Trustworthy AI: From principles to practices

B Li, P Qi, B Liu, S Di, J Liu, J Pei, J Yi… - ACM Computing Surveys, 2023 - dl.acm.org
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …

Differential privacy for industrial internet of things: Opportunities, applications, and challenges

B Jiang, J Li, G Yue, H Song - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …

Towards automated log parsing for large-scale log data analysis

P He, J Zhu, S He, J Li, MR Lyu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Logs are widely used in system management for dependability assurance because they are
often the only data available that record detailed system runtime behaviors in production …

Private spatial data aggregation in the local setting

R Chen, H Li, AK Qin… - 2016 IEEE 32nd …, 2016 - ieeexplore.ieee.org
With the deep penetration of the Internet and mobile devices, privacy preservation in the
local setting has become increasingly relevant. The local setting refers to the scenario where …

Online evaluation for information retrieval

K Hofmann, L Li, F Radlinski - Foundations and Trends® in …, 2016 - nowpublishers.com
Online evaluation is one of the most common approaches to measure the effectiveness of an
information retrieval system. It involves fielding the information retrieval system to real users …

Differential privacy preserving of training model in wireless big data with edge computing

M Du, K Wang, Z **a, Y Zhang - IEEE transactions on big data, 2018 - ieeexplore.ieee.org
With the popularity of smart devices and the widespread use of machine learning methods,
smart edges have become the mainstream of dealing with wireless big data. When smart …

[KIRJA][B] Differential privacy and applications

T Zhu, G Li, W Zhou, SY Philip - 2017 - Springer
Corporations, organizations, and governments have collected, digitized, and stored
information in digital forms since the invention of computers, and the speed of such data …

Dpi: Ensuring strict differential privacy for infinite data streaming

S Feng, M Mohammady, H Wang, X Li… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Streaming data, crucial for applications like crowd-sourcing analytics, behavior studies, and
real-time monitoring, faces significant privacy risks due to the large and diverse data linked …

Privacy preserving smart meter streaming against information leakage of appliance status

Y Hong, WM Liu, L Wang - IEEE transactions on information …, 2017 - ieeexplore.ieee.org
The smart grid frequently collects consumers' fine-grained power usage data through smart
meters to facilitate various applications, such as billing, load monitoring, regional statistics …

Universally harmonizing differential privacy mechanisms for federated learning: Boosting accuracy and convergence

S Feng, M Mohammady, H Hong, S Yan… - arxiv preprint arxiv …, 2024 - arxiv.org
Differentially private federated learning (DP-FL) is a promising technique for collaborative
model training while ensuring provable privacy for clients. However, optimizing the tradeoff …