- Database System and Query Optimization.- SAM: A Spatial-aware Learned Index for Disk-Based Multi-dimensional Search.- BIVXDB: A Bottom Information Invert Index to Speed up the Query Performance of LSM-tree.- Dual-contrastive multi-view clustering under the guidance of global similarity and pseudo-label.- A Powerful Local Search Method for Minimum Steiner Tree Problem.- Federated and Privacy-Preserving Learning.- FedOCD: A One-Shot Federated Framework for Heterogeneous Cross-Domain Recommendation.- Efficient Updateable Private Set Intersection on Outsourced Datasets.
- Client Evaluation and Revision in Federated Learning: Towards Defending Free-Riders and Promoting Fairness.- A Secure Dynamic Incentive Scheme for Federated Learning.- A Data Synthesis Approach Based on Local Differential Privacy.- Byzantine-Robust Aggregation for Federated Learning with Reinforcement Learning.- Differential Privacy with Data Removal for Online Happiness Assessment.- EPCQ: Efficient Privacy-preserving Contact Query Processing over Trajectory Data in Cloud.- Parallel Secure Inference for Multiple Models based on CKKS.- PrivRBFN: Building Privacy-Preserving Radial Basis Function Networks Based on Federated Learning.
- Robust Federated Learning with Realistic Corruption.- Network, Blockchain and Edge computing.- BTQoS: A Tenant Relationship-Aware QoS Framework for Multi-Tenant Distributed Storage System.- ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain.- MTEC: A Multi-tier Blockchain Storage Framework using Erasure Coding for IoT Application.- Maintaining Data Freshness in Multi-channel Multi-hop Wireless Networks.- Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol based on Game Theory in DApps.- KTSketch: Finding k-persistent t-spread Flows in High-speed Networks.
- A Multi-agent Service Migration Algorithm for Mobile Edge Computing with Diversified Services.- Dynamic Computation Scheduling for Hybrid Energy Mobile Edge Computing Networks.- Anomaly Detection and Security.- Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features.- Detecting Camouflaged Social Bots through Multi-level Aggregation and Information Encoding.- Deep Sarcasm Detection with Sememe and Syntax Knowledge.- Enhancing Few-Shot Multi-Modal Fake News Detection through Adaptive Fusion.- AGAE: Unsupervised Anomaly Detection for Encrypted Malicious Traffic.
- ColBetect: A Contrastive Learning Framework Featuring Dual Negative Samples for Anomaly Behavior Detection.- Magnitude-Contrastive Network for Unsupervised Graph Anomaly Detection.- Substructure-Guided Graph-level Anomaly with Attention-Aware Aggregation.