Skip to main content

and
  1. Article

    Open Access

    Survey: federated learning data security and privacy-preserving in edge-Internet of Things

    The amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning can no longer meet the requirements for training complex mo...

    Haiao Li, Lina Ge, Lei Tian in Artificial Intelligence Review (2024)

  2. No Access

    Chapter and Conference Paper

    Improved ConvNeXt Facial Expression Recognition Embedded with Attention Mechanism

    Facial expression recognition (FER) is an emerging and important research field in the field of pattern recognition, with wide applications in safe driving, intelligent monitoring, and human-computer interacti...

    Yiteng Zhao, Lina Ge, Gaoxiang Cui, Teng Fang in Applied Intelligence (2024)

  3. No Access

    Chapter and Conference Paper

    A Member Inference Attack Defense Method Based on Differential Privacy and Data Enhancement

    The development of deep learning has brought about the business model of Machine Learning as a Service (MLaaS). Malicious users can infer whether a member has participated in model training through Membership ...

    Gaoxiang Cui, Lina Ge, Yiteng Zhao, Teng Fang in Applied Intelligence (2024)

  4. Article

    Open Access

    Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...

    Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, **gya Xu in Journal of Cloud Computing (2023)

  5. Article

    Open Access

    Metabolomic analysis of aqueous humor reveals potential metabolite biomarkers for differential detection of macular edema

    Macular edema (ME) is a major complication of retinal disease with multiple mechanisms involved in its development. This study aimed to investigate the metabolite profile of aqueous humor (AH) in patients with...

    Dan Jiang, Congcong Yan, Lina Ge, Chun Yang, Ying Huang, Yau Kei Chan in Eye and Vision (2023)

  6. No Access

    Chapter and Conference Paper

    Research on User Influence Weighted Scoring Algorithm Incorporating Incentive Mechanism

    Overall product ratings are an important basis for users when shop** online or using online services. However, some sellers and web service providers put a large amount of false rating data into the rating s...

    **gya Xu, Lina Ge, Wei Zhou, Liang Yan in Parallel and Distributed Computing, Applic… (2023)

  7. No Access

    Chapter and Conference Paper

    Novel Ensemble Method Based on Improved k-nearest Neighbor and Gaussian Naive Bayes for Intrusion Detection System

    The frequent occurrence of network intrusion events poses a challenge to the performance of intrusion detection systems. Generally, these events contain many unknown attacks, making it difficult for intrusion ...

    Lina Ge, Hao Zhang, Haiao Li in Advanced Intelligent Computing Technology and Applications (2023)

  8. No Access

    Chapter and Conference Paper

    A Review of Client Selection Mechanisms in Heterogeneous Federated Learning

    Federated learning is a distributed machine learning approach that keeps data locally while achieving the utilization of fragmented data and protecting client privacy to a certain extent. However, the existenc...

    **ao Wang, Lina Ge, Guifeng Zhang in Advanced Intelligent Computing Technology … (2023)

  9. Article

    Open Access

    Damage evolution and fracture behavior of different materials specimens containing a central hole subjected to local loading

    The strength of the different materials specimens containing a central hole subjected to varying loading areas constitutes lots of underground engineering such as entry arrangement and mining process. In this ...

    Dongliang Ji, Hongbao Zhao, Hui Cheng, **uhan Yang, Lina Ge in Scientific Reports (2022)

  10. No Access

    Chapter and Conference Paper

    Adaptive Clustering by Fast Search and Find of Density Peaks

    Clustering by fast search and find of density peaks is a new density-based clustering algorithm, which is widely used in various fields owing to its simplicity and efficiency, unique parameters, and recognitio...

    Yuanyuan Chen, Lina Ge, Guifen Zhang, Yongquan Zhou in Intelligent Computing Methodologies (2022)

  11. No Access

    Chapter and Conference Paper

    A Differential Privacy Image Publishing Method Based on Wavelet Transform

    Image is an important information-bearing medium with many important attributes. If the image data is released directly, personal privacy will be compromised. This paper aims at how to use the method of differ...

    Guifen Zhang, Hangui Wei, Lina Ge, **a Qin in Parallel and Distributed Computing, Applic… (2022)

  12. No Access

    Chapter and Conference Paper

    Robot Path Planning Method Based on Improved Grey Wolf Optimizer

    Aiming at the shortcomings of the classical grey wolf optimizer in solving the path planning problem of mobile robots, such as low search efficiency and broken line turning, this paper proposes an improved Gre...

    Yilin Su, Yongsheng Li, Lina Ge, Minjun Dai in Pattern Recognition and Artificial Intelli… (2022)

  13. No Access

    Chapter and Conference Paper

    A High Performance Intrusion Detection System Using LightGBM Based on Oversampling and Undersampling

    Intrusion detection system plays an important role in network security, however, the problem with data imbalance limits the detection ability of intrusion detection system. In order to improve the performance ...

    Hao Zhang, Lina Ge, Zhe Wang in Intelligent Computing Theories and Application (2022)

  14. No Access

    Chapter and Conference Paper

    Chain-AAFL: Chained Adversarial-Aware Federated Learning Framework

    Federated learning (FL) distributes model training among multiple agents, who perform training locally but only exchange gradients due to privacy concerns. However, the threat of model poisoning attack and dee...

    Lina Ge, **n He, Guanghui Wang, Junyang Yu in Web Information Systems and Applications (2021)

  15. Article

    Open Access

    Behavior Reconstruction Models for Large-scale Network Service Systems

    In large-scale network service systems, the phenomenon of instantaneous gathering of a large number of users can cause system abnormality, whenever the load imposed by the user behaviors does not match the sys...

    Zhaohui Zhang, Lina Ge, Pengwei Wang in Peer-to-Peer Networking and Applications (2019)

  16. No Access

    Chapter and Conference Paper

    Experimental Research on Internet Ecosystem and AS Hierarchy

    The network architecture has undergone great changes. For example, the network topology of autonomous system level tends to be flattened. In this paper, actual network topology map is constructed through actua...

    Lv Ting, Donghong Qin, Lina Ge in Data Science (2019)

  17. No Access

    Chapter and Conference Paper

    IDP - OPTICS: Improvement of Differential Privacy Algorithm in Data Histogram Publishing Based on Density Clustering

    In recent years, incidents of privacy leaks have frequently occurred. How to protect the group and personal privacy has become a focus issue in the field of information security. Differential privacy technolog...

    Lina Ge, Yugu Hu, Hong Wang, Zhonghua He in Intelligent Computing Theories and Applica… (2019)

  18. No Access

    Chapter and Conference Paper

    Research on Full Homomorphic Encryption Algorithm for Integer in Cloud Environment

    With the continuous development of computer networks, cloud storage is now the mainstream way for people to store information, but some important information leaks in the process of storage, and information se...

    Lijuan Wang, Lina Ge, Yugu Hu, Zhonghua He in Intelligent Computing Methodologies (2019)

  19. No Access

    Chapter and Conference Paper

    An Incentive Compatible Mechanism for Lowest-Cost Routing

    Routing incentives are the basis for Internet service providers (ISP) to provide efficient, stable, and lasting routing services. Aiming at the least-cost routing model in the User-customized Multipath Inter-...

    Donghong Qin, Ting Lv, Jiahai Yang, Lina Ge in Proceedings of the Future Technologies Con… (2019)

  20. No Access

    Chapter and Conference Paper

    Improved Digital Password Authentication Method for Android System

    Proposes a simple digital password authentication method for mobile phones. Improves the authentication program by introducing random numbers and increasing the number of constant numbers. The input number of ...

    Bo Geng, Lina Ge, Qiuyue Wang in Intelligent Computing Theories and Application (2018)