default search action
Yuan Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j54]Yuan Hong, Yang Xu, Mu Hu:
Aggregation-Based Perceptual Deep Model for Scenic Image Recognition. IEEE Access 12: 67368-67378 (2024) - [j53]Yang Xu, Yuan Hong, Xinchen Li, Mu Hu:
MedTrans: Intelligent Computing for Medical Diagnosis Using Multiscale Cross-Attention Vision Transformer. IEEE Access 12: 146575-146586 (2024) - [j52]Rui Zhang, Yao Wang, Zhi Li, Yushu Shi, Danping Yu, Qiang Huang, Feng Chen, Wenbo Xiao, Yuan Hong, Zhan Feng:
Dynamic radiomics based on contrast-enhanced MRI for predicting microvascular invasion in hepatocellular carcinoma. BMC Medical Imaging 24(1): 80 (2024) - [j51]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. Proc. ACM Manag. Data 2(1): 30:1-30:27 (2024) - [j50]Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. IEEE Trans. Dependable Secur. Comput. 21(1): 31-46 (2024) - [j49]Xinyu Zhang, Huiyu Xu, Zhongjie Ba, Zhibo Wang, Yuan Hong, Jian Liu, Zhan Qin, Kui Ren:
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents. IEEE Trans. Dependable Secur. Comput. 21(6): 5242-5258 (2024) - [j48]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9534-9549 (2024) - [c61]Caridad Arroyo Arevalo, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong, Binghui Wang:
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks. AAAI 2024: 10909-10917 - [c60]Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong:
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence. CCS 2024: 600-614 - [c59]Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang:
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses. CCS 2024: 2829-2843 - [c58]Yuxin Yang, Qiang Li, Chenfei Nie, Yuan Hong, Binghui Wang:
Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework. CIKM 2024: 2930-2939 - [c57]Matta Varun, Shuya Feng, Han Wang, Shamik Sural, Yuan Hong:
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response. CODASPY 2024: 307-318 - [c56]Junyi Wu, Weitai Kang, Hao Tang, Yuan Hong, Yan Yan:
On the Faithfulness of Vision Transformer Explanations. CVPR 2024: 10936-10945 - [c55]Yinhao Wu, Jinzhou Tang, Zequan Yao, Mingjie Li, Yuan Hong, Dongdong Yu, Zhifan Gao, Bin Chen, Shen Zhao:
VertFound: Synergizing Semantic and Spatial Understanding for Fine-Grained Vertebrae Classification via Foundation Models. MICCAI (12) 2024: 763-772 - [c54]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. SP 2024: 1009-1027 - [c53]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. SP 2024: 2920-2938 - [c52]Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang:
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks. USENIX Security Symposium 2024 - [c51]Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong:
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection. USENIX Security Symposium 2024 - [i40]Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang:
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks. CoRR abs/2403.02116 (2024) - [i39]Junyi Wu, Weitai Kang, Hao Tang, Yuan Hong, Yan Yan:
On the Faithfulness of Vision Transformer Explanations. CoRR abs/2404.01415 (2024) - [i38]Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao:
Differentially Private Federated Learning: A Systematic Review. CoRR abs/2405.08299 (2024) - [i37]Jieren Deng, Hanbin Hong, Aaron Palmer, Xin Zhou, Jinbo Bi, Kaleel Mahmood, Yuan Hong, Derek Aguiar:
Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness. CoRR abs/2405.16036 (2024) - [i36]Qin Yang, Meisam Mohammady, Han Wang, Ali Payani, Ashish Kundu, Kai Shu, Yan Yan, Yuan Hong:
LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models. CoRR abs/2405.18776 (2024) - [i35]Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong:
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection. CoRR abs/2406.06822 (2024) - [i34]Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang:
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses. CoRR abs/2407.08935 (2024) - [i33]Shuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang, Yuan Hong:
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence. CoRR abs/2407.14710 (2024) - [i32]Yuxin Yang, Qiang Li, Chenfei Nie, Yuan Hong, Meng Pang, Binghui Wang:
A Learning-Based Attack Framework to Break SOTA Poisoning Defenses in Federated Learning. CoRR abs/2407.15267 (2024) - [i31]Zifan Wang, Binghui Zhang, Meng Pang, Yuan Hong, Binghui Wang:
Understanding Data Reconstruction Leakage in Federated Learning from a Theoretical Perspective. CoRR abs/2408.12119 (2024) - [i30]Yuxin Yang, Qiang Li, Yuan Hong, Binghui Wang:
FedGMark: Certifiably Robust Watermarking for Federated Graph Learning. CoRR abs/2410.17533 (2024) - [i29]Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, Yuan Hong:
Efficient Differentially Private Set Intersection. IACR Cryptol. ePrint Arch. 2024: 1239 (2024) - 2023
- [j47]Lu Ou, Yi He, Shaolin Liao, Zheng Qin, Yuan Hong, Dafang Zhang, Xiaohua Jia:
FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks. IEEE Access 11: 31829-31841 (2023) - [j46]Shangyu Xie, Yan Yan, Yuan Hong:
Stealthy 3D Poisoning Attack on Video Recognition Models. IEEE Trans. Dependable Secur. Comput. 20(2): 1730-1743 (2023) - [j45]Feilong Wang, Yuan Hong, Xuegang Ban:
Infrastructure-Enabled GPS Spoofing Detection and Correction. IEEE Trans. Intell. Transp. Syst. 24(12): 13878-13892 (2023) - [j44]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing. IEEE Trans. Knowl. Data Eng. 35(1): 1-15 (2023) - [c50]Yuan Hong, Dirk Arnold:
Evolutionary Mixed-Integer Optimization with Explicit Constraints. GECCO 2023: 822-830 - [c49]Fereshteh Razmi, Jian Lou, Yuan Hong, Li Xiong:
Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records. ECML/PKDD (3) 2023: 446-461 - [i28]Hanbin Hong, Yuan Hong:
Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples. CoRR abs/2304.04343 (2023) - [i27]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. CoRR abs/2307.16630 (2023) - [i26]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. CoRR abs/2310.13424 (2023) - [i25]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. CoRR abs/2311.16062 (2023) - [i24]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. CoRR abs/2312.04738 (2023) - [i23]Caridad Arroyo Arevalo, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong, Binghui Wang:
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning Against Attribute Inference Attacks. CoRR abs/2312.06989 (2023) - [i22]Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong:
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage. IACR Cryptol. ePrint Arch. 2023: 1619 (2023) - 2022
- [j43]Gang Yu, Wenlong Yang, Jingkun Zhang, Qi Zhang, Jian Zhou, Yuan Hong, Jiaojiao Luo, Quan Shi, Zhidan Yang, Kangyu Zhang, Hong Tu:
Application of a nomogram to radiomics labels in the treatment prediction scheme for lumbar disc herniation. BMC Medical Imaging 22(1): 51 (2022) - [j42]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. Proc. VLDB Endow. 16(2): 202-215 (2022) - [c48]Zhang Yang, Tao Ping, Liu Rui, Xianghong Li, Li Ran, Yaping Li, Yang Guang, Yuan Hong:
Observation Geometry Improvement of BDS by Near-Space Balloons in Regional Navigation Augmentation. AsiaSim (2) 2022: 153-163 - [c47]Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. CCS 2022: 2809-2823 - [c46]Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong:
Poster: Cryptographic Inferences for Video Deep Neural Networks. CCS 2022: 3395-3397 - [c45]Yuan Hong, Lingyu Wang:
WPES '22: 21st Workshop on Privacy in the Electronic Society. CCS 2022: 3535-3537 - [c44]Hanbin Hong, Binghui Wang, Yuan Hong:
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing. ECCV (5) 2022: 86-103 - [c43]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract). ICDE 2022: 1549-1550 - [c42]Han Wang, Jayashree Sharma, Shuya Feng, Kai Shu, Yuan Hong:
A Model-Agnostic Approach to Differentially Private Topic Mining. KDD 2022: 1835-1845 - [c41]Shangyu Xie, Yuan Hong:
Differentially Private Instance Encoding against Privacy Attacks. NAACL-HLT (Student Research Workshop) 2022: 172-180 - [c40]Shangyu Xie, Han Wang, Yu Kong, Yuan Hong:
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems. SP 2022: 1390-1407 - [e2]Chunjie Cao, Yuqing Zhang, Yuan Hong, Ding Wang:
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers. Communications in Computer and Information Science 1558, Springer 2022, ISBN 978-981-19-0522-3 [contents] - [e1]Yuan Hong, Lingyu Wang:
Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9873-2 [contents] - [i21]Hanbin Hong, Yuan Hong, Yu Kong:
An Eye for an Eye: Defending against Gradient-based Attacks with Gradients. CoRR abs/2202.01117 (2022) - [i20]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - [i19]Hanbin Hong, Binghui Wang, Yuan Hong:
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing. CoRR abs/2207.02152 (2022) - [i18]Hanbin Hong, Yuan Hong:
Certified Adversarial Robustness via Anisotropic Randomized Smoothing. CoRR abs/2207.05327 (2022) - [i17]Canyu Chen, Yueqing Liang, Xiongxiao Xu, Shangyu Xie, Yuan Hong, Kai Shu:
On Fair Classification with Mostly Private Sensitive Attributes. CoRR abs/2207.08336 (2022) - [i16]Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. CoRR abs/2209.15091 (2022) - [i15]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. CoRR abs/2210.01318 (2022) - 2021
- [j41]Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong:
Privacy preserving divisible double auction with a hybridized TEE-blockchain system. Cybersecur. 4(1): 37 (2021) - [j40]Yuan Hong, Valérie Issarny, Surya Nepal, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Dependable Secur. Comput. 18(4): 1511-1512 (2021) - [j39]Bingyu Liu, Shangyu Xie, Han Wang, Yuan Hong, Xuegang Ban, Meisam Mohammady:
VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility. IEEE Trans. Dependable Secur. Comput. 18(6): 2643-2657 (2021) - [j38]Yuan Hong, Valérie Issarny, Surya Nepal, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Emerg. Top. Comput. 9(3): 1328-1329 (2021) - [j37]Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [j36]Cheng Fang, Haibing Lu, Yuan Hong, Shan Liu, Jasmine Chang:
Dynamic Pricing for Electric Vehicle Extreme Fast Charging. IEEE Trans. Intell. Transp. Syst. 22(1): 531-541 (2021) - [c39]Fake Lin, Weican Cao, Wen Zhang, Liyi Chen, Yuan Hong, Tong Xu, Chang Tan:
Knowledge-Enhanced Retrieval: A Scheme for Question Answering. CCKS (Evaluation Track) 2021: 102-113 - [c38]Shangyu Xie, Yuan Hong:
Reconstruction Attack on Instance Encoding for Language Understanding. EMNLP (1) 2021: 2038-2044 - [c37]Shangyu Xie, Bingyu Liu, Yuan Hong:
Privacy-Preserving Cloud-Based DNN Inference. ICASSP 2021: 2675-2679 - [c36]Bingyu Liu, Yuanzhou Yang, Rujia Wang, Yuan Hong:
Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System. ICDCS 2021: 1144-1145 - [i14]Shangyu Xie, Bingyu Liu, Yuan Hong:
Privacy-preserving Cloud-based DNN Inference. CoRR abs/2102.03915 (2021) - [i13]Zhikun Liu, Yuanpeng Liu, Yuan Hong, Jinwen Meng, Jianguo Wang, Shusen Zheng, Xiao Xu:
Deep learning for prediction of hepatocellular carcinoma recurrence after resection or liver transplantation: a discovery and validation study. CoRR abs/2106.00090 (2021) - [i12]Shangyu Xie, Han Wang, Yu Kong, Yuan Hong:
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems. CoRR abs/2107.04284 (2021) - 2020
- [j35]Yunlong Zhang, Yuan Hong, Ken Choi:
Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs. Multim. Tools Appl. 79(23-24): 15923-15944 (2020) - [j34]Shengbin Wang, Weizhen Rao, Yuan Hong:
A distance matrix based algorithm for solving the traveling salesman problem. Oper. Res. 20(3): 1505-1542 (2020) - [j33]Han Wang, Shangyu Xie, Yuan Hong:
VideoDP: A Flexible Platform for Video Analytics with Differential Privacy. Proc. Priv. Enhancing Technol. 2020(4): 277-296 (2020) - [j32]Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong, Xiaohua Jia:
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy. IEEE Trans. Dependable Secur. Comput. 17(5): 1109-1123 (2020) - [j31]Shangyu Xie, Yuan Hong, Peng-Jun Wan:
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid. IEEE Trans. Inf. Forensics Secur. 15: 1114-1127 (2020) - [j30]Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. ACM Trans. Manag. Inf. Syst. 11(2): 7:1-7:33 (2020) - [c35]Bingyu Liu, Shangyu Xie, Yuan Hong:
PANDA: Privacy-Aware Double Auction for Divisible Resources without a Mediator. AAMAS 2020: 1904-1906 - [c34]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c33]Jingyu Sun, Bingyu Liu, Yuan Hong:
LogBug: Generating Adversarial System Logs in Real Time. CIKM 2020: 2229-2232 - [c32]Vijay Atluri, Yuan Hong, Soon Ae Chun:
Security, Privacy and Trust for Responsible Innovations and Governance. DG.O 2020: 365-366 - [c31]Han Wang, Yuan Hong, Yu Kong, Jaideep Vaidya:
Publishing Video Data with Indistinguishable Objects. EDBT 2020: 323-334 - [c30]Shangyu Xie, Han Wang, Yuan Hong, My Thai:
Privacy Preserving Distributed Energy Trading. ICDCS 2020: 322-332 - [c29]Hanbin Hong, Wentao Bao, Yuan Hong, Yu Kong:
Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification. ICPR 2020: 4245-4251 - [i11]Shangyu Xie, Han Wang, Yuan Hong, My Thai:
Privacy Preserving Distributed Energy Trading. CoRR abs/2004.12216 (2020) - [i10]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [j29]Yuan Hong, Li Chen, Lianguang Mo:
Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm. Clust. Comput. 22(Supplement): 7379-7387 (2019) - [j28]Xi Chen, Cheng Fang, Jasmine Chang, Yanjiang Yang, Yuan Hong, Haibing Lu:
Chinese address standardisation via hybrid approach combining statistical and rule-based methods. Int. J. Internet Enterp. Manag. 9(2): 179-193 (2019) - [j27]Feng Chen, Yunlei Pan, Tianzeng Lin, Shan Chen, Yuan Hong:
Computed Tomography-Guided Biopsy Assisted by 18F-FDG Coincidence Imaging for Solid Tumours. J. Medical Imaging Health Informatics 9(2): 366-370 (2019) - [j26]Xianmang He, Yuan Hong, Yindong Chen:
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. EAI Endorsed Trans. Security Safety 5(18): e2 (2019) - [j25]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c28]Shangyu Xie, Yuan Hong, Peng-Jun Wan:
A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid. AAMAS 2019: 2273-2275 - [c27]Yuezhi Che, Yuan Hong, Rujia Wang:
Imbalance-Aware Scheduler for Fast and Secure Ring ORAM Data Retrieval. ICCD 2019: 604-612 - [i9]Shangyu Xie, Han Wang, Shengbin Wang, Haibing Lu, Yuan Hong, Dong Jin, Qi Liu:
Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy. CoRR abs/1902.03916 (2019) - [i8]Chen Change Loy, Dahua Lin, Wanli Ouyang, Yuanjun Xiong, Shuo Yang, Qingqiu Huang, Dongzhan Zhou, Wei Xia, Quanquan Li, Ping Luo, Junjie Yan, Jianfeng Wang, Zuoxin Li, Ye Yuan, Boxun Li, Shuai Shao, Gang Yu, Fangyun Wei, Xiang Ming, Dong Chen, Shifeng Zhang, Cheng Chi, Zhen Lei, Stan Z. Li, Hongkai Zhang, Bingpeng Ma, Hong Chang, Shiguang Shan, Xilin Chen, Wu Liu, Boyan Zhou, Huaxiong Li, Peng Cheng, Tao Mei, Artem Kukharenko, Artem Vasenin, Nikolay Sergievskiy, Hua Yang, Liangqi Li, Qiling Xu, Yuan Hong, Lin Chen, Mingjun Sun, Yirong Mao, Shiying Luo, Yongjun Li, Ruiping Wang, Qiaokang Xie, Ziyang Wu, Lei Lu, Yiheng Liu, Wengang Zhou:
WIDER Face and Pedestrian Challenge 2018: Methods and Results. CoRR abs/1902.06854 (2019) - [i7]Han Wang, Shangyu Xie, Yuan Hong:
VideoDP: A Universal Platform for Video Analytics with Differential Privacy. CoRR abs/1909.08729 (2019) - 2018
- [j24]Haibing Lu, Wendong Zhu, Joseph Phan, Manoochehr Ghiassi, Yi Fang, Yuan Hong, Xiaoyun He:
Fault-tolerant tile mining. Expert Syst. Appl. 101: 25-42 (2018) - [c26]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c25]Yanfeng Qu, Xin Liu, Dong Jin, Yuan Hong, Chen Chen:
Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control. SDN-NFV@CODASPY 2018: 13-18 - [c24]Yuan Hong, Han Wang, Shangyu Xie, Bingyu Liu:
Privacy Preserving and Collusion Resistant Energy Sharing. ICASSP 2018: 6941-6945 - [i6]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Securely Solving the Distributed Graph Coloring Problem. CoRR abs/1803.05606 (2018) - [i5]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2017
- [j23]Wang Hao, Yuan Hong:
Training project arrangement for tennis athletes based on BP neural network model. Int. J. Reason. based Intell. Syst. 9(3/4): 144-148 (2017) - [j22]