Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyJanuary 2025JUST ACCEPTED
Can Graph Neural Networks be Adequately Explained? A Survey
To address the barrier caused by the black-box nature of Deep Learning (DL) for practical deployment, eXplainable Artificial Intelligence (XAI) has emerged and is developing rapidly. While significant progress has been made in explanation techniques for ...
- research-articleJanuary 2025
Mobile multitasking in learning: A meta-analysis of effects of mobilephone distraction on young adults’ immediate recall
AbstractMobilephone distraction in learning is a widely observed phenomenon due to dividing and switching attention between learning activities (e.g., attending lectures and reading textbooks) and off-task activities (e.g., texting and chatting). In the ...
Highlights- Mobilephone distraction in learning is widely observed phenomenon.
- Evidence from 27 experiments is synthesized in a meta-analysis.
- Mobilephone distraction causes a negative medium-sized effect on learning memory.
- It also harms ...
- surveyDecember 2024
Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review
ACM Computing Surveys (CSUR), Volume 57, Issue 4Article No.: 87, Pages 1–35https://doi.org/10.1145/3704725Since the emergence of security concerns in artificial intelligence (AI), there has been significant attention devoted to the examination of backdoor attacks. Attackers can utilize backdoor attacks to manipulate model predictions, leading to significant ...
- review-articleJanuary 2025
A survey on fuzz testing technologies for industrial control protocols
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104020AbstractThe development of the industrial Internet of Things enables industrial control systems to become inter-networked and inter-connected, making them intelligent with high productivity. However, these systems are exposed to external environments and ...
- surveyNovember 2024
Backdoor Attacks against Voice Recognition Systems: A Survey
ACM Computing Surveys (CSUR), Volume 57, Issue 3Article No.: 78, Pages 1–35https://doi.org/10.1145/3701985Voice Recognition Systems (VRSs) employ deep learning for speech recognition and speaker recognition. They have been widely deployed in various real-world applications, from intelligent voice assistance to telephony surveillance and biometric ...
-
- surveyOctober 2024
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities
ACM Computing Surveys (CSUR), Volume 57, Issue 2Article No.: 36, Pages 1–43https://doi.org/10.1145/3696450With the rapid development and large-scale popularity of program software, modern society increasingly relies on software systems. However, the problems exposed by software have also come to the fore. The software bug has become an important factor ...
- research-articleJuly 2024
Mediation of social support in the relationship between mobile phone dependence and childhood physical maltreatment among left-behind and returned migrant middle school students: A multi-group structural equation modeling
AbstractMobile phone dependence (MPD) is a form of addictive behavior that poses a threat to the physical and mental health of adolescents. MPD is closely linked to individual characteristics, as well as family and social environments. However, existing ...
Highlights- Childhood physical maltreatment has a positive effect on middle school students' MPD.
- Social support mediates the positive relationship between childhood physical maltreatment and MPD.
- The effects of childhood physical maltreatment ...
- research-articleJuly 2024
AI-Based Physical Layer Key Generation in Wireless Communications: Current Advances, Open Challenges, and Future Directions
IEEE Wireless Communications (IEEEWIRCOM), Volume 31, Issue 5Pages 182–191https://doi.org/10.1109/MWC.013.2300448Physical layer secret key generation (PHYSKG) is a promising technology to provide lightweight and information-theoretically secure key sharing. It has been widely studied in wireless communications and the Internet of Things (IoT). Yet, this technology ...
- research-articleJune 2024
Physical Layer Authentication in Backscatter Communication: A Review
IEEE Wireless Communications (IEEEWIRCOM), Volume 31, Issue 3Pages 264–270https://doi.org/10.1109/MWC.012.2200364Backscatter communication (BC) has been introduced as a cutting-edge technology due to low cost and ultra-low-power consumption. However, its openness and broadcast nature bring severe security threats and vulnerabilities to BC systems. Physical layer ...
- research-articleMarch 2024
Centric graph regularized log-norm sparse non-negative matrix factorization for multi-view clustering
AbstractMulti-view non-negative matrix factorization (NMF) provides a reliable method to analyze multiple views of data for low-dimensional representation. A variety of multi-view learning methods have been developed in recent years, demonstrating ...
Highlights- The proposed method can learn hidden representations within multi-view data.
- The centric graph regularization captures more information to strengthen spatial structure.
- The pairwise co-regularization preserves local geometry and ...
- research-articleJune 2024
Federated distillation and blockchain empowered secure knowledge sharing for Internet of medical Things
Information Sciences: an International Journal (ISCI), Volume 662, Issue Chttps://doi.org/10.1016/j.ins.2024.120217Highlights- A knowledge sharing framework for collaborative learning in distributed system.
- A P2P federated distillation mechanism for decentralized federated learning.
- A reinforcement learning scheme for blockchain enhancement.
With the development of Internet of Things (IoT) and Artificial Intelligence (AI) technologies, smart services have penetrated into every aspect of our daily lives, including the medical treatment and healthcare fields. However, due to security ...
- research-articleFebruary 2024
Exploiting Interference With an Intelligent Reflecting Surface to Enhance Data Transmission
IEEE Transactions on Wireless Communications (TWC), Volume 23, Issue 8_Part_2Pages 9776–9792https://doi.org/10.1109/TWC.2024.3366229With the increasing number of wireless devices connecting to networks and sharing spectrum resources, interference has become a major obstacle to improving network performance. Existing interference management (IM) methods treat interference as a negative ...
- research-articleJanuary 2024
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 5Pages 4433–4450https://doi.org/10.1109/TDSC.2024.3353548Trust evaluation assesses trust relationships between entities and facilitates decision-making. Machine Learning (ML) shows great potential for trust evaluation owing to its learning capabilities. In recent years, Graph Neural Networks (GNNs), as a new ML ...
- research-articleJanuary 2024
SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 5Pages 4404–4417https://doi.org/10.1109/TDSC.2024.3353541The prosperity of blockchain technique has spawned numerous types of cryptocurrencies. However, a secure and privacy-preserving cryptocurrency exchange protocol that can support atomicity and unlinkability, and effectively resist various attacks is still ...
- research-articleOctober 2024
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 9452–9466https://doi.org/10.1109/TIFS.2024.3473322Backscatter communication (BC) offers a promising power-efficient communication paradigm for wireless devices with constrained energy resources. However, the innate openness and broadcast characteristics of BC raise considerable security concerns. To ...
- research-articleSeptember 2024
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 9188–9203https://doi.org/10.1109/TIFS.2024.3468902With the rapid development of wireless communication technologies, interference management (IM) and security/privacy in data transmission have become critically important. On one hand, due to the broadcast nature of wireless medium, the interference ...
- research-articleDecember 2023
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 2470–2486https://doi.org/10.1109/TIFS.2023.3345650Backscatter communication (BC) is an emerging radio technology for achieving sustainable wireless communications. However, the literature still lacks an effective secret group key generation scheme for safeguarding communications among multiple resource-...
- research-articleNovember 2023
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 3817–3833https://doi.org/10.1109/TDSC.2023.3336977Federated Learning (FL) is widely used in various industries because it effectively addresses the predicament of isolated data island. However, eavesdroppers is capable of inferring user privacy from the gradients or models transmitted in FL. Homomorphic ...
- research-articleNovember 2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 12Pages 5279–5294https://doi.org/10.1109/TSE.2023.3332732Software vulnerabilities are easily propagated through code reuses, which pose dire threats to software system security. Automatic patch presence test offers an effective way to detect whether vulnerabilities have been patched, which is significant for ...
- research-articleOctober 2023
Digital Twin Enhanced Federated Reinforcement Learning With Lightweight Knowledge Distillation in Mobile Networks
- Xiaokang Zhou,
- Xuzhe Zheng,
- Xuesong Cui,
- Jiashuai Shi,
- Wei Liang,
- Zheng Yan,
- Laurence T. Yang,
- Shohei Shimizu,
- Kevin I-Kai Wang
IEEE Journal on Selected Areas in Communications (JSAC), Volume 41, Issue 10Pages 3191–3211https://doi.org/10.1109/JSAC.2023.3310046The high-speed mobile networks offer great potentials to many future intelligent applications, such as autonomous vehicles in smart transportation systems. Such networks provide the possibility to interconnect mobile devices to achieve fast knowledge ...