Yuan Zhang
Orcid: 0000-0002-0789-1796Affiliations:
- Nanjing University, State Key Laboratory for Novel Software Technology, China
- State University of New York at Buffalo, Amherst, NY, USA (2009 - 2013)
According to our database1,
Yuan Zhang
authored at least 60 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Sci. China Inf. Sci., 2024
2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism.
IEEE Trans. Parallel Distributed Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Secur., 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
2020
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems.
Inf. Process. Manag., 2020
A Novel Defending Scheme for Graph-Based Classification Against Graph Structure Manipulating Attack.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
2019
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection.
Appl. Intell., 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
2018
Location privacy in public access points positioning: An optimization and geometry approach.
Comput. Secur., 2018
Sci. China Inf. Sci., 2018
2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Efficient and Privacy-Preserving Min and <i>k</i>th Min Computations in Mobile Sensing Systems.
IEEE Trans. Dependable Secur. Comput., 2017
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.
IEEE J. Sel. Areas Commun., 2016
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
A New Secure Index Supporting Efficient Index Updating and Similarity Search on Clouds.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
A graph-based integrative method of detecting consistent protein functional modules from multiple data sources.
Int. J. Data Min. Bioinform., 2015
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 44th International Conference on Parallel Processing, 2015
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
2014
Comput. Math. Methods Medicine, 2014
2013
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning.
IEEE Trans. Wirel. Commun., 2013
Neural Comput. Appl., 2013
Neural Comput. Appl., 2013
Comput. Math. Methods Medicine, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Critical protein detection in dynamic PPI networks with multi-source integrated deep belief nets.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
A generative framework for prediction and informative risk factor selection of bone diseases.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
Proceedings of the AMIA 2013, 2013
2012
A graph-based cluster ensemble method to detect protein functional modules from multiple information sources.
Proceedings of the ACM International Conference on Bioinformatics, 2012
A collective NMF method for detecting protein functional module from multiple data sources.
Proceedings of the ACM International Conference on Bioinformatics, 2012
Proceedings of the ACM International Conference on Bioinformatics, 2012
2011
Approximation algorithm for estimating failure probability of multipath transmission.
Math. Comput. Simul., 2011