Mi Wen

ORCID: 0000-0003-4328-6507
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Energy Load and Power Forecasting
  • Cloud Data Security Solutions
  • Adversarial Robustness in Machine Learning
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Energy Efficient Wireless Sensor Networks
  • Advanced Neural Network Applications
  • Mobile Ad Hoc Networks
  • Electricity Theft Detection Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Bacillus and Francisella bacterial research
  • Software Testing and Debugging Techniques
  • Blockchain Technology Applications and Security
  • Grey System Theory Applications
  • Advanced Authentication Protocols Security
  • Security and Verification in Computing

Fudan University
2024-2025

Shanghai University of Electric Power
2016-2025

Xidian University
2025

PowerChina (China)
2017-2024

Guangdong University of Finance
2024

State Key Laboratory of Cryptology
2024

Guangzhou Vocational College of Science and Technology
2021-2023

Wuhan Institute of Virology
2021

Chinese Academy of Sciences
2021

University of Chinese Academy of Sciences
2021

As a prominent early instance of the Internet Things in smart grid, advanced metering infrastructure (AMI) provides real-time information from meters to both grid operators and customers, exploiting full potential demand response. However, newly collected without security protection can be maliciously altered result huge loss. In this paper, we propose an energy theft detection scheme with privacy preservation grid. Especially, use combined convolutional neural networks (CNNs) detect...

10.1109/jiot.2019.2903312 article EN IEEE Internet of Things Journal 2019-03-06

Recently, parked vehicles have been shown to be useful deliver content in vehicular ad hoc networks, where the can form social communities share and exchange with other moving road side units (RSUs). However, as it takes resource such bandwidth power for RSUs content, incentive scheme optimal pricing strategy needs studied. Furthermore, because multiple places including vehicles, algorithm determine obtain requested should also discussed. Therefore, this paper, we first propose a framework...

10.1109/tvt.2016.2630300 article EN IEEE Transactions on Vehicular Technology 2016-11-17

With the advancement of mobile crowd sensing systems and vehicular ad hoc networks, human-carried devices (e.g., smartphones, smart navigators, tablets) equipped with a variety sensors (such as GPS, accelerometer, compass) can work together to collect sensory data consequently delivered cloud for processing purposes, which supports wide range promising applications such traffic monitoring, path planning, real-time navigation. To ensure authenticity privacy data, privacy-preserving truth...

10.1109/tvt.2019.2895834 article EN IEEE Transactions on Vehicular Technology 2019-01-29

In smart grids, a major challenge is how to effectively utilize consumers' energy consumption data while preserving security and privacy. this article, we tackle challenging issue focus on theft detection, which very important for grids. Specifically, note that most existing detection schemes are centralized, may be unscalable, more importantly, difficult protect To address issue, propose novel privacy-preserving federated learning framework namely, FedDetect. our framework, consider system...

10.1109/jiot.2021.3110784 article EN IEEE Internet of Things Journal 2021-09-09

Senescence-associated secretory phenotype (SASP) mediates the biological effects of senescent cells on tissue microenvironment and contributes to ageing-associated disease progression. ACSS2 produces acetyl-CoA from acetate epigenetically controls gene expression through histone acetylation under various circumstances. However, whether how regulates cellular senescence remains unclear. Here, we show that pharmacological inhibition deletion Acss2 in mice blunts SASP abrogates pro-tumorigenic...

10.1038/s41467-025-57334-3 article EN cc-by-nc-nd Nature Communications 2025-02-28

This paper tackles a recent challenge in identifying culprit actors, who try to hide confidential payload with steganography, among many innocent actors social media networks. The problem is called steganographer detection and significantly different from the traditional stego that classifies an individual object as cover or stego. To solve over large-scale networks, this proposes method uses high-order joint features clustering ensembles. It employs 250-D calculated matrices of Discrete...

10.1109/tifs.2015.2496910 article EN IEEE Transactions on Information Forensics and Security 2015-11-02

To date, cloud computing has emerged as a primary utility for providing remote data storage services users, since users can thus be relieved from cumbersome document maintenance. Despite of the benefits brought by outsourcing, unexpected breaches raise concerns about confidentiality and privacy. deal with this, straightforward convincing strategy is to encrypt before outsourcing them cloud. However, securely sharing searching over outsourced encrypted turned into challenge due hindrance led...

10.1109/tdsc.2020.2968425 article EN IEEE Transactions on Dependable and Secure Computing 2020-01-21

The emergence of edge computing brings data processing and storage to the vicinity terminal equipment, which can quickly respond user needs reduce computational burden traditional centralized cloud model, resulting in a model computing-assisted computing. In this architecture, how prevent other untrusted entities from leaking privacy has become one most critical concerns. To address concern, many cryptographic schemes supporting protect security sharing IoT devices have been proposed....

10.1109/jiot.2021.3119513 article EN IEEE Internet of Things Journal 2021-10-14

With the development of cloud computing, data sharing has a new effective method, i.e., outsourced to platform. In this case, since may contain privacy, they only allow be accessed by authorized users. Encrypting before outsourcing is commonly used approach, where owners need send corresponding encryption key However, in such approach it difficult use encrypted obsoletes comprehensive search functionalities plaintext keyword search. paper, we leverage secure k-nearest neighbor propose...

10.1109/glocom.2014.7036902 article EN 2014-12-01

Batch steganography refers to a method where user tries hide confidential payload within batch of images from social networks. It is significantly different the traditional laboratory only considers an individual image. To apply in media networks, we are faced with two nontrivial problems: 1) how assign multiple images? and 2) recover hidden if some lost during transmission? We tackle problems by: developing optimal embedding strategy designing special type data decomposition. In former,...

10.1109/access.2018.2841415 article EN cc-by-nc-nd IEEE Access 2018-01-01

Software-Defined Network (SDN) can improve the performance of power communication network and better meet control demand Smart Grid for its centralized management. Unfortunately, SDN controller is vulnerable to many potential attacks. The accurate detection abnormal flow especially important security reliability Grid. Prior works were designed based on traditional machine learning methods, such as Support Vector Machine Naive Bayes. They are simple shallow feature learning, with low accuracy...

10.1155/2020/8850550 article EN cc-by Security and Communication Networks 2020-08-03

To address the challenges of long-tailed classification, researchers have proposed several approaches to reduce model bias, most which assume that classes with few samples are weak classes. However, recent studies shown tail not always hard learn, and bias has been observed on sample-balanced datasets, suggesting existence other factors affect bias. In this work, we first establish a geometric perspective for analyzing fairness then systematically propose series measurements perceptual...

10.1109/tpami.2025.3534435 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2025-01-01

Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises institutions. Data provenance analysis on graphs has emerged as a approach in APT detection. However, previous works have exhibited several shortcomings: (1) requiring attack-containing data priori knowledge of APTs, (2) failing extracting the rich contextual information buried within (3) impracticable due their prohibitive computation overhead...

10.48550/arxiv.2310.09831 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Privacy preservation in federated learning (FL) has received considerable attention and many approaches have been proposed. However, these rendered the uploaded gradients invisible to server, which poses a significant challenge defending against poisoning attacks. In attacks, malicious or compromised participants use poisoned training data forged local updates disrupt process. It is hard for cloud servers defend attacks due invisibility of gradients. To address this issue, we propose...

10.1109/jiot.2024.3365142 article EN IEEE Internet of Things Journal 2024-02-26

Design of cryptographic protocols especially authentication remains error-prone, even for experts in this area. Protocol engineering is a new notion introduced paper protocol design, which derived from software idea. We present and illustrate principles three groups: security requirements analysis principles, detailed design provable principles. Furthermore, we that some the well-known Abadi Needham's are ambiguous. This useful it regards as system engineering, hence can efficiently indicate...

10.1109/snpd.2007.441 article EN 2007-07-01

With the increasing electricity consumption and wide application of renewable energy sources, auction attracts a lot attention due to its economic benefits.Many schemes have been proposed support in smart grid.However, few them can achieve range query, ranked search personalized search.In this paper, we propose an efficient multi-keyword query (EMRQ) scheme, which simultaneously.Based on homomorphic Paillier cryptosystem, use two super-increasing sequences aggregate multidimensional...

10.3837/tiis.2014.11.015 article EN KSII Transactions on Internet and Information Systems 2014-11-30

10.1016/j.commatsci.2003.10.003 article EN Computational Materials Science 2003-12-12
Coming Soon ...