Loading [MathJax]/extensions/MathZoom.js
Bing Chen - IEEE Xplore Author Profile

Showing 1-25 of 69 results

Filter Results

Show

Results

The emergence of new machine learning methods has led to their widespread application across various domains, significantly advancing the field of artificial intelligence. However, the process of training and inferring machine learning models relies on vast amounts of data, which often include sensitive private information. Consequently, the privacy and security of machine learning have encountere...Show More
Heat exchangers are crucial components of aircraft air management systems, primarily responsible for cooling high-temperature engine bleed air and providing air at the appropriate temperature for downstream gas systems. Failures in heat exchangers can reduce heat transfer efficiency, affect the performance of air management systems, and in severe cases, even lead to catastrophic accidents for airc...Show More
Mobile crowdsensing (MCS) has been applied for signal map construction in smart city. MCS leverages the mobility of users and the sensors embedded in mobile phones to collect and transfer sensing data. However, it is still costly for MCS to cover large-scale regions. Accordingly, data recovery algorithms are proposed, which allow participants to collect only few signal data and infer the remainder...Show More
Container–based microservice provisioning, with its elasticity in terms of the layered structure, enables the sharing of common layers among different edge computing tasks, both within and across edge servers (ESs). However, due to the potential hardware breakdowns, each ES may prone to failures, affecting its lifetime (i.e., the time-length that an ES works continuously without interruptions), an...Show More
Recent studies have demonstrated that backdoor attacks can cause a significant security threat to federated learning. Existing defense methods mainly focus on detecting or eliminating the backdoor patterns after the model is backdoored. However, these methods either cause model performance degradation or heavily rely on impractical assumptions, such as labeled clean data, which exhibit limited eff...Show More
As a privacy-preserving distributed learning paradigm, federated learning (FL) has been proven to be vulnerable to various attacks, among which backdoor attack is one of the toughest. In this attack, malicious users attempt to embed backdoor triggers into local models, resulting in the crafted inputs being misclassified as the targeted labels. To address such attack, several defense mechanisms are...Show More
In this paper, a novel hierarchical game framework for physical layer security (PLS) aware wireless communications with dynamic trilateral coalitions is studied. In the considered system, legitimate users (LUs) aim to transmit secret data to associated base stations (BSs) via uplink communications under the threat of eavesdroppers (EVs), while there also exist jammers (JAs) which may choose to for...Show More
In this paper, a novel two-timescale resource management framework for mobile edge computing (MEC) is constructed. Unlike existing studies, for providing seamless and cost-efficient MEC services, this work aims to strike the balance between service migration and task rerouting for mobile devices (MDs) whenever handovers occur (i.e., switching access from one edge server to another). Considering th...Show More
In this paper, a novel two-timescale resource management framework for mobile edge computing (MEC) is constructed. For providing seamless and cost-efficient MEC services, this work aims to strike the balance between service migration and task rerouting for mobile devices (MDs) whenever handovers occur (i.e., switching access from one edge server to another). Considering the network dynamics (e.g.,...Show More
In the era of cloud computing, many applications are migrated to public servers not fully controlled by users who may fear their critical operations or data from being compromised by attackers. Previous studies have shown that Intel SGX enclaves can improve applications’ security in many market products. Yet they mainly rely on developers to reprogram and recompile the application into an SGX-awar...Show More
In this paper, a novel hierarchical game framework for physical layer security (PLS) with dynamic trilateral coalitions is studied. In the considered system, legitimate users (LUs) aim to transmit secret data to associated base stations (BSs) via uplink communications under the threat of eavesdroppers (EVs), while there also exists jammers (JAs) which may choose to form coalitions with either LUs ...Show More
In this paper, a long-term workload management problem for multi-server edge computing with server collaboration is studied. In the considered model, mobile users’ computation-intensive tasks are generated dynamically over the time and offloaded to associated edge servers according to pre-determined subscription agreements. Upon receiving the subscribed workload, each edge server can then decide t...Show More
Federated learning has received a lot of attention in recent years due to its privacy protection features. However, federated learning is susceptible to various inference attacks. Membership inference attack aims to determine whether the target data is a member or non-member of the target federated learning model, which poses a serious threat to the privacy of the training data set. Membership inf...Show More
Advanced persistent threats (APTs) pose a serious threat to the security of cyberspace. Recently, more and more security organizations and vendors have been focusing on cyber threat intelligence (CTI) to tackle APTs. Particularly, some researchers have introduced knowledge graphs to aggregate CTIs and explore the potential intelligence value. This paper presents APTKG, a framework for automaticall...Show More
In this paper, an energy-efficient resource management framework for industrial Internet of Things (IIoT) with closed-loop control on end devices, edge servers (ESs) and cloud center (CC) is studied. In the considered model, each ES aggregates the data collected by industrial sensors (i.e., end devices) and forms computation tasks for corresponding data analysis. In order to minimize the system-wi...Show More
Edge computing has been regarded as an enabling technology for supporting future smart applications, such as industrial Internet of Things. In this paper, a novel computation offloading framework for edge computing is proposed. Unlike existing studies, this work considers that end users can intentionally reserve some time for local pre-processing before requesting the computation offloading servic...Show More
Federated learning is proposed to solve data islands and protect privacy. Especially in the big data environment, participating users can build a model together without sharing private sensitive data. However, as the number of end devices becomes larger, and the model becomes more complex, high concurrent access to the cloud server often brings communication delay, and it is also a great challenge...Show More
Future Internet involves several emerging technologies such as 5G and beyond 5G networks, vehicular networks, unmanned aerial vehicle (UAV) networks, and Internet of Things (IoTs). Moreover, the future Internet becomes heterogeneous and decentralized with a large number of involved network entities. Each entity may need to make its local decision to improve the network performance under dynamic an...Show More
Edge–cloud collaboration is critical in the Industrial Internet of Things (IIoT) for serving computation-intensive tasks (e.g., bearing fault monitoring) that require low-response delay, low energy consumption, and high processing accuracy. In this article, an energy-efficient resource management framework for IIoT with closed-loop control on end devices, edge servers, and cloud center is studied....Show More
Industrial Internet of Things (IIoT) systems are key enabling infrastructures that sustain the functioning of production and manufacturing. To satisfy the intelligence demands, federated learning has been envisioned as a promising technique for IIoT applications with privacy training requirements. However, research works have shown that, by training the local model on crafted poisoning samples mal...Show More
Mobile vehicles have been considered as potential edge servers to provide computation resources for the emerging Intelligent Transportation System (ITS) applications. However, how to fully utilize the mobile computation resources to satisfy the real-time arrived computation requests has not been explored yet. This work will address the critical challenges of limited computation resources, stringen...Show More
Narrowband Internet of Things (NB-IoT) standardized by the 3GPP has attracted significant attention since its appearance. It provides extended coverage, high capacity, reduced device processing complexity, and low-power consumption to meet the requirements of a wide range of IoT applications. In particular, NB-IoT is expected to bring IoT devices prolonged lifetime up to ten years. Radio access (R...Show More
Federated learning has attracted attention in recent years due to its native privacy-preserving features. However, it is still vulnerable to various membership inference attacks, such as backdoor, poisoning, and adversarial attacks. Membership Inference attack aims to discover the data used to train the model, which leads to privacy leaking ramifications on participants who use their local data to...Show More
The Internet of Vehicles has increased the demand for obstacle avoidance algorithms for autonomous vehicles in dynamic scenarios. Artificial potential field method has become a local obstacle avoidance scheme adopted by many autonomous vehicles thanks to its advantages such as the removal of the need for drawing the map, low computational cost and high real-time performance. However, when facing a...Show More
Recent research advancement of wireless sensing technology has made device-free interaction in the WiFi-enabled IoT environment possible. Although gesture-based interaction with such a smart environment greatly improves usability, it also introduces many security problems, such as shoulder surfing attacks. By spoofing the gestures of legitimate users, the attacker could easily access private infor...Show More