ML
Meng Li
14 records found
1
XR Smart Environments Design and Fruition
Personalizing Shared Spaces
The rise of urbanization, overpopulation, and resource depletion in recent years has triggered interest in developing more efficient solutions that could offer sustainable development and improve the quality of life in cities. The increasingly wider and more advanced availability
...
An in-depth exploration of the reaction kinetics and thermo-chemical behaviors of the raceway can offer practical insights for optimizing the operations of blast furnace (BF), thus achieving a more effective iron and steel production process. In this study, the dynamic characteri
...
Smart Parking Services (SPSs) enable cruising drivers to find the nearest parking lot with available spots, reducing the traveling time, gas, and traffic congestion. However, drivers risk the exposure of sensitive location data during parking query to an untrusted Smart Parking S
...
Threshold signature is a powerful cryptographic technique with a large number of real-life applications. As designed by Boneh and Komlo (CRYPTO’22), TAPS is a new threshold signature integrating privacy and accountability. It allows a combiner to combine t signature shares while
...
We analyzed observational and model data to study the sources of formaldehyde over oil and gas production regions and to investigate how these observations may be used to constrain oil and gas volatile organic compound (VOC) emissions. The analysis of aircraft and satellite data
...
Mixing structures and characteristics are crucial to the mixing quality of spherical/cylindrical binary granular systems like the biomass-coal mixtures which can affect energy release and carbon emissions. In this work, the mixing of binary spheres/cylinders in a rotating drum wa
...
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication
An Integrated Oblique Projection Approach
The protection of multicast transmission with optimized secrecy in millimeter-wave (mmWave) communication is still an open problem. In this paper, we propose a low sidelobe secret multicast transmission scheme in mmWave communication based on physical layer security techniques. B
...
Astraea
Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and
...
Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbucks by submitting her/his current location. It is well-acknowledged t
...
Nereus
Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts
Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and thei
...
Shortest distance queries over large-scale graphs bring great benefits to various applications, i.e., save planning time and travelling expenses. To protect the sensitive nodes and edges in the graph, a user outsources an encrypted graph to an untrusted server without losing the
...
Mnemosyne
Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion
Ride-Hailing Service (RHS) has drawn plenty of attention as it provides transportation convenience for riders and financial incentives for drivers. Despite these benefits, riders risk the exposure of sensitive location data during ride requesting to an untrusted Ride-Hailing Serv
...
Traffic-sensitive navigation systems in vehicular networks help drivers avoid traffic jams by providing several realtime navigation routes. However, drivers still encounter privacy concerns because their sensitive locations, i.e., their start point and endpoint, are submitted to
...
LEChain
A blockchain-based lawful evidence management scheme for digital forensics
Lawful evidence management in digital forensics is of paramount importance in police investigations because such evidence is used to convict suspects of crimes. Existing studies have adopted cloud computing to collect evidence and then leveraged blockchain to support the transpar
...