Skip to main content

Showing 1–10 of 10 results for author: Au, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.11224  [pdf, other

    cs.LG cs.CR

    Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement

    Authors: Chi Zhang, **g**g Fan, Man Ho Au, Siu Ming Yiu

    Abstract: Replacing non-polynomial functions (e.g., non-linear activation functions such as ReLU) in a neural network with their polynomial approximations is a standard practice in privacy-preserving machine learning. The resulting neural network, called polynomial approximation of neural network (PANN) in this paper, is compatible with advanced cryptosystems to enable privacy-preserving model inference. Us… ▽ More

    Submitted 7 June, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

  2. arXiv:2401.15008  [pdf, other

    cs.NI

    Reinforcement Learning-based Relay Selection for Cooperative WSNs in the Presence of Bursty Impulsive Noise

    Authors: Hazem Barka, Md Sahabul Alam, Georges Kaddoum, Minh Au, Basile L. Agba

    Abstract: The problem of relay selection is pivotal in the realm of cooperative communication. However, this issue has not been thoroughly examined, particularly when the background noise is assumed to possess an impulsive characteristic with consistent memory as observed in smart grid communications and some other wireless communication scenarios. In this paper, we investigate the impact of this specific t… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: Accepted in 2024 IEEE Wireless Communications and Networking Conference

  3. Digital Twinning in Smart Grid Networks: Interplay, Resource Allocation and Use Cases

    Authors: Abdullah Othman, Georges Kaddoum, Joao V. C. Evangelista, Minh Au, Basile L. Agba

    Abstract: Motivated by climate change, increasing industrialization and energy reliability concerns, the smart grid is set to revolutionize traditional power systems. Moreover, the exponential annual rise in number of grid-connected users and emerging key players e.g. electric vehicles strain the limited radio resources, which stresses the need for novel and scalable resource management techniques. Digital… ▽ More

    Submitted 26 June, 2023; originally announced July 2023.

    Comments: 7 pages, 3 figures

  4. arXiv:2212.08792  [pdf, other

    cs.CR

    Stateful Switch: Optimized Time Series Release with Local Differential Privacy

    Authors: Qingqing Ye, Haibo Hu, Kai Huang, Man Ho Au, Qiao Xue

    Abstract: Time series data have numerous applications in big data analytics. However, they often cause privacy issues when collected from individuals. To address this problem, most existing works perturb the values in the time series while retaining their temporal order, which may lead to significant distortion of the values. Recently, we propose TLDP model that perturbs temporal perturbation to ensure priv… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: This paper is accepted and will appear in INFOCOM 2023 as regular research paper

  5. arXiv:2005.05531  [pdf, other

    cs.CR

    Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage

    Authors: Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang

    Abstract: How to audit outsourced data in centralized storage like cloud is well-studied, but it is largely under-explored for the rising decentralized storage network (DSN) that bodes well for a billion-dollar market. To realize DSN as a usable service in a truly decentralized manner, the blockchain comes in handy -- to record and verify audit trails in forms of proof of storage, and based on that, to hand… ▽ More

    Submitted 6 August, 2020; v1 submitted 11 May, 2020; originally announced May 2020.

  6. arXiv:1912.07153  [pdf, other

    cs.DS

    Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup

    Authors: Yue Fu, Rong Du, Haibo Hu, Man Ho Au, Dagang Li

    Abstract: With the growing scale of big data, probabilistic structures receive increasing popularity for efficient approximate storage and query processing. For example, Bloom filters (BF) can achieve satisfactory performance for approximate membership existence query at the expense of false positives. However, a standard Bloom filter can only handle univariate data and single membership existence query, wh… ▽ More

    Submitted 15 December, 2019; originally announced December 2019.

  7. Early Detection for Optimal-Latency Communications in Multi-Hop Links

    Authors: Diego Barragán Guerrero, Minh Au, Ghyslain Gagnon, François Gagnon, Pascal Giard

    Abstract: Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate transmission rates that are lower than the channel capacity. To guarantee arbitrarily-low error probability, this implies the use of messages who… ▽ More

    Submitted 8 July, 2019; v1 submitted 4 July, 2019; originally announced July 2019.

    Comments: 6 pages, to be presented at the International Symposium on Wireless Communication Systems (ISWCS) 2019; Fixed some references

  8. arXiv:1712.06438  [pdf, other

    cs.CR

    An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks

    Authors: Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang

    Abstract: The gas mechanism in Ethereum charges the execution of every operation to ensure that smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated. Failing to properly set the gas costs of EVM operations allows attackers to launch DoS attacks on Ethereum. Although Ethereum recently adjusted the gas costs of EVM operations to defend against known DoS attacks, it remains u… ▽ More

    Submitted 4 November, 2020; v1 submitted 18 December, 2017; originally announced December 2017.

    Journal ref: In International Conference on Information Security Practice and Experience (ISPEC 2017)

  9. Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

    Authors: Dagang Li, Rong Du, Man Ho Au, Yue Fu

    Abstract: In this letter we propose Meta-key, a data-sharing mechanism that enables users share their encrypted data under a blockchain-based decentralized storage architecture. All the data-encryption keys are encrypted by the owner's public key and put onto the blockchain for safe and secure storage and easy key-management. Encrypted data are stored in dedicated storage nodes and proxy re-encryption mecha… ▽ More

    Submitted 24 May, 2020; v1 submitted 22 October, 2017; originally announced October 2017.

    Journal ref: IEEE Networking Letters (2019) 30-33

  10. arXiv:1610.00017  [pdf, ps, other

    cs.IT

    On Optimal Latency of Communications

    Authors: Minh Au, Francois Gagnon

    Abstract: In this paper we investigate the optimal latency of communications. Focusing on fixed rate communication without any feedback channel, this paper encompasses low-latency strategies with which one hop and multi-hop communication issues are treated from an information theoretic perspective. By defining the latency as the time required to make decisions, we prove that if short messages can be transmi… ▽ More

    Submitted 4 January, 2017; v1 submitted 30 September, 2016; originally announced October 2016.