Yuan Hong

Orcid: 0000-0003-4095-4506

According to our database1, Yuan Hong authored at least 131 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dynamic radiomics based on contrast-enhanced MRI for predicting microvascular invasion in hepatocellular carcinoma.
BMC Medical Imaging, December, 2024

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient Differentially Private Set Intersection.
IACR Cryptol. ePrint Arch., 2024

Understanding Data Reconstruction Leakage in Federated Learning from a Theoretical Perspective.
CoRR, 2024

A Learning-Based Attack Framework to Break SOTA Poisoning Defenses in Federated Learning.
CoRR, 2024

Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
CoRR, 2024

Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses.
CoRR, 2024

LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models.
CoRR, 2024

Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness.
CoRR, 2024

Differentially Private Federated Learning: A Systematic Review.
CoRR, 2024

MedTrans: Intelligent Computing for Medical Diagnosis Using Multiscale Cross-Attention Vision Transformer.
IEEE Access, 2024

Aggregation-Based Perceptual Deep Model for Scenic Image Recognition.
IEEE Access, 2024

An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

VertFound: Synergizing Semantic and Spatial Understanding for Fine-Grained Vertebrae Classification via Foundation Models.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

On the Faithfulness of Vision Transformer Explanations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Infrastructure-Enabled GPS Spoofing Detection and Correction.
IEEE Trans. Intell. Transp. Syst., December, 2023

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing.
IEEE Trans. Knowl. Data Eng., 2023

Stealthy 3D Poisoning Attack on Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2023

Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023

Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples.
CoRR, 2023

FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023

Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Evolutionary Mixed-Integer Optimization with Explicit Constraints.
Proceedings of the Genetic and Evolutionary Computation Conference, 2023

2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022

On Fair Classification with Mostly Private Sensitive Attributes.
CoRR, 2022

Certified Adversarial Robustness via Anisotropic Randomized Smoothing.
CoRR, 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

An Eye for an Eye: Defending against Gradient-based Attacks with Gradients.
CoRR, 2022

Application of a nomogram to radiomics labels in the treatment prediction scheme for lumbar disc herniation.
BMC Medical Imaging, 2022

Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Differentially Private Instance Encoding against Privacy Attacks.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Student Research Workshop, 2022

A Model-Agnostic Approach to Differentially Private Topic Mining.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

UniCR: Universally Approximated Certified Robustness via Randomized Smoothing.
Proceedings of the Computer Vision - ECCV 2022, 2022

L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Cryptographic Inferences for Video Deep Neural Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

WPES '22: 21st Workshop on Privacy in the Electronic Society.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Observation Geometry Improvement of BDS by Near-Space Balloons in Regional Navigation Augmentation.
Proceedings of the Methods and Applications for Modeling and Simulation of Complex Systems, 2022

2021
Dynamic Pricing for Electric Vehicle Extreme Fast Charging.
IEEE Trans. Intell. Transp. Syst., 2021

A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021

Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021

VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy preserving divisible double auction with a hybridized TEE-blockchain system.
Cybersecur., 2021

Deep learning for prediction of hepatocellular carcinoma recurrence after resection or liver transplantation: a discovery and validation study.
CoRR, 2021

Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Privacy-Preserving Cloud-Based DNN Inference.
Proceedings of the IEEE International Conference on Acoustics, 2021

Reconstruction Attack on Instance Encoding for Language Understanding.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Knowledge-Enhanced Retrieval: A Scheme for Question Answering.
Proceedings of the CCKS 2021 - Evaluation Track, 2021

2020
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.
ACM Trans. Manag. Inf. Syst., 2020

Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid.
IEEE Trans. Inf. Forensics Secur., 2020

Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020

VideoDP: A Flexible Platform for Video Analytics with Differential Privacy.
Proc. Priv. Enhancing Technol., 2020

A distance matrix based algorithm for solving the traveling salesman problem.
Oper. Res., 2020

Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs.
Multim. Tools Appl., 2020

R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020

Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Privacy Preserving Distributed Energy Trading.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Publishing Video Data with Indistinguishable Objects.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

Security, Privacy and Trust for Responsible Innovations and Governance.
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020

LogBug: Generating Adversarial System Logs in Real Time.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

PANDA: Privacy-Aware Double Auction for Divisible Resources without a Mediator.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

Exploring the Privacy Bound for Differential Privacy: From Theory to Practice.
EAI Endorsed Trans. Security Safety, 2019

Computed Tomography-Guided Biopsy Assisted by 18F-FDG Coincidence Imaging for Solid Tumours.
J. Medical Imaging Health Informatics, 2019

Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019

VideoDP: A Universal Platform for Video Analytics with Differential Privacy.
CoRR, 2019

WIDER Face and Pedestrian Challenge 2018: Methods and Results.
CoRR, 2019

Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy.
CoRR, 2019

Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm.
Clust. Comput., 2019

Imbalance-Aware Scheduler for Fast and Secure Ring ORAM Data Retrieval.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Fault-tolerant tile mining.
Expert Syst. Appl., 2018

Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018

Privacy Preserving and Collusion Resistant Energy Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017

On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions.
IEEE Trans. Engineering Management, 2017

Using Wavelet Packet Transform for Surface Roughness Evaluation and Texture Extraction.
Sensors, 2017

Training project arrangement for tennis athletes based on BP neural network model.
Int. J. Reason. based Intell. Syst., 2017

Discovering energy communities for microgrids on the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

2016
Accurate and efficient query clustering via top ranked search results.
Web Intell., 2016

Sparse Reconstruction for Micro Defect Detection in Acoustic Micro Imaging.
Sensors, 2016

Privacy Preserving Linear Programming.
CoRR, 2016

Information diffusion and opinion change during the gezi park protests: Homophily or social influence?
Proceedings of the Creating Knowledge, Enhancing Lives through Information & Technology, 2016

2015
Cyber War Games: Strategic Jostling Among Traditional Adversaries.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015

Towards user-oriented RBAC model.
J. Comput. Secur., 2015

Some Relations Between the Eigenvalues of Adjacency, Laplacian and Signless Laplacian Matrix of a Graph.
Graphs Comb., 2015

Privacy preserving driving style recognition.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014

A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications.
J. Inf. Syst., 2014

Construction Engineering Cost Evaluation Model and Application Based on RS-IPSO-BP Neural Network.
J. Comput., 2014

Dynamic Workflow Adjustment with Security Constraints.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Load forecasting using elastic gradient descent.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2012
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Secur. Comput., 2012

Secure and efficient distributed linear programming.
J. Comput. Secur., 2012

The Minimal Limit Point of the Third Largest Laplacian Eigenvalues of Graphs.
Ars Comb., 2012

Overlapping Clustering with Sparseness Constraints.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
An Emotion Model for Virtual Agents with Evolvable Motivation.
Trans. Edutainment, 2011

On the Laplacian spread of graphs.
Appl. Math. Lett., 2011

Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2009
A Simulation Based on Emotions Model for Virtual Human Crowds.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

Personality Based Latent Friendship Mining.
Proceedings of The 2009 International Conference on Data Mining, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Parallel reflective symmetry transformation for volume data.
Comput. Graph., 2008

Kernel: A RDB-Based Object Persistence Component Set for Java.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Preserving Privacy in E-health Systems Using Hippocratic Databases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Securing Telehealth Applications in a Web-Based e-Health Portal.
Proceedings of the The Third International Conference on Availability, 2008

2005
Sharp upper and lower bounds for largest eigenvalue of the Laplacian matrices of trees.
Discret. Math., 2005

Simulation and Visualization for DNA Computing in Microreactors.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Tree-width, clique-minors, and eigenvalues.
Discret. Math., 2004

2001
A Sharp Upper Bound of the Spectral Radius of Graphs.
J. Comb. Theory B, 2001

2000
A sharp upper bound for the spectral radius of the Nordhaus-Gaddum type.
Discret. Math., 2000

1993
Bounds of eigenvalues of graphs.
Discret. Math., 1993


  Loading...