Yanguo Peng

Orcid: 0000-0002-3210-0714

According to our database1, Yanguo Peng authored at least 25 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for IoT Environment.
IEEE Internet Things J., January, 2024

Quartet: A Query Aware Database Adaptive Compilation Decision System.
Expert Syst. Appl., 2024

Revisiting the Index Construction of Proximity Graph-Based Approximate Nearest Neighbor Search.
CoRR, 2024

2023
aChain: A SQL-Empowered Analytical Blockchain as a Database.
IEEE Trans. Computers, November, 2023

RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data.
IEEE Trans. Serv. Comput., 2023

SecCT: Secure and scalable count query models on encrypted genomic data.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

2022
ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning.
IEEE Trans. Ind. Informatics, 2022

LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening Against COVID-19.
IEEE Trans Autom. Sci. Eng., 2022

A Control-Chart-Based Detector for Small-Amount Electricity Theft (SET) Attack in Smart Grids.
IEEE Internet Things J., 2022

HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.
Proceedings of the Information Security - 25th International Conference, 2022

Serpens: Privacy-Preserving Inference through Conditional Separable of Convolutional Neural Networks.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing.
Secur. Commun. Networks, 2021

Quaternion fractional-order color orthogonal moment-based image representation and recognition.
EURASIP J. Image Video Process., 2021

SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy.
IEEE Access, 2021

2020
Image analysis by fast improved radial harmonic-Fourier moments algorithm.
Int. J. Imaging Syst. Technol., 2020

An Efficient Secure Dynamic Skyline Query Model.
CoRR, 2020

SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
Image analysis using modified exponent-Fourier moments.
EURASIP J. Image Video Process., 2019

2018
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Secure k Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments.
IEEE Trans. Big Data, 2018

Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data.
IEEE Access, 2018

2017
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.
Inf. Sci., 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017

2016
An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree.
Proceedings of the International Conference on Networking and Network Applications, 2016


  Loading...