Hongyang Yan

Orcid: 0000-0002-1493-9671

According to our database1, Hongyang Yan authored at least 76 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bag of tricks for backdoor learning.
Wirel. Networks, November, 2024

Delegatable searchable encryption with specified keywords for EHR systems.
Wirel. Networks, July, 2024

zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024

Defenses to Membership Inference Attacks: A Survey.
ACM Comput. Surv., April, 2024

ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning.
IEEE Trans. Multim., 2024

MTL-Leak: Privacy Risk Assessment in Multi-Task Learning.
IEEE Trans. Dependable Secur. Comput., 2024

A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024

LEOCN: Real-time and complete network simulation framework for LEO constellation networks<sup>1</sup>.
J. High Speed Networks, 2024

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024

Pseudo unlearning via sample swapping with hash.
Inf. Sci., 2024

Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus.
Comput. Stand. Interfaces, 2024

Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024

Model architecture level privacy leakage in neural networks.
Sci. China Inf. Sci., 2024

Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
Explanation-based data-free model extraction attacks.
World Wide Web (WWW), September, 2023

A stealthy and robust backdoor attack via frequency domain transform.
World Wide Web (WWW), September, 2023

Unlinkable Signcryption Scheme for Multi-Receiver in VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2023

Membership reconstruction attack in deep neural networks.
Inf. Sci., July, 2023

Smart contract watermarking based on code obfuscation.
Inf. Sci., May, 2023

Generative Steganography via Auto-Generation of Semantic Object Contours.
IEEE Trans. Inf. Forensics Secur., 2023

Holistic Implicit Factor Evaluation of Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Membership Inference Attacks Against Deep Learning Models via Logits Distribution.
IEEE Trans. Dependable Secur. Comput., 2023

The influence of explanation designs on user understanding differential privacy and making data-sharing decision.
Inf. Sci., 2023

How to achieve bidirectional zero-knowledge authentication?
IACR Cryptol. ePrint Arch., 2023

Differentially Private Numerical Vector Analyses in the Local and Shuffle Model.
CoRR, 2023

SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised Learning.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Decision Poisson: From Universal Gravitation to Offline Reinforcement Learning.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Collusion-free for Cloud Verification toward the View of Game Theory.
ACM Trans. Internet Techn., 2022

Similarity-based integrity protection for deep learning systems.
Inf. Sci., 2022

KD-GAN: An effective membership inference attacks defence framework.
Int. J. Intell. Syst., 2022

Towards explainable model extraction attacks.
Int. J. Intell. Syst., 2022

Understanding adaptive gradient clipping in DP-SGD, empirically.
Int. J. Intell. Syst., 2022

Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud.
Int. J. Intell. Syst., 2022

Auto-Focus Contrastive Learning for Image Manipulation Detection.
CoRR, 2022

Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022

Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning.
Proceedings of the Network and System Security - 16th International Conference, 2022

Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

TGPFM: An Optimized Framework for Ordering and Transporting Raw Materials for Production.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
Adversarial examples: attacks and defenses in the physical world.
Int. J. Mach. Learn. Cybern., 2021

Privacy-preserving and verifiable online crowdsourcing with worker updates.
Inf. Sci., 2021

PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage.
Inf. Sci., 2021

PNAS: A privacy preserving framework for neural architecture search services.
Inf. Sci., 2021

MHAT: An efficient model-heterogenous aggregation training scheme for federated learning.
Inf. Sci., 2021

An improved anti-quantum MST3 public key encryption scheme for remote sensing images.
Enterp. Inf. Syst., 2021

Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
Blockchain-based public auditing and secure deduplication with fair arbitration.
Inf. Sci., 2020

An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

Toward optimal participant decisions with voting-based incentive model for crowd sensing.
Inf. Sci., 2020

Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts.
Comput. Secur., 2020

A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme.
Complex., 2020

Secure video retrieval using image query on an untrusted cloud.
Appl. Soft Comput., 2020

An ensemble learning based prediction strategy for dynamic multi-objective optimization.
Appl. Soft Comput., 2020

Training Aggregation in Federated Learning.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

2019
A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput., 2019

SSIR: Secure similarity image retrieval in IoT.
Inf. Sci., 2019

Multilevel similarity model for high-resolution remote sensing image registration.
Inf. Sci., 2019

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019

Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2019

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment.
Complex., 2019

Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records.
IEEE Access, 2019

An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability.
IEEE Access, 2019

New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
Proceedings of the Network and System Security - 13th International Conference, 2019

Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.
Sensors, 2018

A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Secur. Commun. Networks, 2018

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain.
IEEE Access, 2018

An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services.
IEEE Access, 2018

2017
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Syst. J., 2017

Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Clust. Comput., 2017

2016
Secure Access Control of E-Health System with Attribute-Based Encryption.
Intell. Autom. Soft Comput., 2016

2015
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure.
J. Univers. Comput. Sci., 2015

Server-aided anonymous attribute-based authentication in cloud computing.
Future Gener. Comput. Syst., 2015

Secure Image Deduplication in Cloud Storage.
Proceedings of the Information and Communication Technology, 2015

2014
Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014


  Loading...