Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chenglin Miao is active.

Publication


Featured researches published by Chenglin Miao.


international conference on computer communications | 2017

A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems

Chenglin Miao; Lu Su; Wenjun Jiang; Yaliang Li; Miaomiao Tian

The recent proliferation of human-carried mobile devices has given rise to the mobile crowd sensing (MCS) systems. However, the sensory data provided by the participating workers are usually not reliable. As an efficient technique to extract truthful information from unreliable data, truth discovery has drawn significant attention. Currently, the privacy concern of the participating workers poses a major challenge on the design of truth discovery mechanisms. Although the existing mechanism can conduct truth discovery with high accuracy and strong privacy guarantee, tremendous overhead is incurred on the worker side. In this paper, we propose a novel lightweight privacy preserving truth discovery framework, L-PPTD, which is implemented by involving two non-colluding cloud platforms and adopting additively homomorphic cryptosystem. This framework not only achieves the protection of each workers sensory data and reliability information but also introduces little overhead to the workers. In order to further reduce each workers overhead in the scenarios where only the sensory data need to be protected, we propose another more lightweight framework named L2-PPTD. The desirable performance of the proposed frameworks is verified through extensive experiments conducted on real world MCS systems.


international world wide web conferences | 2018

Attack under Disguise: An Intelligent Data Poisoning Attack Mechanism in Crowdsourcing

Chenglin Miao; Qi Li; Lu Su; Mengdi Huai; Wenjun Jiang; Jing Gao

As an effective way to solicit useful information from the crowd, crowdsourcing has emerged as a popular paradigm to solve challenging tasks. However, the data provided by the participating workers are not always trustworthy. In real world, there may exist malicious workers in crowdsourcing systems who conduct the data poisoning attacks for the purpose of sabotage or financial rewards. Although data aggregation methods such as majority voting are conducted on workers» labels in order to improve data quality, they are vulnerable to such attacks as they treat all the workers equally. In order to capture the variety in the reliability of workers, the Dawid-Skene model, a sophisticated data aggregation method, has been widely adopted in practice. By conducting maximum likelihood estimation (MLE) using the expectation maximization (EM) algorithm, the Dawid-Skene model can jointly estimate each worker»s reliability and conduct weighted aggregation, and thus can tolerate the data poisoning attacks to some degree. However, the Dawid-Skene model still has weakness. In this paper, we study the data poisoning attacks against such crowdsourcing systems with the Dawid-Skene model empowered. We design an intelligent attack mechanism, based on which the attacker can not only achieve maximum attack utility but also disguise the attacking behaviors. Extensive experiments based on real-world crowdsourcing datasets are conducted to verify the desirable properties of the proposed mechanism.


IEEE Transactions on Parallel and Distributed Systems | 2018

Towards Quality Aware Information Integration in Distributed Sensing Systems

Wenjun Jiang; Chenglin Miao; Lu Su; Qi Li; Shaohan Hu; Shiguang Wang; Jing Gao; Hengchang Liu; Tarek F. Abdelzaher; Jiawei Han; Xue Liu; Yan Gao; Lance M. Kaplan

In this paper, we present GDA, a generalized decision aggregation framework that integrates information from distributed sensor nodes for decision making in a resource efficient manner. Different from traditional approaches, our proposed GDA framework is able to not only estimate the reliability of each sensor, but also take advantage of its confidence information, and thus achieves higher decision accuracy. Targeting generalized problem domains, our framework can naturally handle the scenarios where different sensor nodes observe different sets of events whose numbers of possible classes may also be different. GDA also makes no assumption about the availability level of ground truth label information, while being able to take advantage of any if present. For these reasons, our approach can be applied to a much broader spectrum of sensing scenarios. In this paper, we also propose two extensions of the GDA framework, i.e., incremental GDA (I-GDA) and parallel GDA (P-GDA) to deal with streaming and large-scale data. The advantages of our proposed methods are demonstrated through both theoretic analysis and extensive experiments.


knowledge discovery and data mining | 2018

An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery

Yaliang Li; Chenglin Miao; Lu Su; Jing Gao; Qi Li; Bolin Ding; Zhan Qin; Kui Ren

Soliciting answers from online users is an efficient and effective solution to many challenging tasks. Due to the variety in the quality of users, it is important to infer their ability to provide correct answers during aggregation. Therefore, truth discovery methods can be used to automatically capture the user quality and aggregate user-contributed answers via a weighted combination. Despite the fact that truth discovery is an effective tool for answer aggregation, existing work falls short of the protection towards the privacy of participating users. To fill this gap, we propose perturbation-based mechanisms that provide users with privacy guarantees and maintain the accuracy of aggregated answers. We first present a one-layer mechanism, in which all the users adopt the same probability to perturb their answers. Aggregation is then conducted on perturbed answers but the aggregation accuracy could drop accordingly. To improve the utility, a two-layer mechanism is proposed where users are allowed to sample their own probabilities from a hyper distribution. We theoretically compare the one-layer and two-layer mechanisms, and prove that they provide the same privacy guarantee while the two-layer mechanism delivers better utility. This advantage is brought by the fact that the two-layer mechanism can utilize the estimated user quality information from truth discovery to reduce the accuracy loss caused by perturbation, which is confirmed by experimental results on real-world datasets. Experimental results also demonstrate the effectiveness of the proposed two-layer mechanism in privacy protection with tolerable accuracy loss in aggregation.


knowledge discovery and data mining | 2018

Metric Learning from Probabilistic Labels

Mengdi Huai; Chenglin Miao; Yaliang Li; Qiuling Suo; Lu Su; Aidong Zhang

Metric learning aims to learn a good distance metric that can capture the relationships among instances, and its importance has long been recognized in many fields. In the traditional settings of metric learning, an implicit assumption is that the associated labels of the instances are deterministic. However, in many real-world applications, the associated labels come naturally with probabilities instead of deterministic values. Thus, the existing metric learning methods cannot work well in these applications. To tackle this challenge, in this paper, we study how to effectively learn the distance metric from datasets that contain probabilistic information, and then propose two novel metric learning mechanisms for two types of probabilistic labels, i.e., the instance-wise probabilistic label and the group-wise probabilistic label. Compared with the existing metric learning methods, our proposed mechanisms are capable of learning distance metrics directly from the probabilistic labels with high accuracy. We also theoretically analyze the two proposed mechanisms and provide theoretical bounds on the sample complexity for both of them. Additionally, extensive experiments based on real-world datasets are conducted to verify the desirable properties of the proposed mechanisms.


acm/ieee international conference on mobile computing and networking | 2018

Towards Environment Independent Device Free Human Activity Recognition

Wenjun Jiang; Dimitrios Koutsonikolas; Wenyao Xu; Lu Su; Chenglin Miao; Fenglong Ma; Shuochao Yao; Yaqing Wang; Ye Yuan; Hongfei Xue; Chen Song; Xin Ma

Driven by a wide range of real-world applications, significant efforts have recently been made to explore device-free human activity recognition techniques that utilize the information collected by various wireless infrastructures to infer human activities without the need for the monitored subject to carry a dedicated device. Existing device free human activity recognition approaches and systems, though yielding reasonably good performance in certain cases, are faced with a major challenge. The wireless signals arriving at the receiving devices usually carry substantial information that is specific to the environment where the activities are recorded and the human subject who conducts the activities. Due to this reason, an activity recognition model that is trained on a specific subject in a specific environment typically does not work well when being applied to predict another subjects activities that are recorded in a different environment. To address this challenge, in this paper, we propose EI, a deep-learning based device free activity recognition framework that can remove the environment and subject specific information contained in the activity data and extract environment/subject-independent features shared by the data collected on different subjects under different environments. We conduct extensive experiments on four different device free activity recognition testbeds: WiFi, ultrasound, 60 GHz mmWave, and visible light. The experimental results demonstrate the superior effectiveness and generalizability of the proposed EI framework.


international conference on embedded networked sensor systems | 2015

Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems

Chenglin Miao; Wenjun Jiang; Lu Su; Yaliang Li; Suxin Guo; Zhan Qin; Houping Xiao; Jing Gao; Kui Ren


international conference on distributed computing systems | 2018

Towards Personalized Learning in Mobile Sensing Systems

Wenjun Jiang; Qi Li; Lu Su; Chenglin Miao; Quanquan Gu; Wenyao Xu


siam international conference on data mining | 2018

Uncorrelated Patient Similarity Learning.

Mengdi Huai; Chenglin Miao; Qiuling Suo; Yaliang Li; Jing Gao; Aidong Zhang


mobile ad hoc networking and computing | 2018

Towards Data Poisoning Attacks in Crowd Sensing Systems

Chenglin Miao; Qi Li; Houping Xiao; Wenjun Jiang; Mengdi Huai; Lu Su

Collaboration


Dive into the Chenglin Miao's collaboration.

Top Co-Authors

Avatar

Lu Su

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jing Gao

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar

Qi Li

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kui Ren

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar

Zhan Qin

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge