User-controlled Secure Data Sharing and Analytics with Blockchain and Trusted Computing Technologies

Project: Research

Research Output

  1. 2024
  2. Published

    BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning

    Liu, Y., Wang, C. & Yuan, X., Aug 2024, KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery (ACM), p. 1944-1955 12 p.

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 1
    Check@CityULib
  3. Published

    Machine Unlearning: Solutions and Challenges

    Xu, J., Wu, Z., Wang, C. & Jia, X., Jun 2024, In: IEEE Transactions on Emerging Topics in Computational Intelligence. 8, 3, p. 2150-2168 19 p.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 5
    Check@CityULib
  4. Published

    Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service

    Hua, Z., Yao, Y., Song, M., Zheng, Y., Zhang, Y. & Wang, C., May 2024, In: IEEE Transactions on Services Computing. 17, 3, p. 821-835

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 1
    Check@CityULib
  5. Published

    X-Shard: Optimistic Cross-Shard Transaction Processing for Sharding-Based Blockchains

    Xu, J., Ming, Y., Wu, Z., Wang, C. & Jia, X., Apr 2024, In: IEEE Transactions on Parallel and Distributed Systems. 35, 4, p. 548-559

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 1
    Check@CityULib
  6. Published

    Cross-user Leakage Mitigation for Authorized Multi-user Encrypted Data Sharing

    Wang, M., Chen, Z., Miao, Y., Huang, H., Wang, C. & Jia, X., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 1213-1226

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 1
    Check@CityULib
  7. Published

    DWare: Cost-Efficient Decentralized Storage with Adaptive Middleware

    Du, Y., Zhou, A. & Wang, C., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 8529-8543

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  8. Published

    eGrass: An Encrypted Attributed Subgraph Matching System with Malicious Security

    Wang, S., Zheng, Y., Jia, X. & Wang, C., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 5999-6014

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  9. Published

    FairFed: Improving Fairness and Efficiency of Contribution Evaluation in Federated Learning via Cooperative Shapley Value

    Liu, Y., Chang, S., Liu, Y., Li, B. & Wang, C., 2024, IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers, Inc., p. 621-630 (Proceedings - IEEE INFOCOM).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  10. Published

    Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting

    Lian, R., Ming, Y., Cai, C., Zheng, Y., Wang, C. & Jia, X., 2024, Computer Security – ESORICS 2024 - 29th European Symposium on Research in Computer Security, Proceedings. Garcia-Alfaro, J., Kozik, R., Choraś, M. & Katsikas, S. (eds.). Springer, Cham, Vol. Part II. p. 247-267 (Lecture Notes in Computer Science; vol. 14983).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  11. Published

    Proof of Unlearning: Definitions and Instantiation

    Weng, J., Yao, S., Du, Y., Huang, J., Weng, J. & Wang, C., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 3309-3323

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 2
    Check@CityULib
  12. Published

    ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation

    Zhou, Z. & Wang, C., 2024, In: IEEE Open Journal of the Computer Society. 5, p. 95-106

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  13. Published

    Toward Evaluating Robustness of Reinforcement Learning with Adversarial Policy

    Zheng, X., Ma, X., Wang, S., Wang, X., Shen, C. & Wang, C., 2024, Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2024). Institute of Electrical and Electronics Engineers, Inc., p. 288-301 (Proceedings - Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  14. Published

    Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers

    Guo, Y., Zhao, Y., Hou, S., Wang, C. & Jia, X., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 708-721

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 1
    Check@CityULib
  15. 2023
  16. Online published

    Toward Quality-aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond

    Xu, L., Chen, J., Chang, S., Wang, C. & Li, B., 7 Dec 2023, (Online published) In: IEEE Network.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  17. Published

    Differential privacy in deep learning: Privacy and beyond

    Wang, Y., Wang, Q., Zhao, L. & Wang, C., Nov 2023, In: Future Generation Computer Systems. 148, p. 408-424

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 11
    Check@CityULib
  18. Published

    Poster: Towards Lightweight TEE-Assisted MPC

    Dong, W. & Wang, C., Nov 2023, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3609-3611

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  19. Published

    AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication

    Xu, J., Xie, Q., Peng, S., Wang, C. & Jia, X., Jun 2023, In: IEEE Transactions on Parallel and Distributed Systems. 34, 6, 10102556.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 9
    Check@CityULib
  20. Published

    Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption

    Xu, L., Zheng, L., Xu, C., Yuan, X. & Wang, C., 2023, CCS ’23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, NY: Association for Computing Machinery, p. 3003-3017 (CCS - Proceedings of the ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 7
    Check@CityULib
  21. Published

    Practical Anti-Fuzzing Techniques With Performance Optimization

    ZHOU, Z. & WANG, C., 2023, In: IEEE Open Journal of the Computer Society. 4, p. 206-217

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 1
    Check@CityULib
  22. Published

    Where Are The Dots: Hardening Face Authentication on Smartphones with Unforgeable Eye Movement Patterns

    Zheng, Z., Wang, Q., Wang, C., Zhou, M., Zhao, Y., Li, Q. & Shen, C., 2023, In: IEEE Transactions on Information Forensics and Security. 18, p. 1295-1308

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 5
    Check@CityULib