Yuan Hong
Orcid: 0000-0003-4095-4506
According to our database1,
Yuan Hong
authored at least 134 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Dynamic radiomics based on contrast-enhanced MRI for predicting microvascular invasion in hepatocellular carcinoma.
BMC Medical Imaging, December, 2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024
Understanding Data Reconstruction Leakage in Federated Learning from a Theoretical Perspective.
CoRR, 2024
A Learning-Based Attack Framework to Break SOTA Poisoning Defenses in Federated Learning.
CoRR, 2024
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
CoRR, 2024
LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models.
CoRR, 2024
Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness.
CoRR, 2024
MedTrans: Intelligent Computing for Medical Diagnosis Using Multiscale Cross-Attention Vision Transformer.
IEEE Access, 2024
IEEE Access, 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
VertFound: Synergizing Semantic and Spatial Understanding for Fine-Grained Vertebrae Classification via Foundation Models.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Intell. Transp. Syst., December, 2023
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023
Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples.
CoRR, 2023
FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023
Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023
Proceedings of the Genetic and Evolutionary Computation Conference, 2023
2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
CoRR, 2022
Application of a nomogram to radiomics labels in the treatment prediction scheme for lumbar disc herniation.
BMC Medical Imaging, 2022
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Student Research Workshop, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Observation Geometry Improvement of BDS by Near-Space Balloons in Regional Navigation Augmentation.
Proceedings of the Methods and Applications for Modeling and Simulation of Complex Systems, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021
VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2021
Cybersecur., 2021
Deep learning for prediction of hepatocellular carcinoma recurrence after resection or liver transplantation: a discovery and validation study.
CoRR, 2021
Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Proceedings of the CCKS 2021 - Evaluation Track, 2021
2020
ACM Trans. Manag. Inf. Syst., 2020
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid.
IEEE Trans. Inf. Forensics Secur., 2020
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020
Proc. Priv. Enhancing Technol., 2020
Oper. Res., 2020
Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs.
Multim. Tools Appl., 2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020
Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 23rd International Conference on Extending Database Technology, 2020
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
EAI Endorsed Trans. Security Safety, 2019
Computed Tomography-Guided Biopsy Assisted by 18F-FDG Coincidence Imaging for Solid Tumours.
J. Medical Imaging Health Informatics, 2019
Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019
CoRR, 2019
CoRR, 2019
Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm.
Clust. Comput., 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017
On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions.
IEEE Trans. Engineering Management, 2017
Using Wavelet Packet Transform for Surface Roughness Evaluation and Texture Extraction.
Sensors, 2017
Int. J. Reason. based Intell. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
2016
Web Intell., 2016
Sensors, 2016
Information diffusion and opinion change during the gezi park protests: Homophily or social influence?
Proceedings of the Creating Knowledge, Enhancing Lives through Information & Technology, 2016
2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015
Some Relations Between the Eigenvalues of Adjacency, Laplacian and Signless Laplacian Matrix of a Graph.
Graphs Comb., 2015
Proceedings of the International Conference on Connected Vehicles and Expo, 2015
2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014
J. Inf. Syst., 2014
Construction Engineering Cost Evaluation Model and Application Based on RS-IPSO-BP Neural Network.
J. Comput., 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Proceedings of the Ninth International Conference on Natural Computation, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
The Minimal Limit Point of the Third Largest Laplacian Eigenvalues of Graphs.
Ars Comb., 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
Proceedings of the 15th International Conference on Extending Database Technology, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
2011
Trans. Edutainment, 2011
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2009
Proceedings of the Fifth International Conference on Image and Graphics, 2009
Personality Based Latent Friendship Mining.
Proceedings of The 2009 International Conference on Data Mining, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2005
Sharp upper and lower bounds for largest eigenvalue of the Laplacian matrices of trees.
Discret. Math., 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
2004
2001
2000
Discret. Math., 2000
1993