- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- Smart Grid Security and Resilience
- Advanced Malware Detection Techniques
- Energy Load and Power Forecasting
- Cloud Data Security Solutions
- Adversarial Robustness in Machine Learning
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Energy Efficient Wireless Sensor Networks
- Advanced Neural Network Applications
- Mobile Ad Hoc Networks
- Electricity Theft Detection Techniques
- Mobile Crowdsensing and Crowdsourcing
- Bacillus and Francisella bacterial research
- Software Testing and Debugging Techniques
- Blockchain Technology Applications and Security
- Grey System Theory Applications
- Advanced Authentication Protocols Security
- Security and Verification in Computing
Fudan University
2024-2025
Shanghai University of Electric Power
2016-2025
Xidian University
2025
PowerChina (China)
2017-2024
Guangdong University of Finance
2024
State Key Laboratory of Cryptology
2024
Guangzhou Vocational College of Science and Technology
2021-2023
Wuhan Institute of Virology
2021
Chinese Academy of Sciences
2021
University of Chinese Academy of Sciences
2021
As a prominent early instance of the Internet Things in smart grid, advanced metering infrastructure (AMI) provides real-time information from meters to both grid operators and customers, exploiting full potential demand response. However, newly collected without security protection can be maliciously altered result huge loss. In this paper, we propose an energy theft detection scheme with privacy preservation grid. Especially, use combined convolutional neural networks (CNNs) detect...
Recently, parked vehicles have been shown to be useful deliver content in vehicular ad hoc networks, where the can form social communities share and exchange with other moving road side units (RSUs). However, as it takes resource such bandwidth power for RSUs content, incentive scheme optimal pricing strategy needs studied. Furthermore, because multiple places including vehicles, algorithm determine obtain requested should also discussed. Therefore, this paper, we first propose a framework...
With the advancement of mobile crowd sensing systems and vehicular ad hoc networks, human-carried devices (e.g., smartphones, smart navigators, tablets) equipped with a variety sensors (such as GPS, accelerometer, compass) can work together to collect sensory data consequently delivered cloud for processing purposes, which supports wide range promising applications such traffic monitoring, path planning, real-time navigation. To ensure authenticity privacy data, privacy-preserving truth...
In smart grids, a major challenge is how to effectively utilize consumers' energy consumption data while preserving security and privacy. this article, we tackle challenging issue focus on theft detection, which very important for grids. Specifically, note that most existing detection schemes are centralized, may be unscalable, more importantly, difficult protect To address issue, propose novel privacy-preserving federated learning framework namely, FedDetect. our framework, consider system...
Senescence-associated secretory phenotype (SASP) mediates the biological effects of senescent cells on tissue microenvironment and contributes to ageing-associated disease progression. ACSS2 produces acetyl-CoA from acetate epigenetically controls gene expression through histone acetylation under various circumstances. However, whether how regulates cellular senescence remains unclear. Here, we show that pharmacological inhibition deletion Acss2 in mice blunts SASP abrogates pro-tumorigenic...
This paper tackles a recent challenge in identifying culprit actors, who try to hide confidential payload with steganography, among many innocent actors social media networks. The problem is called steganographer detection and significantly different from the traditional stego that classifies an individual object as cover or stego. To solve over large-scale networks, this proposes method uses high-order joint features clustering ensembles. It employs 250-D calculated matrices of Discrete...
To date, cloud computing has emerged as a primary utility for providing remote data storage services users, since users can thus be relieved from cumbersome document maintenance. Despite of the benefits brought by outsourcing, unexpected breaches raise concerns about confidentiality and privacy. deal with this, straightforward convincing strategy is to encrypt before outsourcing them cloud. However, securely sharing searching over outsourced encrypted turned into challenge due hindrance led...
The emergence of edge computing brings data processing and storage to the vicinity terminal equipment, which can quickly respond user needs reduce computational burden traditional centralized cloud model, resulting in a model computing-assisted computing. In this architecture, how prevent other untrusted entities from leaking privacy has become one most critical concerns. To address concern, many cryptographic schemes supporting protect security sharing IoT devices have been proposed....
With the development of cloud computing, data sharing has a new effective method, i.e., outsourced to platform. In this case, since may contain privacy, they only allow be accessed by authorized users. Encrypting before outsourcing is commonly used approach, where owners need send corresponding encryption key However, in such approach it difficult use encrypted obsoletes comprehensive search functionalities plaintext keyword search. paper, we leverage secure k-nearest neighbor propose...
Batch steganography refers to a method where user tries hide confidential payload within batch of images from social networks. It is significantly different the traditional laboratory only considers an individual image. To apply in media networks, we are faced with two nontrivial problems: 1) how assign multiple images? and 2) recover hidden if some lost during transmission? We tackle problems by: developing optimal embedding strategy designing special type data decomposition. In former,...
Software-Defined Network (SDN) can improve the performance of power communication network and better meet control demand Smart Grid for its centralized management. Unfortunately, SDN controller is vulnerable to many potential attacks. The accurate detection abnormal flow especially important security reliability Grid. Prior works were designed based on traditional machine learning methods, such as Support Vector Machine Naive Bayes. They are simple shallow feature learning, with low accuracy...
To address the challenges of long-tailed classification, researchers have proposed several approaches to reduce model bias, most which assume that classes with few samples are weak classes. However, recent studies shown tail not always hard learn, and bias has been observed on sample-balanced datasets, suggesting existence other factors affect bias. In this work, we first establish a geometric perspective for analyzing fairness then systematically propose series measurements perceptual...
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises institutions. Data provenance analysis on graphs has emerged as a approach in APT detection. However, previous works have exhibited several shortcomings: (1) requiring attack-containing data priori knowledge of APTs, (2) failing extracting the rich contextual information buried within (3) impracticable due their prohibitive computation overhead...
Privacy preservation in federated learning (FL) has received considerable attention and many approaches have been proposed. However, these rendered the uploaded gradients invisible to server, which poses a significant challenge defending against poisoning attacks. In attacks, malicious or compromised participants use poisoned training data forged local updates disrupt process. It is hard for cloud servers defend attacks due invisibility of gradients. To address this issue, we propose...
Design of cryptographic protocols especially authentication remains error-prone, even for experts in this area. Protocol engineering is a new notion introduced paper protocol design, which derived from software idea. We present and illustrate principles three groups: security requirements analysis principles, detailed design provable principles. Furthermore, we that some the well-known Abadi Needham's are ambiguous. This useful it regards as system engineering, hence can efficiently indicate...
With the increasing electricity consumption and wide application of renewable energy sources, auction attracts a lot attention due to its economic benefits.Many schemes have been proposed support in smart grid.However, few them can achieve range query, ranked search personalized search.In this paper, we propose an efficient multi-keyword query (EMRQ) scheme, which simultaneously.Based on homomorphic Paillier cryptosystem, use two super-increasing sequences aggregate multidimensional...