Ximeng Liu

Ximeng Liu
Fuzhou University · Department of Computer Science and Technology

Ph.D

About

427
Publications
63,634
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,848
Citations
Additional affiliations
November 2014 - August 2019
Singapore Management University
Position
  • Research Assistant
September 2013 - September 2014
Nanyang Technological University
Position
  • Research Assistant

Publications

Publications (427)
Article
Full-text available
In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. Using POCR, a user can securely outsource the storing and processing of rational numbers to a cloud server without compromising the security of the (original) data and the computed results. We present the...
Article
Full-text available
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys, which we refer to as EPOM. Using EPOM, a large scale of users can securely outsource their data to a cloud server for storage. Moreover, encrypted data belonging to multiple users can be processed without compromising on th...
Article
Full-text available
Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data gener...
Article
Full-text available
In this paper, we propose a new efficient privacy-preserving outsourced computation framework over public data, called EPOC. EPOC allows a user to outsource the computation of a function over multi-dimensional public data to the cloud while protecting the privacy of the function and its output. Specifically, we introduce three types of EPOC in orde...
Article
Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private data. To address these concerns, this article explore...
Article
In Unmanned Aerial Vehicle (UAV) performing tasks, the UAV often faces electricity shortages. The traditional scheme to charge a UAV needs to return to the ground. Using the charging UAV (CUAV) can avoid the waste of electricity caused by the return. However, the existing works only consider a fixed charging location for electricity replenishment....
Article
Recently, model stealing attacks are widely studied but most of them are focused on stealing a single non-discrete model, e.g., neural networks. For ensemble models, these attacks are either non-executable or suffer from intolerant performance degradation due to the complex model structure (multiple sub-models) and the discreteness possessed by the...
Article
Full-text available
Getting access to labeled datasets in certain sensitive application domains can be challenging. Hence, one may resort to transfer learning to transfer knowledge learned from a source domain with sufficient labeled data to a target domain with limited labeled data. However, most existing transfer learning techniques only focus on one-way transfer wh...
Article
In various multi-party cooperations data stored on blockchains (i.e., on-chain data) should be decentralized consistent, verifiable, traceable, and immutable. Online analytical processing (OLAP) services are critical requirements in these applications. However, OLAP performances of existing blockchain systems are much worse than those of relational...
Article
The $k$ -ary $n$ -cube $Q_{n}^{k}$ is one of the most popular interconnection networks engaged as the underlying topology of data center networks, on-chip networks, and parallel and distributed systems. Due to the increasing probability of faulty edges in large-scale networks and extensive applications of the Hamiltonian path, it becomes more...
Chapter
With the popularity of graph-structured data and the promulgation of various data privacy protection laws, machine unlearning in Graph Convolutional Network (GCN) has attracted more and more attention. However, machine unlearning in GCN scenarios faces multiple challenges. For example, many unlearning algorithms require large computational resource...
Article
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one asp...
Article
Spatial keyword queries have attracted much attention over the past decade due to the popularity of location-based services and social networks, which brings great economic benefits. Geo-textual data are encrypted-and-delegated to public clouds for efficient management and utilization while preventing potential data leakage. However, it is still ch...
Chapter
Federated learning (FL) enables multiple clients to collaboratively train deep learning models under the supervision of a centralized aggregator. Communicating or collecting the local private datasets from multiple edge clients is unauthorized and more vulnerable to training heterogeneity data threats. Despite the fact that numerous studies have be...
Preprint
While the transferability property of adversarial examples allows the adversary to perform black-box attacks (i.e., the attacker has no knowledge about the target model), the transfer-based adversarial attacks have gained great attention. Previous works mostly study gradient variation or image transformations to amplify the distortion on critical p...
Article
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at...
Preprint
Federated learning (FL) enables multiple clients to collaboratively train deep learning models while considering sensitive local datasets' privacy. However, adversaries can manipulate datasets and upload models by injecting triggers for federated backdoor attacks (FBA). Existing defense strategies against FBA consider specific and limited attacker...
Article
As acquiring manual labels on data could be costly, unsupervised domain adaptation (UDA), which transfers knowledge learned from a rich-label dataset to the unlabeled target dataset, is gaining increasingly more popularity. While extensive studies have been devoted to improving the model accuracy on target domain, an important issue of model robust...
Article
Centralized learning now faces data mapping and security constraints that make it difficult to carry out. Federated learning with a distributed learning architecture has changed this situation. By restricting the training process to participants’ local, federated learning addresses the model training needs of multiple data sources while better prot...
Preprint
Full-text available
Recently, evolutionary computation (EC) has been promoted by machine learning, distributed computing, and big data technologies, resulting in new research directions of EC like distributed EC and surrogate-assisted EC. These advances have significantly improved the performance and the application scope of EC, but also trigger privacy leakages, such...
Chapter
Jointing multi-source data for model training can improve the accuracy of neural network. To solve the raising privacy concerns caused by data sharing, data are generally encrypted and outsourced to a group of cloud servers for computing and processing. In this client-cloud architecture, we propose FPPNet, a fast and privacy-preserving neural netwo...
Article
Hierarchical trees are widely used in differentially private statistical releases. Existing fast specialized algorithms guarantee hierarchical consistency but not non-negativity, which may incur meaningless negative values due to randomness. Quadratic programming can achieve optimally non-negative consistent releases, but traditional numerical-base...
Article
In response to the threat of adversarial examples, adversarial training provides an attractive option for improving robustness by training models on online-augmented adversarial examples. However, most existing adversarial training methods focus on improving the model’s robust accuracy by strengthening the adversarial examples but neglecting the in...
Article
Users in dynamic spectrum access (DSA) with federated reinforcement learning (FRL) autonomously access channels, avoiding centralized coordination and protecting users’ privacy. However, existing FRL-based DSA mechanisms are limited to ideal network states, i.e., assuming that channel states and users’ interference relationships are unchanged. Besi...
Article
With the proliferation of machine learning, the cloud server has been employed to collect massive data and train machine learning models. Several privacy-preserving machine learning schemes have been suggested recently to guarantee data and model privacy in the cloud. However, these schemes either mandate the involvement of the data owner in model...
Article
Due to enormous computing and storage overhead for well-trained Deep Neural Network (DNN) models, protecting the intellectual property of model owners is a pressing need. As the commercialization of deep models is becoming increasingly popular, the pre-trained models delivered to users may suffer from being illegally copied, redistributed, or abuse...
Article
The traveling salesman problem (TSP) is one of the classic combinatorial optimization problems, which can be widely used in intelligent transportation and logistics field. Neural network has shown great potential in combinatorial optimization tasks. However, it faces privacy leakage when a TSP neural combinatorial optimization network and user's da...
Article
The development of unmanned aerial vehicle (UAV) technology has been advancing rapidly and is widely applied in various domains. Compared to a single UAV, the multi-UAV system, known as the UAV Ad Hoc Network (UANET), can collaborate to accomplish complex tasks more efficiently. Due to the UAVs communicating through open wireless channels, they are...
Article
The health-related Internet of Things (IoT) play an irreplaceable role in the collection, analysis, and transmission of medical data. As a device of the health-related IoT, the electroencephalogram (EEG) has long been a powerful tool for physiological and clinical brain research, which contains a wealth of personal information. Due to its rich comp...
Article
The surging interest in cryptocurrency has revitalized the research for digital signature schemes with strong security. In particular, signature schemes are investigated to resist the malleability attacks in cryptocurrency platforms. However, existing signature schemes only conquer partial malleability attacks due to various sources of attacks. Oth...
Article
When enjoying mobile crowdsensing (MCS), it is vital to evaluate the trustworthiness of mobile users (MUs) without disclosing their sensitive information. However, the existing schemes ignore this requirement in the multiple crowdsourcers (CSs) scenario. The lack of a credible sharing about MUs' trustworthiness results in an inaccurate trust evalua...
Article
In the era of the Internet of Things (IoT), the rapid development of cloud computing has been advancing location-based services (LBS). To enjoy the considerable advantages of lower cost and higher performance of cloud computing, it has become the first choice for most IoT enterprises to outsource data and services to public clouds. However, the pri...
Article
Mobile crowdsensing (MCS) has been applied in various fields to realize data sharing, where multiple platforms and multiple Mobile Users () have appeared recently. However, aiming at mutual selection, the existing works ignore making ’ utilities with the limited resources and platforms’ utilities while achieving the desired sensing data quality max...
Article
Federated learning (FL) has achieved state-of-the-art performance in distributed learning tasks with privacy requirements. However, it has been discovered that FL is vulnerable to adversarial attacks. The typical gradient inversion attacks primarily focus on attempting to obtain the client’s private input in a white-box manner, where the adversary...
Article
Member Inference Attack (MIA) is a key measure for evaluating privacy leakage in Machine Learning (ML) models, aiming to distinguish private members from non-members by training the attack model. In addition to the traditional MIA, the recently proposed Generative Adversarial Network (GAN)-based MIA can help the adversary know the distribution of t...
Article
Federated Learning (FL) suffers from low convergence and significant accuracy loss due to local biases caused by non-Independent and Identically Distributed (non-IID) data. To enhance the non-IID FL performance, a straightforward idea is to leverage the Generative Adversarial Network (GAN) to mitigate local biases using synthesized samples. Unfortu...
Article
Privacy-preserving online multi-task assignment is a crucial aspect of spatial crowdsensing on untrusted platforms, where multiple real-time tasks are allocated to appropriate workers in a privacy-preserving manner. While existing schemes ensure the privacy of tasks and users, they seldom focus on minimizing the total moving distances for crowdsens...
Article
UAV-assisted mobile edge computing (UAV-MEC) has been proposed to offer computing resources for smart devices and user equipment. UAV cluster aided MEC rather than one UAV-aided MEC as edge pool is the newest edge computing architecture. Unfortunately, the data packet exchange during edge computing within the UAV cluster hasn't received enough atte...
Article
To motivate data owner (DO) to trade data, the existing data trading allows DO to sell the disturbed data to the data consumer (DC), where the disturbance parameter and the data price are negotiated by them, and DO independently adds the disturbance noise to data (usually continuous type) following the negotiation result. However, DOs may violate t...
Article
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem...
Article
In cloud-based health monitoring services, healthcare centers often outsource SVM-based clinical decision models to provide remote users with clinical decisions. During service provisioning, authorized external organizations like insurance companies aim to verify decision correctness to prevent fraudulent medical reimbursements. However, existing v...
Article
Federated learning (FL) allows multiple clients to train deep learning models collaboratively while protecting sensitive local datasets. However, FL has been highly susceptible to security for federated backdoor attacks (FBA) through injecting triggers and privacy for potential data leakage from uploaded models in practical application scenarios. F...
Article
In machine learning (ML), the massive data processing and dense computations based on matrices make outsourced inference computation a growing trend. The unreliability of cloud platforms makes privacy protection and inference correctness increasingly important in outsourced computations. Unfortunately, current works cannot provide an effective veri...
Article
Outsourcing storage has emerged as an effective solution to manage the increasing volume of data. With the popularity of pay-as-you-go payment models in outsourcing storage, data auditing schemes that prioritize timeliness can be valuable evidence for elastic bill settlement. Unfortunately, existing data auditing schemes do not sufficiently conside...
Preprint
As acquiring manual labels on data could be costly, unsupervised domain adaptation (UDA), which transfers knowledge learned from a rich-label dataset to the unlabeled target dataset, is gaining increasing popularity. While extensive studies have been devoted to improving the model accuracy on target domain, an important issue of model robustness is...
Article
Full-text available
Centralized particle swarm optimization (PSO) does not fully exploit the potential of distributed or parallel computing and suffers from single-point-of-failure. Particularly, each particle in PSO comprises a potential solution (e.g., traveling route and neural network model parameters) which is essentially viewed as private data. Unfortunately, pr...
Preprint
Full-text available
Federated Learning (FL) is pervasive in privacy-focused IoT environments since it enables avoiding privacy leakage by training models with gradients instead of data. Recent works show the uploaded gradients can be employed to reconstruct data, i.e., gradient leakage attacks, and several defenses are designed to alleviate the risk by tweaking the gr...
Article
Connected autonomous vehicles (CAVs) employ the point cloud data captured by LiDAR to enhance the capability of object recognition and detection. Edge computing with its inherent advantages can help CAVs alleviate resource constraints and enable faster situational awareness and data processing. However, the point cloud data contains private informa...
Article
Distributed Spatial Cloaking () enables users to enjoy precise Location-Based Service (LBS) with location privacy-preserving. An incentive mechanism is necessary to encourage users to cooperate. However, due to the inappropriate design of incentive mechanisms, the existing works cause low user benefits and fail to encourage users, ruining the expec...
Chapter
As a new revocation mechanism for identity-based encryption (IBE), server-aided revocable IBE (SR-IBE), firstly proposed by Qin et al. in 2015, achieves remarkable advantages over previous identity revocation techniques. In this primitive, almost all of workloads on the users (i.e., receivers) side can be delegated to an untrusted server which does...
Article
Cover Caption: The cover image is based on the Research Article Active forgetting via influence estimation for neural networks by Xianjia Meng et al., https://doi.org/10.1002/int.22981.
Article
Random forest is one of the most heated machine learning tools in a wide range of industrial scenarios. Recently, federated learning enables efficient distributed machine learning without direct revealing of private participant data. In this article, we present a novel framework of federated random forest (RevFRF), and further emphatically discuss...
Article
With the assistance of the Internet of Things, the fast developing Healthcare Internet of Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and enables many promising medical applications, such as remote healthcare that is crucial in pandemic (e.g., coronavirus disease 2019). Healthcare participants can make accurate d...
Preprint
Full-text available
The rapidly expanding number of Internet of Things (IoT) devices is generating huge quantities of data, but the data privacy and security exposure in IoT devices, especially in the automatic driving system. Federated learning (FL) is a paradigm that addresses data privacy, security, access rights, and access to heterogeneous message issues by integ...
Article
A new trend of using deep reinforcement learning for traffic signal control has become a spotlight in the Intelligent Transportation System (ITS). However, the traditional intelligent traffic signal control system always collects and transmits vehicle information (e.g., vehicle location, speed, etc.) in the form of plaintext, which would result in...
Preprint
Full-text available
The opacity of neural networks leads their vulnerability to backdoor attacks, where hidden attention of infected neurons is triggered to override normal predictions to the attacker-chosen ones. In this paper, we propose a novel backdoor defense method to mark and purify the infected neurons in the backdoored neural networks. Specifically, we first...
Preprint
Full-text available
The transferability of adversarial examples (AEs) across diverse models is of critical importance for black-box adversarial attacks, where attackers cannot access the information about black-box models. However, crafted AEs always present poor transferability. In this paper, by regarding the transferability of AEs as generalization ability of the m...
Article
The rapidly exploding of user data, especially applications of neural networks, involves analyzing data collected from individuals, which brings convenience to life. Meanwhile, privacy leakage in the applications as a potential threat needs to be addressed urgently. However, removing private information from models is difficult once the user's sens...
Article
Full-text available
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems and communication systems as they have efficient encoding and decoding algorithms. In this paper, by investigating the solutions of certain equations over finite fields, we make progress towards three conjectures about optimal ternary cyc...
Article
In recent years, the appearance of graph convolutional networks (GCNs) provides a new idea for graph structure data processing. Because of that, they can learn excellent user and item embedding by using cooperative signals of high‐order neighbors, and the GCNs technique shows great potential in the recommendation. The common problem with the bulk o...
Article
Full-text available
Wireless body area networks (WBANs) consist of a number of low-power sensors, through which specialists can remotely monitor the real-time vital parameters of patients. This facility can improve healthcare quality and reduce associated costs considerably. However, WBAN devices typically have limited resources that severely hinder the quality of ser...
Article
Malware detection is indispensable to cybersecurity. However, with the advent of new malware variants and scenarios with few and imbalanced samples, malware detection for various complex scenarios has been a very challenging problem. In this article, we propose a malware detection method based on image analysis and generative adversarial networks,...
Chapter
Community detection is a popular research topic in complex network analysis, which can be applied in many real-world scenarios such as disease prediction. With the increase of people’s awareness of privacy protection, more and more laws enforce the protection of sensitive information while transferring data. The anonymization-based community detect...
Article
For group signature (GS) supporting membership revocation, verifier-local revocation (VLR) mechanism seems to be a more flexible choice, because it requires only that verifiers download up-to-date revocation information for signature verification, and the signers are not involved. As a post-quantum secure cryptographic counterpart of classical numb...
Preprint
Evolutionary algorithms (EAs), such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users do not have enough capability to implement EAs to solve COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud ser...
Article
Full-text available
With the popularity of mobile terminal equipment and wireless sensing network, the applications of mobile crowdsensing-based traffic violation monitoring are increasingly widely used. However, the enormous amount of sensing data with complex types brings a critical challenge to the limited bandwidth and storage space. Meanwhile, there is a serious...
Preprint
Full-text available
The neural network (NN) becomes one of the most heated type of models in various signal processing applications. However, NNs are extremely vulnerable to adversarial examples (AEs). To defend AEs, adversarial training (AT) is believed to be the most effective method while due to the intensive computation, AT is limited to be applied in most applica...
Patent
The present disclosure relates to a realtime urban traffic status monitoring method based on privacy-preserving com pressive sensing, including the following steps: step S1: dividing vehicle data under privacy preserving into two parts, and sending the two parts to two different road side units (RSU) for preprocessing; step S2: outsourcing, by the...
Article
Full-text available
As an emerging sensing data collection paradigm, mobile crowdsensing (MCS) enjoys good scalability and low deployment cost but raises privacy concerns. In this paper, we propose a privacy-preserving MCS system called \textsc{CrowdFL} by seamlessly integrating federated learning (FL) into MCS. At a high level, in order to protect participants' priva...
Article
Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain...
Preprint
Transferability of adversarial examples is of critical importance to launch black-box adversarial attacks, where attackers are only allowed to access the output of the target model. However, under such a challenging but practical setting, the crafted adversarial examples are always prone to overfitting to the proxy model employed, presenting poor t...
Chapter
With the discernment of the vulnerability of deep neural networks recently, adversarial attack methods have become one of the hot spots for the security of artificial intelligence technologies. While previous researches can effectively generate adversarial examples in white-box attacks, it remains challenging to transfer these adversarial examples...
Preprint
Full-text available
Starting from the local structures to study hierarchical trees is a common research method. However, the cumbersome analysis and description make the naive method challenging to adapt to the increasingly complex hierarchical tree problems. To improve the efficiency of hierarchical tree research, we propose an embeddable matrix representation for hi...