Yuan Zhang

Orcid: 0000-0002-0789-1796

Affiliations:
  • Nanjing University, State Key Laboratory for Novel Software Technology, China
  • State University of New York at Buffalo, Amherst, NY, USA (2009 - 2013)


According to our database1, Yuan Zhang authored at least 60 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers.
IEEE Trans. Inf. Forensics Secur., 2024

Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2024

Unbalanced private set intersection with linear communication complexity.
Sci. China Inf. Sci., 2024

2023
SilenTower: A Robust, Scalable and Secure Watchtower with Silent Executors.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism.
IEEE Trans. Parallel Distributed Syst., 2022

Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems.
IACR Cryptol. ePrint Arch., 2022

Secure deduplication schemes for content delivery in mobile edge computing.
Comput. Secur., 2022

On Designing Secure Cross-user Redundancy Elimination for WAN Optimization.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Tracking Community Consistency in Dynamic Networks: An Influence-Based Approach.
IEEE Trans. Knowl. Data Eng., 2021

Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2020
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack.
IEEE Trans. Mob. Comput., 2020

Secure Inter-Domain Forwarding Loop Test in Software Defined Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems.
Inf. Process. Manag., 2020

A Novel Defending Scheme for Graph-Based Classification Against Graph Structure Manipulating Attack.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Private Deep Neural Network Models Publishing for Machine Learning as a Service.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2019
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection.
Appl. Intell., 2019

Multi-unit Budget Feasible Mechanisms for Cellular Traffic Offloading.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Location privacy in public access points positioning: An optimization and geometry approach.
Comput. Secur., 2018

Securely min and <i>k</i>-th min computations with fully homomorphic encryption.
Sci. China Inf. Sci., 2018

2017
Cost-Efficient Indoor White Space Exploration Through Compressive Sensing.
IEEE/ACM Trans. Netw., 2017

Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient and Privacy-Preserving Min and <i>k</i>th Min Computations in Mobile Sensing Systems.
IEEE Trans. Dependable Secur. Comput., 2017

SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees.
IEEE Trans. Inf. Forensics Secur., 2016

On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Data Aggregation in Mobile Phone Sensing.
IEEE Trans. Inf. Forensics Secur., 2016

Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.
IEEE J. Sel. Areas Commun., 2016

Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A New Secure Index Supporting Efficient Index Updating and Similarity Search on Clouds.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Privacy Preserving Distributed Permutation Test.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

Influence based analysis of community consistency in dynamic networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
A graph-based integrative method of detecting consistent protein functional modules from multiple data sources.
Int. J. Data Min. Bioinform., 2015

Privacy-preserving Network Functionality Outsourcing.
CoRR, 2015

Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

FIWEX: Compressive Sensing Based Cost-Efficient Indoor White Space Exploration.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Privacy-preserving min and k-th min computations with fully homomorphic encryption.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Privacy Preserving Market Schemes for Mobile Sensing.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Incentive Mechanism Design for Smartphone Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Privacy-Preserving Restricted Boltzmann Machine.
Comput. Math. Methods Medicine, 2014

2013
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning.
IEEE Trans. Wirel. Commun., 2013

A privacy-preserving algorithm for distributed training of neural network ensembles.
Neural Comput. Appl., 2013

Privacy preserving perceptron learning in malicious model.
Neural Comput. Appl., 2013

Privacy-Preserving Health Data Collection for Preschool Children.
Comput. Math. Methods Medicine, 2013

A Novel Approach of Extracting Traffic Parameters by Using Video Features.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Critical protein detection in dynamic PPI networks with multi-source integrated deep belief nets.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Affective state recognition from EEG with deep belief networks.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

A generative framework for prediction and informative risk factor selection of bone diseases.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Detecting mutual functional gene clusters from multiple related diseases.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Using Electronic Health Records To Assess Generalizability of Clinical Trials.
Proceedings of the AMIA 2013, 2013

2012
A graph-based cluster ensemble method to detect protein functional modules from multiple information sources.
Proceedings of the ACM International Conference on Bioinformatics, 2012

A collective NMF method for detecting protein functional module from multiple data sources.
Proceedings of the ACM International Conference on Bioinformatics, 2012

Evolutionary analysis of functional modules in dynamic PPI networks.
Proceedings of the ACM International Conference on Bioinformatics, 2012

2011
Approximation algorithm for estimating failure probability of multipath transmission.
Math. Comput. Simul., 2011


  Loading...