Wangjie Qiu’s research while affiliated with Beihang University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (22)


Partially Synchronous BFT Consensus Made Practical in Wireless Networks
  • Preprint

December 2024

Shuo Liu

·

·

Yuezhou Zheng

·

[...]

·

Xiuzhen Cheng

Consensus is becoming increasingly important in wireless networks. Partially synchronous BFT consensus, a significant branch of consensus, has made considerable progress in wired networks. However, its implementation in wireless networks, especially in dynamic ad hoc wireless networks, remains challenging. Existing wireless synchronous consensus protocols, despite being well-developed, are not readily adaptable to partially synchronous settings. Additionally, reliable communication, a cornerstone of BFT consensus, can lead to high message and time complexity in wireless networks. To address these challenges, we propose a wireless communication protocol called ReduceCatch (Reduce and Catch) that supports reliable 1-to-N, N-to-1, and N-to-N communications. We employ ReduceCatch to tailor three partially synchronous BFT consensus protocols (PBFT, Tendermint, and HotStuff) for seamless adaptation from wired to ad hoc wireless networks. To evaluate the performance of the ReduceCatch-enabled consensus protocols, we develop a three-layer wireless consensus testbed, based on which we implement 20 distinct consensus protocols and measure their latency and throughput. The experimental results demonstrate the superiority of the ReduceCatch-based consensus protocol in terms of latency and throughput.


Know Your Account: Double Graph Inference-based Account De-anonymization on Ethereum

November 2024

·

2 Reads

The scaled Web 3.0 digital economy, represented by decentralized finance (DeFi), has sparked increasing interest in the past few years, which usually relies on blockchain for token transfer and diverse transaction logic. However, illegal behaviors, such as financial fraud, hacker attacks, and money laundering, are rampant in the blockchain ecosystem and seriously threaten its integrity and security. In this paper, we propose a novel double graph-based Ethereum account de-anonymization inference method, dubbed DBG4ETH, which aims to capture the behavioral patterns of accounts comprehensively and has more robust analytical and judgment capabilities for current complex and continuously generated transaction behaviors. Specifically, we first construct a global static graph to build complex interactions between the various account nodes for all transaction data. Then, we also construct a local dynamic graph to learn about the gradual evolution of transactions over different periods. Different graphs focus on information from different perspectives, and features of global and local, static and dynamic transaction graphs are available through DBG4ETH. In addition, we propose an adaptive confidence calibration method to predict the results by feeding the calibrated weighted prediction values into the classifier. Experimental results show that DBG4ETH achieves state-of-the-art results in the account identification task, improving the F1-score by at least 3.75% and up to 40.52% compared to processing each graph type individually and outperforming similar account identity inference methods by 5.23% to 12.91%.


An Efficient Multi-Party Payment Protocol for IoT Micro-Payments

October 2024

·

7 Reads

IEEE Internet of Things Journal

The blockchain can offer a dependable and secure platform for Internet of Things (IoT) transactions with its distributed and secure network architecture. Unfortunately, it faces challenges such as limited throughput, excessive computational costs, and high transaction fees. Off-chain scaling protocols are used to address the scalability of blockchain for their outstanding performance and efficiency. To mitigate the high-cost interactions with blockchain, previous studies only considered moving transactions of payment hubs (PHs) off-chain, utilizing off-chain operators to aggregate multiple transactions. However, existing PHs overly rely on central operators for system maintenance, greatly increasing the risk of Central Operator Failure (COF). Previous solutions allowed operators to submit Unsettled State Commitments (USC) to the blockchain and overlooked the pessimistic scenario that could lead to state rollbacks. To address these issues, this paper proposes an efficient multi-party payment protocol (HyperPay), aimed at utilizing the off-chain scaling technique to enhance transaction throughput and reduce on-chain cost. Specifically, we first propose a novel off-chain committee and Collateral-based Verifiable Random Leader Election (C-VRE) to elect leaders fairly, thus mitigating the COF problem. Additionally, we design a new state validation mechanism and One-Step Fraud Challenge (OSFC), enabling verifiers to directly construct fraud proofs and challenges on-chain, thereby preventing leaders from submitting USC. Our evaluation indicates that HyperPay reduces on-chain costs of challenge by 80% and boosts peak throughput by a factor of 10X-283X. A comprehensive theoretical analysis and experimental results substantiate the security and effectiveness of our proposed approach.




A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things

July 2024

·

17 Reads

·

1 Citation

IEEE Transactions on Computers

The Practical Byzantine Fault Tolerance (PBFT) protocol-supported blockchain can provide decentralized security and trust mechanisms for the Internet of Things (IoT). However, the PBFT protocol is not specifically designed for IoT applications. Consequently, adapting PBFT to the dynamic changes of an IoT environment with incomplete information represents a challenge that urgently needs to be addressed. To this end, we introduce DA-PBFT, a PBFT dynamic adaptive framework based on a multi-agent architecture. DAPBFT divides the dynamic adaptive process into two sub-processes: optimality-seeking and optimization decision-making. During the optimality-seeking process, a PBFT optimization model is constructed based on deep reinforcement learning. This model is designed to generate PBFT optimization strategies for consensus nodes. In the optimization decision-making process, a PBFT optimization decision consensus mechanism is constructed based on the Borda count method. This mechanism ensures consistency in PBFT optimization decisions within an environment characterized by incomplete information. Furthermore, we designed a dynamic adaptive incentive mechanism to explore the Nash equilibrium conditions and security aspects of DA-PBFT. The experimental results demonstrate that DA-PBFT is capable of achieving consistency in PBFT optimization decisions within an environment of incomplete information, thereby offering robust and efficient transaction throughput for IoT applications.


Safely Learning with Private Data: A Federated Learning Framework for Large Language Model

June 2024

·

4 Reads

Private data, being larger and quality-higher than public data, can greatly improve large language models (LLM). However, due to privacy concerns, this data is often dispersed in multiple silos, making its secure utilization for LLM training a challenge. Federated learning (FL) is an ideal solution for training models with distributed private data, but traditional frameworks like FedAvg are unsuitable for LLM due to their high computational demands on clients. An alternative, split learning, offloads most training parameters to the server while training embedding and output layers locally, making it more suitable for LLM. Nonetheless, it faces significant challenges in security and efficiency. Firstly, the gradients of embeddings are prone to attacks, leading to potential reverse engineering of private data. Furthermore, the server's limitation of handle only one client's training request at a time hinders parallel training, severely impacting training efficiency. In this paper, we propose a Federated Learning framework for LLM, named FL-GLM, which prevents data leakage caused by both server-side and peer-client attacks while improving training efficiency. Specifically, we first place the input block and output block on local client to prevent embedding gradient attacks from server. Secondly, we employ key-encryption during client-server communication to prevent reverse engineering attacks from peer-clients. Lastly, we employ optimization methods like client-batching or server-hierarchical, adopting different acceleration methods based on the actual computational capabilities of the server. Experimental results on NLU and generation tasks demonstrate that FL-GLM achieves comparable metrics to centralized chatGLM model, validating the effectiveness of our federated learning framework.


Defending Against Sophisticated Poisoning Attacks with RL-based Aggregation in Federated Learning

June 2024

Federated learning is highly susceptible to model poisoning attacks, especially those meticulously crafted for servers. Traditional defense methods mainly focus on updating assessments or robust aggregation against manually crafted myopic attacks. When facing advanced attacks, their defense stability is notably insufficient. Therefore, it is imperative to develop adaptive defenses against such advanced poisoning attacks. We find that benign clients exhibit significantly higher data distribution stability than malicious clients in federated learning in both CV and NLP tasks. Therefore, the malicious clients can be recognized by observing the stability of their data distribution. In this paper, we propose AdaAggRL, an RL-based Adaptive Aggregation method, to defend against sophisticated poisoning attacks. Specifically, we first utilize distribution learning to simulate the clients' data distributions. Then, we use the maximum mean discrepancy (MMD) to calculate the pairwise similarity of the current local model data distribution, its historical data distribution, and global model data distribution. Finally, we use policy learning to adaptively determine the aggregation weights based on the above similarities. Experiments on four real-world datasets demonstrate that the proposed defense model significantly outperforms widely adopted defense models for sophisticated attacks.


The “1 + N + 1” sharding blockchain architecture for mega-constellation.
Domain consensus flowchart.
Cross-domain consensus flowchart.
System throughput result analysis.
The relationship between system messaging complexity and consensus nodes.

+5

The Node Security Access Authentication Method for Mega-Constellation based on Sharding Blockchain
  • Article
  • Full-text available

May 2024

·

35 Reads

·

1 Citation

The mega-constellation is a major future development direction for space-based technologies in communications, navigation,remote sensing, and other fields. However, there are marked security threats to the mega-constellation. Traditional password-based security protection techniques are inefficient for vast node access authentication because they lack a unified management system and methodology. To address the aforementioned issues, this work presents a mega-constellation node security access authentication technique based on sharding blockchain via the “1 + N + 1” mega-constellation security and trustworthiness architecture. We build a distributed node security access authentication system based on functional domains and functional cross-domains, and we develop mathematical models for the complexity of messaging and space, the throughput of transactions, and the overall estimation of sharding blockchain systems. The results demonstrate that every indicator outperforms conventional blockchain techniques, which has major implications for mega-constellation by creating a complete link security and trustworthiness system. A universal solution for the number of consensus nodes I and the number of shards N is found, which can be used to guide parameter design in mega-constellation sharding blockchain systems.

Download

Exploring Edge-driven Collaborative Fine-tuning Towards Customized AIGC Services

January 2024

·

8 Reads

IEEE Network

With the popularization of artificial intelligence-generated content (AIGC), the explosion of end users is spurring an unprecedented diversity in preferences. To cope with this challenge, the AIGC paradigm is shifting from cloud-driven pre-trained large models to edge-driven personalized customization models. The former are large-scale models with more than 100 billion parameters trained based on massive data, while the latter introduce heterogeneous user preferences or professional knowledge to fine-tune the former. However, such fine-tuning incurs costly resource consumption and privacy disclosure. In this paper, we offer a holistic perspective on the AIGC fine-tuning framework spanning from end user to edge to cloud. Specifically, we first investigate how to deploy an edge-driven collaborative fine-tuning task through federated learning. Then, we discuss a verifiable model consensus protocol and fairness incentive design for edge servers to participate in a collaborative learning task. In addition, a case study focuses on the medical scenario, where we develop a practical X-ray diagnostic demo through collaborative fine-tuning of a multimodal pre-training model, and the diagnostic dialogue and performance results are compared. Finally, potential research directions are identified to advance the edge-driven customized AIGC services.


Citations (7)


... However, they require substantial training data and extensive computational resources, posing significant challenges for practical deployment [18]. To address these challenges, distributed deployment has been proposed as a promising solution [14,22,32,37,43,46]. By distributing the computational workload across multiple platforms, this approach reduces resource strain on individual systems and enables the integration of private client data into training while maintaining data security [4,43]. ...

Reference:

Feature Coding in the Era of Large Models: Dataset, Test Conditions, and Benchmark
Safely Learning with Private Data: A Federated Learning Framework for Large Language Model
  • Citing Conference Paper
  • January 2024

... However, since the PBFT protocol was not originally designed for IoT, adapting it to the dynamic and information-constrained nature of IoT environments can be challenging. In [24] a dynamic adaptive PBFT framework based on a multi-agent architecture is introduced. In [18], where POS (Proof of Stake) [25] is implemented, the stake amount of nodes is used to form SCs. Additionally, in this protocol, a node that is selected as a block proposer in the current epoch, will have reduced chances of being selected as a block proposer in the next epoch and it will likely only have the chance to attest. ...

A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things
  • Citing Article
  • July 2024

IEEE Transactions on Computers

... Current studies on the in-orbit test methods for inter-satellite links' performance highlight constellations that have been constructed. However, the construction of megaconstellations always takes several years [25,26]. During the construction of the constellation, due to the loose distribution of the satellites, the distance and visibility between satellites might not satisfy the constraints for establishing an inter-satellite link [27]. ...

The Node Security Access Authentication Method for Mega-Constellation based on Sharding Blockchain

... This algorithm provides a reliable technical means to achieve secure asset exchange. Jinzhong Li and colleagues [28] introduced a universally adaptable cross-chain transaction protocol that leverages hash time-locking technology. This protocol employs cross-chain tech to address issues of network isolation and facilitate interoperability within the energy sector's blockchain. ...

A Cross-Chain Transaction Model for Power Blockchain Based on Hash-Locking Mechanism
  • Citing Conference Paper
  • September 2023

... In [10], to improve the efficiency of transaction verification and dissemination in blockchain systems, a reputationbased transaction processing mechanism was constructed to evaluate the reputation of the transaction source and prevent suspicious transactions from untrusted nodes. Smart contract automated implementation of the protocol, combined with zero-knowledge proofs and ringsignature techniques, for anonymous transaction tracking and tracking the flow of money without destroying privacy, provide partial ideas for the protocol in this paper [11][12][13]. ...

A Secure and Flexible Blockchain-Based Offline Payment Protocol
  • Citing Article
  • January 2023

IEEE Transactions on Computers

... Defense learning has emerged as a promising and practical approach to mitigate adversarial attacks for DNNs. Recent eforts in this feld have yielded a categorization of defense learning techniques into the following three main categories: data-based defense [10][11][12][13][14][15], model-based defense [16][17][18][19][20], and multimodel defense [21][22][23]. Data-based defense involves preprocessing input samples to accentuate features of adversarial examples or eliminate perturbed locations. ...

Turbo: A High-Performance and Secure Off-Chain Payment Hub

Lecture Notes in Computer Science

... In response to serious security challenges such as single points of failure and the lack of privacy that centralized federated learning frameworks still face, Wang et al. [106] proposed a personalized federation algorithm based on permissioned blockchain. By conducting experiments on the MNIST data set, it is proven that high-precision protection against poisoning attacks can be achieved and applied to edge computing scenarios. ...

Personalized Federated Learning System Based on Permissioned Blockchain
  • Citing Conference Paper
  • December 2021