Jianming Zhu - IEEE Xplore Author Profile

Showing 1-25 of 40 results

Results

“Law is code” is pivotal for advancing the intelligent judiciary. Existing works that transform a legal contract (LC) into a smart contract (SC) largely depend on pre-defined mapping rules that necessitate specialized programming skills, suffering from challenges such as reduced dynamic adaptability and high labor costs. In this article, we propose BPMN-LLM, the first work that transforms BPMN mod...Show More
With the popularization of artificial intelligence-generated content (AIGC), the explosion of end users is spurring an unprecedented diversity in preferences. To cope with this challenge, the AIGC paradigm is shifting from cloud-driven pre-trained large models to edge-driven personalized customization models. The former are large-scale models with more than 100 billion parameters trained based on ...Show More
Federated learning has been used to collaboratively train a decentralized model without sharing confidential model records. However, many security risks are involved in this regard, and scholars have conducted numerous studies on related topics. Fan et al. proposed a scheme to achieve model unforgeability and confidentiality in blockchained federated learning (lightweight privacy blockchained fede...Show More
As a kind of distributed machine learning, federated learning allows each party to upload local model parameters instead of sensitive data to train a more accurate global model collaboratively. However, since it turns out that the original training data can be inferred by intercepting and analyzing the passed model parameters, local differential privacy is introduced into the federated learning to...Show More
The Metaverse is established by twining a practical world in a virtual form, where users could become creators of learning-based user-generated content (UGC). However, the digital assets are not owned by the creators, which deviates from the decentralized Metaverse based on blockchain in Web 3.0. The contribution incentive design for UGC still faces the challenges of ownership verification and pri...Show More
Federated learning (FL) is essentially a distributed machine learning paradigm that enables the joint training of a global model by aggregating gradients from participating clients without exchanging raw data. However, a malicious aggregation server may deliberately return designed results without any operation to save computation overhead, or even launch privacy inference attacks using crafted gr...Show More
Searchable encryption (SE) has emerged as a cryptographic primitive that allows data users to search on encrypted data. Most existing SE schemes usually delegate search operations to an intermediary such as a cloud server, which would inevitably result in single-point failure, privacy leakage, and even untrustworthy results. Several blockchain-based SE schemes have been proposed to alleviate these...Show More
Deep learning has been successfully applied to infrared and visible image fusion due to its powerful ability of feature representation. Existing most deep learning-based infrared and visible image fusion methods mainly utilize pure convolution model or pure transformer model, which leads to that the fused image cannot preserve long-range dependences (global context) and local features simultaneous...Show More
Worker selection in crowdsensing plays an important role in the quality control of sensing services. The majority of existing studies on worker selection were largely dependent on a trusted centralized server, which might suffer from single point of failure, the lack of transparency and so on. Some works recently proposed blockchain-based crowdsensing, which utilized reputation values stored on bl...Show More
With the booming development of social media, clickbaits are widespread in the online world. Online users can get easily infected by these deceptive titles, which has brought many network security problems. Clickbait detection is a sub-problem in practical text classification tasks with strongly unbalanced training set. Previous researches tend to extract implicit text features automatically throu...Show More
The prevalence of Bitcoin has attracted a mass of investors into the blockchain ecosystem. Unfortunately, benefiting from its anonymity and immutability, scammers deploy various traps in smart contracts to exploit other participants and seize illegal proceeds. To identify smart Ponzi contracts-a classic fraud widely popular on Ethereum, previous studies present several machine learning-based model...Show More
Federated learning is a distributed machine learning framework that enables distributed model training with local datasets, which can effectively protect the data privacy of workers (i.e., intelligent edge nodes). The majority of federated learning algorithms assume that the workers are trusted and voluntarily participate in the cooperative model training process. However, the situation in practic...Show More
The Internet of Things (IOT) is an Internet-based network that covers everything. Message Queuing Telemetry Transport (MQTT) is one of the commonly used communication protocols for any platform in the Internet of Things. Whether it is from the perspective of overall security or device compatibility and resource consumption, the MQTT protocol has certain advantages and is the most competitive commu...Show More
As a lightweight protocol, the Message Queuing Telemetry Transport (MQTT) is widely used in the scopes of Internet of Things on account of its quite low bandwidth requirements. We built a temperature and humidity monitoring system using the Raspberry Pi and NodeMcu to communicate with each other through the MQTT protocol. This work applies network analytics tools such as Wireshark to capture and a...Show More
With the enhancement of mobile network access capabilities, the application of the Internet of Things has become increasingly widespread, and related research on the Internet of Things has received extensive attention from the academic and industrial fields. The security and efficiency of M2M in IoT are the core basic issues. Devices and systems in IoT are very complex, and the research on the com...Show More
As a blockchain in the field of Internet of Things, Tangle network has received extensive attention from academia and industry. The Tangle network forms a distributed ledger structure through a Directed Acyclic Graph (DAG). Malicious nodes try to achieve the purpose of attack by preventing consensus or reducing the efficiency of consensus. Fast Probabilistic Consensus (FPC) is an important method ...Show More
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access control to achieve the secure data sharing. However, most of the existing CP-ABE access control schemes involve intermediary entities, which might suffer from a high trust-building cost, single point of failure and so on. Due to the decentralization and transparency of blockchain, some blockchain-based acce...Show More
Blockchain-based product traceability systems are receiving increasing attention from both industry and academia. Existing systems make full use of the traceability and non-modification characteristics of blockchain technology and realize the openness and transparency of product traceability information in the entire supply chain. However, existing systems do not consider government regulation, ca...Show More
Blockchain with these characteristics of decentralized structure, transparent and credible, time-series and immutability, has been considering as a promising technology. Consensus algorithm as one of the core techniques of blockchain directly affects the scalability of blockchain systems. Existing probabilistic finality blockchain consensus algorithms such as PoW, PoS, suffer from power consumptio...Show More
Aiming at the current problems of security threats and privacy leak risks in the operation process of related data of intelligent logistics system, and the operation of system lacking of supervision and traceability, this paper proposes to use blockchain technology to resolve these problems. A scheme on applying blockchain in intelligent logistics system is proposed, including operation principle,...Show More
In view of the influence of information's “incompleteness” and “asymmetry” to supply chain operation efficiency, we make big production enterprise as the object and apply blockchain to its supply chain endogenous risk management, to research the specific operation mechanism and application value. In the operation process of big production enterprise supply chain, because of the information's asymm...Show More
Focusing on the overlapping areas of the logistics industry with a large number of mature blockchain applications and the public welfare industry that requires high transparency and credibility, this paper designs and implements an innovative philanthropy logistics platform based on blockchain technology through the Ethereum platform. Our platform makes use of the open, transparent, and irrevocabl...Show More
The existing data sharing models have some issues such as poor transparency of data transactions, data without security assurance and lacking of effective data tracking methods. This paper proposed a brand-new data sharing scheme based on blockchain technology. Firstly, a blockchain double-chain structure about blockchain was introduced, one chain was used to store the original data and another wa...Show More
Cyber Physical Systems(CPS) have achieved attention, research and applications from the governments, academic circles, industry circles of domestic and foreign, so, CPS have become an important content of China's two modernizations' deeply integration in future. Using Petri net model to describe CPS information security risk evaluation process. Colligating Petri net model analysis results and CPS ...Show More
Based on revisiting the RYY+ Identity-based (ID-Based) key agreement protocol, we find it's vulnerable to Intermediate results leakage (IRL) and Key-compromise impersonation (KCI) attack. A novel protocol called RYY++ is proposed to make up for its deficiencies. Our protocol follows the Full dual exponential challenge response (FDCR-1) scheme to ensure the signature change every time, so the maste...Show More