with opposite handedness. chiroptical effects can be manifested absorption,...
Federated learning (FL) is promising in supporting collaborative applications that involve large datasets, massively distributed data owners and unreliable network connectivity. To protect privacy, existing FL approaches adopt (k,n)-threshold secret sharing schemes, based on the semi-honest assumption for clients, to enable secure multiparty computation local model update exchange which deals with random client dropouts at cost of increasing size. These therefore they are vulnerable...
In this paper, we present a distributed incremental data aggregation approach, in which is performed at all smart meters involved routing the from source meter to collector unit. With carefully constructed tree, route covers entire local neighbourhood or any arbitrary set of designated nodes with minimum overhead. To protect user privacy, homomorphic encryption used secure enroute. Therefore, participate aggregation, without seeing intermediate final result. way, our approach supports...
In smart grid systems, secure in-network data aggregation approaches have been introduced to efficiently collect data, while preserving privacy of individual meters. Nevertheless, it is also important maintain the integrity aggregate in presence accidental errors and internal/external attacks. To ensure correctness against unintentional errors, we introduce an end-to-end signature scheme, which generates a homomorphic for result. The scheme compatible with schemes that are based on...
Local Transformer-based classification models have recently achieved promising results with relatively low computational costs. However, the effect of aggregating spatial global information local architecture is not clear. This work investigates outcome applying a attention-based module named multi-resolution overlapped attention (MOA) in window-based transformer after each stage. The proposed MOA employs slightly larger and patches key to enable neighborhood pixel transmission, which leads...
Quantitative analysis of complex geological samples was performed by chemometric methods SVR and PLSR coupled with the LIBS technique.
Polarizers have always been an important optical component for engineering and played indispensable part of polarization imaging systems. Metasurface polarizers provide excellent platform to achieve miniaturization, high resolution, low cost Here, we proposed freeform metasurface derived by adjoint-based inverse design a full-Jones matrix with gradient-descent optimization. We designed multiple different filtered states (SOPs), including circular polarizers, elliptical linear that could...
To detect fraudulent TLS server certificates and improve the accountability of certification authorities (CAs), certificate transparency (CT) is proposed to record in publicly-visible logs, from which monitors fetch all watch for suspicious ones. However, if monitors, either domain owners themselves or third-party services, fail return a complete set issued interest, potentially may not be detected then CT framework becomes less reliable. This paper presents first systematic study on...
With ChatGPT under the spotlight, utilizing large language models (LLMs) to assist academic writing has drawn a significant amount of debate in community. In this paper, we aim present comprehensive study detectability ChatGPT-generated content within literature, particularly focusing on abstracts scientific papers, offer holistic support for future development LLM applications and policies academia. Specifically, first GPABench2, benchmarking dataset over 2.8 million comparative samples...
With the extreme popularity of Web and online social networks, a large amount personal information has been made available over Internet. On other hand, advances in retrieval, data mining knowledge discovery technologies have enabled users to efficiently satisfy their needs Internet or from large-scale sets. However, such also help adversaries as web stalkers discover private about victims mass data.
Fuzzing is one of the most effective approaches to finding software flaws. However, applying it microcontroller firmware incurs many challenges. For example, rehosting-based solutions cannot accurately model peripheral behaviors and thus be used fuzz corresponding driver code. In this work, we present $\mu$AFL, a hardware-in-the-loop approach fuzzing firmware. It leverages debugging tools in existing embedded system development construct an AFL-compatible framework. Specifically, use debug...
Due to the component interaction behavior in control process, startup signal of residual heat removal system secondary side (PRS), and fault tree analysis method may have incomplete identification failure model. Therefore, this paper enhances by introducing System Theory Process Analysis (STPA) as a supplement. The STPA is used for qualitative PRS, identifying more comprehensive set potential factors. Subsequently, quantitative performed building mod el identify weaknesses PRS signal. An...
Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining privacy while garnering benefits, especially when are required to be published for secondary use. Most current research protecting centered around de-identification and anonymization, which removes identifiable information from prevent adversary reasoning about patients. However, not only source that adversaries can count on: a large amount people voluntarily...
Abstract With the growing popularity of online social networks, a large amount private or sensitive information has been posted online. In particular, studies show that users sometimes reveal too much unintentionally release regretful messages, especially when they are careless, emotional, unaware privacy risks. As such, there exist great needs to be able identify potentially-sensitive contents, so could alerted with such findings. this paper, we propose context-aware, text-based...