Mobile edge intelligence for large language models: A contemporary survey

G Qu, Q Chen, W Wei, Z Lin, X Chen… - … Surveys & Tutorials, 2025 - ieeexplore.ieee.org
On-device large language models (LLMs), referring to running LLMs on edge devices, have
raised considerable interest since they are more cost-effective, latency-efficient, and privacy …

An efficient privacy-aware split learning framework for satellite communications

J Sun, C Wu, S Mumtaz, J Tao, M Cao… - IEEE Journal on …, 2024 - ieeexplore.ieee.org
In the rapidly evolving domain of satellite communications, integrating advanced machine
learning techniques, particularly split learning, is crucial for enhancing data processing and …

Wafbooster: Automatic boosting of waf security against mutated malicious payloads

C Wu, J Chen, S Zhu, W Feng, K He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Web application firewall (WAF) examines malicious traffic to and from a web application via
a set of security rules. It plays a significant role in securing Web applications against web …

[HTML][HTML] Touchscreen gestures as images. A transfer learning approach for soft biometric traits recognition

A Guarino, D Malandrino, R Zaccagnino… - Expert Systems with …, 2023 - Elsevier
Mobile devices are nowadays ubiquitous. They are equipped with a variety of sensors, each
designed for capturing specific signals which can be exploited to acquire discriminating …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph

R Liang, J Chen, C Wu, K He, Y Wu, W Sun… - ACM Transactions on …, 2024 - dl.acm.org
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent
years, causing massive financial losses. Existing detection methods primarily focus on rule …

Semantic sleuth: Identifying ponzi contracts via large language models

C Wu, J Chen, Z Wang, R Liang, R Du - Proceedings of the 39th IEEE …, 2024 - dl.acm.org
Smart contracts, self-executing agreements directly encoded in code, are fundamental to
blockchain technology, especially in decentralized finance (DeFi) and Web3. However, the …

Privacy-preserving universal adversarial defense for black-box models

Q Li, C Wu, J Chen, Z Zhang, K He, R Du… - arXiv preprint arXiv …, 2024 - arxiv.org
Deep neural networks (DNNs) are increasingly used in critical applications such as identity
authentication and autonomous driving, where robustness against adversarial attacks is …

Dynashard: Secure and adaptive blockchain sharding protocol with hybrid consensus and dynamic shard management

A Liu, J Chen, K He, R Du, J Xu, C Wu… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Blockchain sharding has emerged as a promising solution to the scalability challenges in
traditional blockchain systems by partitioning the network into smaller, manageable subsets …

Merit: Multimodal wearable vital sign waveform monitoring

Y Tang, Z Chen, A Li, T Zheng, Z Lin, J Xu, P Lv… - arXiv preprint arXiv …, 2024 - arxiv.org
Cardiovascular disease (CVD) is the leading cause of death and premature mortality
worldwide, with occupational environments significantly influencing CVD risk, underscoring …