User-controlled Secure Data Sharing and Analytics with Blockchain and Trusted Computing Technologies
Project: Research
Research Output
- 2024
- Published
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning
Liu, Y., Wang, C. & Yuan, X., Aug 2024, KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery (ACM), p. 1944-1955 12 p.Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 1 - Published
Machine Unlearning: Solutions and Challenges
Xu, J., Wu, Z., Wang, C. & Jia, X., Jun 2024, In: IEEE Transactions on Emerging Topics in Computational Intelligence. 8, 3, p. 2150-2168 19 p.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 5 - Published
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service
Hua, Z., Yao, Y., Song, M., Zheng, Y., Zhang, Y. & Wang, C., May 2024, In: IEEE Transactions on Services Computing. 17, 3, p. 821-835Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - Published
X-Shard: Optimistic Cross-Shard Transaction Processing for Sharding-Based Blockchains
Xu, J., Ming, Y., Wu, Z., Wang, C. & Jia, X., Apr 2024, In: IEEE Transactions on Parallel and Distributed Systems. 35, 4, p. 548-559Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - Published
Cross-user Leakage Mitigation for Authorized Multi-user Encrypted Data Sharing
Wang, M., Chen, Z., Miao, Y., Huang, H., Wang, C. & Jia, X., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 1213-1226Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - Published
DWare: Cost-Efficient Decentralized Storage with Adaptive Middleware
Du, Y., Zhou, A. & Wang, C., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 8529-8543Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
- Published
eGrass: An Encrypted Attributed Subgraph Matching System with Malicious Security
Wang, S., Zheng, Y., Jia, X. & Wang, C., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 5999-6014Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
- Published
FairFed: Improving Fairness and Efficiency of Contribution Evaluation in Federated Learning via Cooperative Shapley Value
Liu, Y., Chang, S., Liu, Y., Li, B. & Wang, C., 2024, IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers, Inc., p. 621-630 (Proceedings - IEEE INFOCOM).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- Published
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting
Lian, R., Ming, Y., Cai, C., Zheng, Y., Wang, C. & Jia, X., 2024, Computer Security – ESORICS 2024 - 29th European Symposium on Research in Computer Security, Proceedings. Garcia-Alfaro, J., Kozik, R., Choraś, M. & Katsikas, S. (eds.). Springer, Cham, Vol. Part II. p. 247-267 (Lecture Notes in Computer Science; vol. 14983).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- Published
Proof of Unlearning: Definitions and Instantiation
Weng, J., Yao, S., Du, Y., Huang, J., Weng, J. & Wang, C., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 3309-3323Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 2 - Published
ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation
Zhou, Z. & Wang, C., 2024, In: IEEE Open Journal of the Computer Society. 5, p. 95-106Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
- Published
Toward Evaluating Robustness of Reinforcement Learning with Adversarial Policy
Zheng, X., Ma, X., Wang, S., Wang, X., Shen, C. & Wang, C., 2024, Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2024). Institute of Electrical and Electronics Engineers, Inc., p. 288-301 (Proceedings - Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- Published
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers
Guo, Y., Zhao, Y., Hou, S., Wang, C. & Jia, X., 2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 708-721Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - 2023
- Online published
Toward Quality-aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond
Xu, L., Chen, J., Chang, S., Wang, C. & Li, B., 7 Dec 2023, (Online published) In: IEEE Network.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
- Published
Differential privacy in deep learning: Privacy and beyond
Wang, Y., Wang, Q., Zhao, L. & Wang, C., Nov 2023, In: Future Generation Computer Systems. 148, p. 408-424Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 11 - Published
Poster: Towards Lightweight TEE-Assisted MPC
Dong, W. & Wang, C., Nov 2023, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3609-3611Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- Published
AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication
Xu, J., Xie, Q., Peng, S., Wang, C. & Jia, X., Jun 2023, In: IEEE Transactions on Parallel and Distributed Systems. 34, 6, 10102556.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 9 - Published
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption
Xu, L., Zheng, L., Xu, C., Yuan, X. & Wang, C., 2023, CCS ’23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, NY: Association for Computing Machinery, p. 3003-3017 (CCS - Proceedings of the ACM SIGSAC Conference on Computer and Communications Security).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 7 - Published
Practical Anti-Fuzzing Techniques With Performance Optimization
ZHOU, Z. & WANG, C., 2023, In: IEEE Open Journal of the Computer Society. 4, p. 206-217Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - Published
Where Are The Dots: Hardening Face Authentication on Smartphones with Unforgeable Eye Movement Patterns
Zheng, Z., Wang, Q., Wang, C., Zhou, M., Zhao, Y., Li, Q. & Shen, C., 2023, In: IEEE Transactions on Information Forensics and Security. 18, p. 1295-1308Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 5