Search Results for author: Chuan Ma

Found 21 papers, 2 papers with code

Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction

no code implementations1 Dec 2023 Shuchi Wu, Chuan Ma, Kang Wei, Xiaogang Xu, Ming Ding, Yuwen Qian, Tao Xiang

This paper introduces RDA, a pioneering approach designed to address two primary deficiencies prevalent in previous endeavors aiming at stealing pre-trained encoders: (1) suboptimal performances attributed to biased optimization objectives, and (2) elevated query costs stemming from the end-to-end paradigm that necessitates querying the target encoder every epoch.

Analysis of Age of Information in Non-terrestrial Networks

no code implementations6 Oct 2023 Yanwu Lu, Howard Yang, Nikolaos Pappas, Giovanni Geraci, Chuan Ma, Tony Q. S. Quek

Our work fills a gap in the literature by providing a comprehensive analysis of AoI in NTN and offers new insights into the performance of LEO satellite networks.

Sparse Federated Training of Object Detection in the Internet of Vehicles

no code implementations7 Sep 2023 Luping Rao, Chuan Ma, Ming Ding, Yuwen Qian, Lu Zhou, Zhe Liu

However, the current object detection methods are mostly based on centralized deep training, that is, the sensitive data obtained by edge devices need to be uploaded to the server, which raises privacy concerns.

Federated Learning Object +2

Personalized Federated Deep Reinforcement Learning-based Trajectory Optimization for Multi-UAV Assisted Edge Computing

no code implementations5 Sep 2023 Zhengrong Song, Chuan Ma, Ming Ding, Howard H. Yang, Yuwen Qian, Xiangwei Zhou

This work proposes a novel solution to address these challenges, namely personalized federated deep reinforcement learning (PF-DRL), for multi-UAV trajectory optimization.

Edge-computing Federated Learning +1

G$^2$uardFL: Safeguarding Federated Learning Against Backdoor Attacks through Attributed Client Graph Clustering

no code implementations8 Jun 2023 Hao Yu, Chuan Ma, Meng Liu, Tianyu Du, Ming Ding, Tao Xiang, Shouling Ji, Xinwang Liu

Through empirical evaluation, comparing G$^2$uardFL with cutting-edge defenses, such as FLAME (USENIX Security 2022) [28] and DeepSight (NDSS 2022) [36], against various backdoor attacks including 3DFed (SP 2023) [20], our results demonstrate its significant effectiveness in mitigating backdoor attacks while having a negligible impact on the aggregated model's performance on benign samples (i. e., the primary task performance).

Anomaly Detection Clustering +2

Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy

no code implementations9 Apr 2023 Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu

Specifically, we first design a random sparsification algorithm to retain a fraction of the gradient elements in each client's local training, thereby mitigating the performance degradation induced by DP and and reducing the number of transmission parameters over wireless channels.

Federated Learning Scheduling +1

RARE: Robust Masked Graph Autoencoder

no code implementations4 Apr 2023 Wenxuan Tu, Qing Liao, Sihang Zhou, Xin Peng, Chuan Ma, Zhe Liu, Xinwang Liu, Zhiping Cai

To address this issue, we propose a novel SGP method termed Robust mAsked gRaph autoEncoder (RARE) to improve the certainty in inferring masked data and the reliability of the self-supervision mechanism by further masking and reconstructing node samples in the high-order latent feature space.

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic

no code implementations27 Feb 2023 Guodong Huang, Chuan Ma, Ming Ding, Yuwen Qian, Chunpeng Ge, Liming Fang, Zhe Liu

To achieve a configurable trade-off between the defense and the network overhead, we further improve the list-based defense by a traffic splitting mechanism, which can combat the mentioned attacks as well as save a considerable amount of network overhead.

Website Fingerprinting Attacks

Providing Location Information at Edge Networks: A Federated Learning-Based Approach

no code implementations17 May 2022 Xin Cheng, Tingting Liu, Feng Shu, Chuan Ma, Jun Li, Jiangzhou Wang

Recently, the development of mobile edge computing has enabled exhilarating edge artificial intelligence (AI) with fast response and low communication cost.

Edge-computing Federated Learning +1

Federated Learning-Based Localization with Heterogeneous Fingerprint Database

no code implementations29 Mar 2022 Xin Cheng, Chuan Ma, Jun Li, Haiwei Song, Feng Shu, Jiangzhou Wang

Fingerprint-based localization plays an important role in indoor location-based services, where the position information is usually collected in distributed clients and gathered in a centralized server.

Federated Learning

Vertical Federated Learning: Challenges, Methodologies and Experiments

no code implementations9 Feb 2022 Kang Wei, Jun Li, Chuan Ma, Ming Ding, Sha Wei, Fan Wu, Guihai Chen, Thilina Ranbaduge

As a special architecture in FL, vertical FL (VFL) is capable of constructing a hyper ML model by embracing sub-models from different clients.

Vertical Federated Learning

Low-Latency Federated Learning over Wireless Channels with Differential Privacy

no code implementations20 Jun 2021 Kang Wei, Jun Li, Chuan Ma, Ming Ding, Cailian Chen, Shi Jin, Zhu Han, H. Vincent Poor

Then, we convert the MAMAB to a max-min bipartite matching problem at each communication round, by estimating rewards with the upper confidence bound (UCB) approach.

Federated Learning

Federated Learning with Unreliable Clients: Performance Analysis and Mechanism Design

1 code implementation10 May 2021 Chuan Ma, Jun Li, Ming Ding, Kang Wei, Wen Chen, H. Vincent Poor

Owing to the low communication costs and privacy-promoting capabilities, Federated Learning (FL) has become a promising tool for training effective machine learning models among distributed clients.

Federated Learning

Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization

no code implementations28 Jan 2021 Kang Wei, Jun Li, Ming Ding, Chuan Ma, Yo-Seb Jeon, H. Vincent Poor

An attacker in FL may control a number of participant clients, and purposely craft the uploaded model parameters to manipulate system outputs, namely, model poisoning (MP).

Federated Learning Model Poisoning

Blockchain Assisted Decentralized Federated Learning (BLADE-FL): Performance Analysis and Resource Allocation

no code implementations18 Jan 2021 Jun Li, Yumeng Shao, Kang Wei, Ming Ding, Chuan Ma, Long Shi, Zhu Han, H. Vincent Poor

Focusing on this problem, we explore the impact of lazy clients on the learning performance of BLADE-FL, and characterize the relationship among the optimal K, the learning parameters, and the proportion of lazy clients.

Federated Learning

Blockchain Assisted Decentralized Federated Learning (BLADE-FL) with Lazy Clients

no code implementations2 Dec 2020 Jun Li, Yumeng Shao, Ming Ding, Chuan Ma, Kang Wei, Zhu Han, H. Vincent Poor

The proposed BLADE-FL has a good performance in terms of privacy preservation, tamper resistance, and effective cooperation of learning.

Federated Learning

When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm

no code implementations20 Sep 2020 Chuan Ma, Jun Li, Ming Ding, Long Shi, Taotao Wang, Zhu Han, H. Vincent Poor

Motivated by the explosive computing capabilities at end user equipments, as well as the growing privacy concerns over sharing sensitive raw data, a new machine learning paradigm, named federated learning (FL) has emerged.

Networking and Internet Architecture

RDP-GAN: A Rényi-Differential Privacy based Generative Adversarial Network

1 code implementation4 Jul 2020 Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor

Generative adversarial network (GAN) has attracted increasing attention recently owing to its impressive ability to generate realistic samples with high privacy protection.

Generative Adversarial Network

User-Level Privacy-Preserving Federated Learning: Analysis and Performance Optimization

no code implementations29 Feb 2020 Kang Wei, Jun Li, Ming Ding, Chuan Ma, Hang Su, Bo Zhang, H. Vincent Poor

According to our analysis, the UDP framework can realize $(\epsilon_{i}, \delta_{i})$-LDP for the $i$-th MT with adjustable privacy protection levels by varying the variances of the artificial noise processes.

Federated Learning Privacy Preserving

Federated Learning with Differential Privacy: Algorithms and Performance Analysis

no code implementations1 Nov 2019 Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H. Yang, Farokhi Farhad, Shi Jin, Tony Q. S. Quek, H. Vincent Poor

Specifically, the theoretical bound reveals the following three key properties: 1) There is a tradeoff between the convergence performance and privacy protection levels, i. e., a better convergence performance leads to a lower protection level; 2) Given a fixed privacy protection level, increasing the number $N$ of overall clients participating in FL can improve the convergence performance; 3) There is an optimal number of maximum aggregation times (communication rounds) in terms of convergence performance for a given protection level.

Federated Learning Privacy Preserving +1

On Safeguarding Privacy and Security in the Framework of Federated Learning

no code implementations14 Sep 2019 Chuan Ma, Jun Li, Ming Ding, Howard Hao Yang, Feng Shu, Tony Q. S. Quek, H. Vincent Poor

Motivated by the advancing computational capacity of wireless end-user equipment (UE), as well as the increasing concerns about sharing private data, a new machine learning (ML) paradigm has emerged, namely federated learning (FL).

Networking and Internet Architecture

Cannot find the paper you are looking for? You can Submit a new open access paper.