Jinjun Chen’s research while affiliated with Swinburne University of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (388)


A joint vehicular device scheduling and uncertain resource management scheme for Federated Learning in Internet of Vehicles
  • Article

February 2025

·

5 Reads

·

1 Citation

Information Sciences

·

Bujia Chen

·

Jie Wen

·

[...]

·

Wensheng Zhang

DPNM: A Differential Private Notary Mechanism for Privacy Preservation in Cross-chain Transactions

January 2025

·

4 Reads

IEEE Transactions on Information Forensics and Security

Notary cross-chain transaction technologies have obtained broad affirmation from industry and academia as they can avoid data islands and enhance chain interoperability. However, the increased privacy concern in data sharing makes the participants hesitate to upload sensitive information without the trust foundation of the external network. To address this issue, this paper proposes a differential private notary mechanism (DPNM) to preserve privacy in blockchain interoperations. It establishes a fully trusted notary organization to conduct data perturbation before replying query to the external blockchain network. In addition, the DPNM contains two built-in privacy budget allocation schemes: Efficiency priority scheme (EPS) and Privacy priority scheme (PPS). These schemes unify the privacy preferences among different nodes based on multi-node consensus in the decentralized environment. The EPS can generate noise linearly and work efficiently, and the PPS reflects better on nodes’ preferences. This paper utilizes several metrics including mechanism errors, elapsed time, latency, and gas consumption to evaluate the performance of DPNM compared to the traditional mechanisms. The experiment results indicate that the proposed mechanism can meet privacy preferences among different nodes and provide better utility with little extra cost.



An Optimized Privacy-Utility Trade-off Framework for Differentially Private Data Sharing in Blockchain-Based Internet of Things

January 2025

·

1 Read

IEEE Internet of Things Journal

Differential private (DP) query and response mechanisms have been widely adopted in various applications based on Internet of Things (IoT) to leverage variety of benefits through data analysis. The protection of sensitive information is achieved through the addition of noise into the query response which hides the individual records in a dataset. However, the noise addition negatively impacts the accuracy which gives rise to privacy-utility trade-off. Moreover, the DP budget or cost is often fixed and it accumulates due to the sequential composition which limits the number of queries. Therefore, in this paper, we propose a framework known as optimized privacy-utility trade-off framework for data sharing in IoT (OPU-TF-IoT). Firstly, OPU-TF-IoT uses an adaptive approach to utilize the DP budget by considering a new metric of population or dataset size along with the query. Secondly, our proposed heuristic search algorithm reduces the DP budget accordingly whereas satisfying both data owner and data user. Thirdly, to make the utilization of DP budget transparent to the data owners, a blockchain-based verification mechanism is also proposed. Finally, the proposed framework is evaluated using real-world datasets and compared with the traditional DP model and other related state-of-the-art works. The results demonstrate that our proposed framework not only utilizes the DP budget efficiently, but also optimizes the number of queries by 49% and 54% on average compared to state-of-the-art and standard DP models, respectively. Furthermore, the data owners can effectively make sure that their data is shared accordingly through our blockchain-based verification mechanism which encourages them to share their data into the IoT system.


Fig. 4: Subspace Decomposition
Fig. 9: Comparison of Unfairness Across Mechanisms. Each bar represents the mean unfairness for a given privacy budget range, with error bars showing the standard deviation. Optimal b * values are displayed above the bars.
Privacy and Fairness Analysis in the Post-Processed Differential Privacy Framework
  • Article
  • Full-text available

January 2025

·

17 Reads

IEEE Transactions on Information Forensics and Security

The post-processed Differential Privacy (DP) framework has been routinely adopted to preserve privacy while maintaining important invariant characteristics of datasets in data-release applications such as census data. Typical invariant characteristics include non-negative counts and total population. Subspace DP has been proposed to preserve total population while guaranteeing DP for sub-populations. Non-negativity post-processing has been identified to inherently incur fairness issues. In this work, we study privacy and unfairness ( i.e ., accuracy disparity) concerns in the post-processed DP framework. On one hand, we propose the post-processed DP framework with both non-negativity and accurate total population as constraints would inadvertently violate privacy guarantee desired by it. Instead, we propose the post-processed subspace DP framework to accurately define privacy guarantees against adversaries. On the other hand, we identify unfairness level is dependent on privacy budget, count sizes as well as their imbalance level via empirical analysis. Particularly concerning is severe unfairness in the setting of strict privacy budgets. We further trace unfairness back to uniform privacy budget setting over different population subgroups . To address this, we propose a varying privacy budget setting method and develop optimization approaches using ternary search and golden ratio search to identify optimal privacy budget ranges that minimize unfairness while maintaining privacy guarantees. Our extensive theoretical and empirical analysis demonstrates the effectiveness of our approaches in addressing severe unfairness issues across different privacy settings and several canonical privacy mechanisms. Using datasets of Australian Census data, Adult dataset, and delinquent children by county and household head education level, we validate both our privacy analysis framework and fairness optimization methods, showing significant reduction in accuracy disparities while maintaining strong privacy guarantees.

Download





A Many-objective Joint Device Selection and Aggregation Scheme for Federated Learning in IoV

October 2024

·

8 Reads

·

2 Citations

ACM Transactions on Sensor Networks

Advanced mobile communication and data processing technologies have promoted the development of Internet of Things (IoT), but they have also posed challenges to the distributed federated learning mode in the field of Internet of Vehicles (IoV). Faced with a large number of vehicle nodes available for federated training in IoV, the federated learning training task becomes challenging when motivating a large number of vehicles participant. A difficulty posed for federated learning in IoV is heterogeneity challenges caused by massive device participation. Moreover, excessive resource and system maintenance costs associated with a large number of poor-quality devices participating in federated training cannot be ignored. To address these issues, this paper proposes a novel vehicle device selection and aggregation joint optimization model based on a many-objective evolutionary algorithm. The proposed model can be optimized by BiGE algorithm to obtain an optimal subset of vehicle equipment and corresponding weight assignment scheme, thus reducing unnecessary resources waste and budget expenditure while ensuring global model performance. To verify the feasibility of the model, several sets of experiments are conducted to demonstrate that our proposed model has acceptable performance while largely reducing the number budget of participants.


Citations (63)


... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

Reference:

Symmetry Study on Damage Inversion of Wharf Pile Foundation in Three Gorges Reservoir Area Under Ship Impact
A joint vehicular device scheduling and uncertain resource management scheme for Federated Learning in Internet of Vehicles
  • Citing Article
  • February 2025

Information Sciences

... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

A two-stage accelerated search strategy for large-scale multi-objective evolutionary algorithm
  • Citing Article
  • January 2025

Information Sciences

... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

An adaptive interval many-objective evolutionary algorithm with information entropy dominance
  • Citing Article
  • December 2024

Swarm and Evolutionary Computation

... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

Dynamic deadline constrained multi-objective workflow scheduling in multi-cloud environments
  • Citing Article
  • December 2024

Expert Systems with Applications

... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

Cooperative interference to achieve interval many-objective evolutionary algorithm for association privacy secure computing migration
  • Citing Article
  • December 2024

Expert Systems with Applications

... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

A Many-objective Joint Device Selection and Aggregation Scheme for Federated Learning in IoV
  • Citing Article
  • October 2024

ACM Transactions on Sensor Networks

... In recent years, the Laboratory of Complex Systems and Computational Intelligence of Taiyuan University of Science and Technology [20][21][22][23][24][25][26][27][28][29] has done a lot of research on data storage and modeling methods and has obtained a series of research results, among which the new modeling technology mentioned provides reference data for better solving the problem of damage inducement inversion model in this paper. In the follow-up research, we will further optimize the modeling method and deepen the related research of this paper. ...

A multi-task evolutionary algorithm for solving the problem of transfer targets
  • Citing Article
  • October 2024

Information Sciences

... Inbounded and bounded DP [67,68]: If the dataset is not known, you are operating under unbounded DP (e.g., the sets of possible datasets is of any size). In contrast, if the dataset is known, you are operating under bounded DP (e.g., the sets of possible datasets are known size). ...

Bounded and Unbiased Composite Differential Privacy
  • Citing Conference Paper
  • May 2024

... The introduction of edge computing for recognizing human activities results in lower latency as the computational tasks are performed closer to the sources of data [19]. Through edge devices, the HAR systems result in quick response time which makes them favorable for various applications. ...

Special Issue on “Ensuring security for artificial intelligence applications in mobile edge computing software systems”
  • Citing Article
  • June 2024

Software Practice and Experience

... Additionally, supervised gaining knowledge of algorithms like Random Forest or Gradient Boosting Machines can be skilled to classify legitimate and malicious records exchanges, enabling proactive measures to save you unauthorized access or records tampering. Furthermore, federated studying procedures permit collaborative version education through disbursed SIoV nodes while keeping facts private and ensuring that sensitive facts remain protected throughout the study method [16,17]. The contributions of the article are: ...

Resource-aware multi-criteria vehicle participation for federated learning in Internet of vehicles
  • Citing Article
  • April 2024

Information Sciences