2025
FLUE: Streamlined Uncertainty Estimation for Large Language Models.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models.
IEEE Trans. Inf. Forensics Secur., 2024
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident.
CoRR, 2024
Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
2023
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services.
IEEE Trans. Dependable Secur. Comput., 2023
Characterizing Coin-Based Voting Governance in DPoS Blockchains.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Liquid Democracy in DPoS Blockchains.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets.
IEEE Trans. Dependable Secur. Comput., 2022
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022
Privacy-Preserving Vertical Federated Learning.
Proceedings of the Federated Learning, 2022
Protecting Against Data Leakage in Federated Learning: What Approach Should You Choose?
Proceedings of the Federated Learning, 2022
2021
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication.
IEEE Trans. Dependable Secur. Comput., 2021
Privacy-Preserving Machine Learning: Methods, Challenges and Directions.
CoRR, 2021
T3AB: Transparent and Trustworthy Third-party Authority using Blockchain.
CoRR, 2021
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
2020
Trustworthy and Transparent Third-party Authority.
ACM Trans. Internet Techn., 2020
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Proceedings of the Second IEEE International Conference on Trust, 2020
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
2019
Scalable and Privacy-Preserving Design of On/Off-Chain Smart Contracts.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019
CryptoNN: Training Neural Networks over Encrypted Data.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019
2018
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Mobile app adoption in different life stages: An empirical analysis.
Pervasive Mob. Comput., 2017
Mobile recommendations based on interest prediction from consumer's installed apps-insights from a large-scale field study.
Inf. Syst., 2017
2016
Understanding the impact of personality traits on mobile app adoption - Insights from a large-scale field study.
Comput. Hum. Behav., 2016
Enabling Attribute Based Encryption as an Internet Service.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
A lightweight user tracking method for app providers.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Individual Differences and Mobile Service Adoption: An Empirical Analysis.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016
An Integrated Privacy Preserving Attribute Based Access Control Framework.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
A CP-ABE scheme with hidden policy and its application in cloud computing.
Int. J. Cloud Comput., 2015
Reality-Mining with Smartphones: Detecting and Predicting Life Events based on App Installation Behavior.
Proceedings of the International Conference on Information Systems, 2015
Towards Understanding the Impact of Personality Traits on Mobile App Adoption - A Scalable Approach.
Proceedings of the 23rd European Conference on Information Systems, 2015
2014
Measuring and Mitigating Product Data Inaccuracy in Online Retailing.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014
Product as a Service: Enabling Physical Products as Service End-Points.
Proceedings of the International Conference on Information Systems, 2014
Design of a Health Information System Enhancing the Performance of Obesity Expert and children Teams.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 22st European Conference on Information Systems, 2014
Tell Me What to Eat - Design and Evaluation of a Mobile Companion Helping Children and Their Parents to Plan Nutrition Intake.
Proceedings of the Ambient Intelligence, European Conference, 2014
2013
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control.
Proceedings of the SECRYPT 2013, 2013
Self-contained Data Protection Scheme Based on CP-ABE.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013