Zhouyu Li

College of Engineering

Works (7)

Updated: November 4th, 2024 08:52

2024 article

FENDI: Toward High-Fidelity Entanglement Distribution in the Quantum Internet

Gu, H., Li, Z., Yu, R., Wang, X., Zhou, F., Liu, J., & Xue, G. (2024, September 13). IEEE-ACM TRANSACTIONS ON NETWORKING, Vol. 9.

By: H. Gu n, Z. Li n, R. Yu n, X. Wang n, F. Zhou n, J. Liu n, G. Xue*

author keywords: Quantum networks; Quantum entanglement; Protocols; Photonics; Routing; Qubit; Topology; Quantum network; entanglement routing; entanglement fidelity; network optimization; approximation algorithm
Sources: Web Of Science, NC State University Libraries
Added: September 23, 2024

2024 article

Fence: Fee-Based Online Balance-Aware Routing in Payment Channel Networks

Wang, X., Yu, R., Yang, D., Xue, G., Gu, H., Li, Z., & Zhou, F. (2023, October 16). IEEE-ACM TRANSACTIONS ON NETWORKING, Vol. 10.

By: X. Wang n, R. Yu n, D. Yang*, G. Xue*, H. Gu n, Z. Li n, F. Zhou n

author keywords: Routing; Throughput; Blockchains; Bitcoin; Security; Scalability; Privacy; Blockchain; payment channel network; routing; online algorithm; competitive analysis
Sources: Web Of Science, NC State University Libraries
Added: November 13, 2023

2023 article

MetaMorphosis: Task-oriented Privacy Cognizant Feature Generation for Multi-task Learning

PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, pp. 288–300.

By: M. Arefeen*, Z. Li n, M. Uddin* & A. Das n

author keywords: Multi-task learning; neural networks; collaborative intelligence; differential privacy; task privacy
TL;DR: A novel deep learning-based privacy-cognizant feature generation process called “MetaMorphosis” is proposed that outperforms recent adversarial learning and universal feature generation methods by guaranteeing privacy requirements in an efficient way for image and video analytics. (via Semantic Scholar)
Source: Web Of Science
Added: January 16, 2024

2023 article

VoicePM: A Robust Privacy Measurement on Voice Anonymity

PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, pp. 215–226.

By: S. Zhang n, Z. Li n & A. Das n

author keywords: Voice assistant; Voice anonymity; Privacy control
TL;DR: This study develops a tradeoff metric to capture voice biometrics as well as different voice attributes and proposes VoicePM, a robust Voice Privacy Measurement framework, to study the feasibility of applying different state-of-the-art voice anonymization solutions to achieve the optimum tradeoff between privacy and utility. (via Semantic Scholar)
Source: Web Of Science
Added: August 21, 2023

2023 article

When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study

2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 2903–2920.

By: H. Lee, J. Logas, S. Yang, Z. Li, N. Barbosa, Y. Wang, S. Das

Source: Web Of Science
Added: September 5, 2023

2022 article

FedAegis: Edge-Based Byzantine-Robust Federated Learning for Heterogeneous Data

2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), pp. 3005–3010.

By: F. Zhou n, R. Yu n, Z. Li n, H. Gu n & X. Wang n

Contributors: F. Zhou n, R. Yu n, Z. Li n, H. Gu n & X. Wang n

author keywords: Federated learning; edge computing; data heterogeneity; Byzantine robustness; distributionally robust optimization
TL;DR: Experiments show that the proposed FedAegis algorithm can achieve convergence and high accuracy under heterogeneous data and various attack scenarios, while state-of-the-art defenses and robustness mechanisms are non-converging or have reduced average and/or worst-case accuracy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, ORCID, NC State University Libraries
Added: December 4, 2022

2022 article

Why Riding the Lightning? Equilibrium Analysis for Payment Hub Pricing

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), pp. 5409–5414.

By: X. Wang n, H. Gu n, Z. Li n, F. Zhou n, R. Yu n & D. Yang*

Event: IEEE

author keywords: Payment channel network; game theory; price-setting competition; Bertrand competition
TL;DR: This paper applies equilibrium analysis to the price-setting game between two payment hubs in the PCN with limited channel capacities and partial overlap demand and analyzes existence of pure Nash Equilibriums (NEs) and bounds on the equilibrium revenue under various cases, and proposes an algorithm to find all pure NEs. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: December 4, 2022

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.