Sheng Gao - IEEE Xplore Author Profile

Showing 1-25 of 26 results

Filter Results

Show

Results

Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks and participants without considering sensing tasks' time requirements and participants' mobility, which cannot achieve satisfactory collected data quality and task completion in crowdsensin...Show More
As a promising implementation model of payment channel network (PCN), payment channel hub (PCH) could achieve high throughput by providing stable off-chain transactions through powerful hubs. However, existing PCH schemes assume hubs are preplaced in advance, not considering payment requests' distribution and may affect network scalability, especially network load balancing. In addition, current s...Show More
The Metaverse is established by twining a practical world in a virtual form, where users could become creators of learning-based user-generated content (UGC). However, the digital assets are not owned by the creators, which deviates from the decentralized Metaverse based on blockchain in Web 3.0. The contribution incentive design for UGC still faces the challenges of ownership verification and pri...Show More
With the economic development of Ethereum, the frequent security incidents involving smart contracts running on this platform have caused billions of dollars in losses. Consequently, there is a pressing need to identify the vulnerabilities in contracts, while the state-of-the-art (SOTA) detection methods have been limited in this regard as they cannot overcome three challenges at the same time. (i...Show More
Federated learning (FL) is essentially a distributed machine learning paradigm that enables the joint training of a global model by aggregating gradients from participating clients without exchanging raw data. However, a malicious aggregation server may deliberately return designed results without any operation to save computation overhead, or even launch privacy inference attacks using crafted gr...Show More
Smart grid is gaining more and more attention as one of the typical applications of Internet of Things. However, in a distributed environment, how to guarantee the privacy of users in electricity trading while ensuring the efficiency of the transactions is one of the urgent issues to be solved. In this article, we propose a distributed attribute-based signature (DABS) scheme for distributed electr...Show More
Searchable encryption (SE) has emerged as a cryptographic primitive that allows data users to search on encrypted data. Most existing SE schemes usually delegate search operations to an intermediary such as a cloud server, which would inevitably result in single-point failure, privacy leakage, and even untrustworthy results. Several blockchain-based SE schemes have been proposed to alleviate these...Show More
Anomaly detection has become a key challenge affecting the training accuracy of machine learning. Because the training data is usually collected from Internet, many noised samples will be captured and these samples can decrease the model training accuracy. However, because the abnormal samples are difficult to predict when the samples are collected, and the training samples collected may contain m...Show More
Collaborative learning has been used to train a joint model on geographically diverse data through periodically sharing knowledge. Although participants keep the data locally in collaborative learning, the adversary can still launch inference attacks through participants’ shared information. In this article, we focus on the property inference attack during model training and design a novel defense...Show More
The location information for tasks may expose sensitive information, which impedes the practical use of mobile crowdsensing in the industrial Internet. In this article, to our knowledge, we are the first to discuss the privacy protection of task locations and propose a codebook-based task allocation mechanism to protect it. Considering the cost of system utility caused by privacy protection techno...Show More
Worker selection in crowdsensing plays an important role in the quality control of sensing services. The majority of existing studies on worker selection were largely dependent on a trusted centralized server, which might suffer from single point of failure, the lack of transparency and so on. Some works recently proposed blockchain-based crowdsensing, which utilized reputation values stored on bl...Show More
Deep learning has aroused a lot of attention and has been used successfully in many domains, such as accurate image recognition and medical diagnosis. Generally, the training of models requires large, representative datasets, which may be collected from a large number of users and contain sensitive information (e.g., users’ photos and medical information). The collected data would be stored and co...Show More
At present, many enterprises or individuals with a lot of data are limited by their own computing power, so can't mine useful information from the data. To address this problem, this paper proposes a rational delegation machine learning pattern. In the proposed pattern, we firstly construct a reliable game model, and then derive a formal model of rational delegation machine learning according to d...Show More
With the development of Internet of Things (IoTs) and big data, collaborative machine learning has achieved many impressive successes in IoT to improve the system performance and provide more diversified services for people. Although one of the motivations for collaborative learning is privacy preservation, the adversary can still launch an inference attack through task nodes' shared information. ...Show More
As a lightweight protocol, the Message Queuing Telemetry Transport (MQTT) is widely used in the scopes of Internet of Things on account of its quite low bandwidth requirements. We built a temperature and humidity monitoring system using the Raspberry Pi and NodeMcu to communicate with each other through the MQTT protocol. This work applies network analytics tools such as Wireshark to capture and a...Show More
In cloud computing, the delegation computation service is required because end users usually are resource-constrained, and at the same time the correctness of computing results needs to be verified. However, all the existing and available technologies have a high cost to verify which is the main problem faced by the delegation computing under the cloud platform. In order to address this issue, bas...Show More
Dynamic spectrum access (DSA) is a promising platform to solve the problem of spectrum shortage for which the most challenging issue is spectrum allocation under uncertain availability information, which is referred as a nondeterministic spectrum allocation problem. The nature of such a problem is due to inaccurate spectrum sensing results, which are induced by that power or energy based sensing c...Show More
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access control to achieve the secure data sharing. However, most of the existing CP-ABE access control schemes involve intermediary entities, which might suffer from a high trust-building cost, single point of failure and so on. Due to the decentralization and transparency of blockchain, some blockchain-based acce...Show More
Blockchain-based product traceability systems are receiving increasing attention from both industry and academia. Existing systems make full use of the traceability and non-modification characteristics of blockchain technology and realize the openness and transparency of product traceability information in the entire supply chain. However, existing systems do not consider government regulation, ca...Show More
Edge computing is a novel paradigm designed to improve the quality of service for latency sensitive cloud applications. However, the state-of-the-art edge services are designed for specific applications, which are isolated from each other. To better improve the utilization level of edge nodes, public resource sharing among edges from distinct service providers should be encouraged economically. In...Show More
Blockchain with these characteristics of decentralized structure, transparent and credible, time-series and immutability, has been considering as a promising technology. Consensus algorithm as one of the core techniques of blockchain directly affects the scalability of blockchain systems. Existing probabilistic finality blockchain consensus algorithms such as PoW, PoS, suffer from power consumptio...Show More
Cyber Physical Systems(CPS) have achieved attention, research and applications from the governments, academic circles, industry circles of domestic and foreign, so, CPS have become an important content of China's two modernizations' deeply integration in future. Using Petri net model to describe CPS information security risk evaluation process. Colligating Petri net model analysis results and CPS ...Show More
The ubiquity of mobile devices have promoted the prosperity of mobile crowd systems, which recruit crowds to contribute their resources for performing tasks. Yet, due to the various resource consumption, the crowds may be reluctant to join and contribute information. Thus, the low participation level of crowds will be a hurdle that prevents the adoption of crowdsourcing. A critical challenge for t...Show More
Privacy issues in continuous Location-Based Services (LBSs) have gained attractive attentions in literature over recent years. In this paper, we illustrate the limitations of existing work and define an entropy-based privacy metric to quantify the privacy degree based on a set of vital observations. To tackle the privacy issues, we propose an efficient privacy-preserving scheme, DUMMY-T, which aim...Show More
Location-based Services (LBSs) via mobile handled devices have been subject to major privacy concerns for users. Currently, most of the existing works concerning the continuous LBS queries mainly focus on users' privacy demands with little consideration of the service of quality (QoS). In this paper, we propose a Demand-Aware Location Protection scheme (DALP) for continuous LBS requests, allowing ...Show More