Ye Dong

Orcid: 0000-0002-2105-8047

According to our database1, Ye Dong authored at least 22 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PODI: A Private Object Detection Inference framework for autonomous vehicles.
Knowl. Based Syst., 2024

FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels.
IACR Cryptol. ePrint Arch., 2024

Few-Shot Relation Extraction Through Prompt With Relation Information and Multi-Level Contrastive Learning.
IEEE Access, 2024

Comet: Communication-Efficient Batch Secure Three-Party Neural Network Inference with Client-Aiding.
Proceedings of the IEEE International Conference on Communications, 2024

Roger: A Round Optimized GPU-Friendly Secure Inference Framework.
Proceedings of the IEEE International Conference on Communications, 2024

2023
FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width.
IEEE Trans. Inf. Forensics Secur., 2023

Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs.
IACR Cryptol. ePrint Arch., 2023

PUMA: Secure Inference of LLaMA-7B in Five Minutes.
CoRR, 2023

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference.
CoRR, 2023

Practical and General Backdoor Attacks Against Vertical Federated Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

2022
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices.
IEEE Internet Things J., 2022

ABNN<sup>2</sup>: secure two-party arbitrary-bitwidth quantized neural network predictions.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority.
IACR Cryptol. ePrint Arch., 2021

Efficient Byzantine-Resilient Stochastic Gradient Desce.
CoRR, 2021

2020
Robust finite-time adaptive control algorithm for satellite fast attitude maneuver.
J. Frankl. Inst., 2020

EaSTFLy: Efficient and secure ternary federated learning.
Comput. Secur., 2020

An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Privacy-Preserving Distributed Machine Learning based on Secret Sharing.
IACR Cryptol. ePrint Arch., 2019

Privacy-Preserving Distributed Machine Learning Based on Secret Sharing.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Efficient and Private Set Intersection of Human Genomes.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2008
Three-Dimensional Parallel Electromagnetic Code with Complex Geometry.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008


  Loading...