Publications
2023
- MobiCom
- ICMLFed-cbs: A heterogeneity-aware client sampling mechanism for federated learning via class-imbalance reductionIn International Conference on Machine Learning, 2023
2022
- DACTowards collaborative intelligence: Routability estimation based on decentralized private dataIn Proceedings of the 59th ACM/IEEE Design Automation Conference, 2022
- TECSToward Efficient and Adaptive Design of Video Detection System with Deep Neural NetworksACM Transactions on Embedded Computing Systems (TECS), 2022
- ISQEDAn Audio Frequency Unfolding Framework for Ultra-Low Sampling Rate SensorsIn 2022 23rd International Symposium on Quality Electronic Design (ISQED), 2022
- WWWPowering Multi-Task Federated Learning with Competitive GPU Resource SharingIn Companion Proceedings of the Web Conference 2022, 2022
- Ph.D. DissertationEnable Intelligence on Billion Devices with Deep LearningDuke University, 2022
- DistributedMLRethinking normalization methods in federated learningIn Proceedings of the 3rd International Workshop on Distributed Machine Learning, 2022
- CICNext Generation Federated Learning for Edge Devices: An OverviewIn 2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC), 2022
2021
- HPCCReinforcement learning-based black-box evasion attacks to link prediction in dynamic graphsIn 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), 2021
- EWSNHermes: Decentralized Dynamic Spectrum Access System for Massive Devices Deployment in 5GIn Proceedings of the 2021 International Conference on Embedded Wireless Systems and Networks, 2021
- TMCPrivacyeye: A privacy-preserving and computationally efficient deep learning-based mobile video analytics systemIEEE Transactions on Mobile Computing, 2021
- TCPSTPrune: Efficient transformer pruning for mobile devicesACM Transactions on Cyber-Physical Systems, 2021
- CVPRSoteria: Provable defense against privacy leakage in federated learning from representation perspectiveIn Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2021
- ACM MMTowards adversarial patch analysis and certified defense against crowd countingIn Proceedings of the 29th ACM International Conference on Multimedia, 2021
- NeurIPSFl-wbc: Enhancing robustness against model poisoning attacks in federated learning from a client perspectiveAdvances in Neural Information Processing Systems, 2021
- ICCADFedSwap: A Federated Learning based 5G Decentralized Dynamic Spectrum Access SystemIn 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2021
- TCCPrivacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear ProgrammingIEEE Transactions on Cloud Computing, 2021
- CogMIAI-Powered IoT System at the Edge (invited paper)In 2021 IEEE Third International Conference on Cognitive Machine Intelligence (CogMI), 2021
2020
- T-CyberneticsMassive maritime path planning: A contextual online learning approachIEEE Transactions on Cybernetics, 2020
- General access control guidance for cloud systemsNIST Special Publication, 2020
- CVPRLearning low-rank deep neural networks via singular vector orthogonality regularization and singular value sparsificationIn Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, 2020
- SecurityThe QoS and privacy trade-off of adversarial deep learning: an evolutionary game approachComputers & Security, 2020
- MobiHocMvstylizer: An efficient edge-assisted video photorealistic style transfer system for mobile phonesIn Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2020
- J-IoTApproximate to be great: Communication efficient and privacy-preserving large-scale distributed deep learning in Internet of ThingsIEEE Internet of Things Journal, 2020
- ArxivEfficient evasion attacks to graph neural networks via influence functionarXiv preprint arXiv:2009.00203, 2020
- Book ChapterTask-agnostic privacy-preserving representation learning via federated learningFederated Learning: Privacy and Incentive, 2020
- SecureCommAutomated bystander detection and anonymization in mobile photographyIn Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I 16, 2020
- GLOBECOMA framework to preserve user privacy for machine learning as a serviceIn GLOBECOM 2020-2020 IEEE Global Communications Conference, 2020
- TNSEJoint traffic control and multi-channel reassignment for core backbone network in SDN-IoT: a multi-agent deep reinforcement learning approachIEEE Transactions on Network Science and Engineering, 2020
- ArxivEvasion attacks to graph neural networks via influence functionarXiv preprint arXiv:2009.00203, 2020
2019
- INFOCOMHideme: Privacy-preserving photo sharing on social networksIn IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2019
- DACMobieye: An efficient cloud-based video detection system for real-time mobile applicationsIn Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2018
- Privacy-Preserving Photo Taking and Accessing for Mobile PhonesUniversity of Arkansas, 2018
- SecureCommPrivacy-preserving outsourcing of large-scale nonlinear programming to the cloudIn Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, 2018
- SecureCommPrivacy-preserving multiparty learning for logistic regressionIn Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, 2018
- SecureCommPolitecamera: Respecting strangers’ privacy in mobile photographingIn Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, 2018
2017
- PerComSecureHouse: A home security system based on smartphone sensorsIn 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2017
- CICAccess control for distributed processing systems: Use cases and general considerationsIn 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), 2017
2016
- SECONPrivacyCamera: Cooperative privacy-aware photographing with mobile phonesIn Sensing, Communication, and Networking (SECON), 2016 13th Annual IEEE International Conference on, 2016
2015
- MILCOMEvaluating the capability and performance of access control policy verification toolsIn MILCOM 2015-2015 IEEE Military Communications Conference, 2015