Yi Zhao

Orcid: 0000-0002-0553-113X

Affiliations:
  • Tsinghua University, Department of Computer Science and Technology, China


According to our database1, Yi Zhao authored at least 48 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning.
IEEE/ACM Trans. Netw., June, 2024

Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs.
IEEE Trans. Inf. Forensics Secur., 2024

Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage.
IEEE Trans. Cloud Comput., 2024

Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things.
Future Gener. Comput. Syst., 2024

E-ANT: A Large-Scale Dataset for Efficient Automatic GUI NavigaTion.
CoRR, 2024

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Proceedings of the 33rd USENIX Security Symposium, 2024

Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

Adversarial Robust Safeguard for Evading Deep Facial Manipulation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction.
Sci. China Inf. Sci., May, 2023

Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework.
IEEE/ACM Trans. Netw., April, 2023

Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023

FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur., 2023

PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023

G-Routing: Graph Neural Networks-Based Flexible Online Routing.
IEEE Netw., 2023

Improving Adversarial Transferability with Ghost Samples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Identity-Based Proxy Re-encryption Based on SM9.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid.
Secur. Commun. Networks, 2022

Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges.
IEEE Netw., 2022

Blockchain-Enabled Efficient Dynamic Cross-Domain Deduplication in Edge Computing.
IEEE Internet Things J., 2022

Practical algorithm substitution attack on extractable signatures.
Des. Codes Cryptogr., 2022

FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR, 2022

Intelligent networking in adversarial environment: challenges and opportunities.
Sci. China Inf. Sci., 2022

Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

2021
Data Clustering via Uncorrelated Ridge Regression.
IEEE Trans. Neural Networks Learn. Syst., 2021

Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services.
IEEE Netw., 2021

MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities.
IEEE Internet Things J., 2021

AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning.
CoRR, 2021

FedPrune: Personalized and Communication-Efficient Federated Learning on Non-IID Data.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

2020
Deep Learning-Based Gait Recognition Using Smartphones in the Wild.
IEEE Trans. Inf. Forensics Secur., 2020

Understand Love of Variety in Wireless Data Market Under Sponsored Data Plans.
IEEE J. Sel. Areas Commun., 2020

A generic construction of CCA-secure deterministic encryption.
Inf. Process. Lett., 2020

Privacy preserving search services against online attack.
Comput. Secur., 2020

Incentive mechanisms for mobile data offloading through operator-owned WiFi access points.
Comput. Networks, 2020

I Know If the Journey Changes: Flexible Source and Path Validation.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.
Secur. Commun. Networks, 2019

Machine-Learning-Based Positioning: A Survey and Future Directions.
IEEE Netw., 2019

CCA-Secure Deterministic Identity-Based Encryption Scheme.
J. Univers. Comput. Sci., 2019

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
IEEE Internet Things J., 2019

Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.
Comput. J., 2019

Variety matters: a new model for the wireless data market under sponsored data plans.
Proceedings of the International Symposium on Quality of Service, 2019

TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Deep Learning Based Gait Recognition Using Smartphones in the Wild.
CoRR, 2018

2017
Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption.
Sci. China Inf. Sci., 2017

2015
Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue.
Int. J. Netw. Secur., 2015

An overview of object detection and tracking.
Proceedings of the IEEE International Conference on Information and Automation, 2015


  Loading...