Yuanyuan Zhang

Orcid: 0000-0002-2302-836X

Affiliations:
  • Fujian Normal University, College of Mathematics and Informatics, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
  • South China University of Technology, School of Computer Science and Engineering, Pazhou Lab, Guangzhou, China (PhD 2022)
  • Singapore Management University, School of Computing and Information Systems, Singapore (2017-2018)


According to our database1, Yuanyuan Zhang authored at least 21 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives.
IEEE Netw., May, 2024

Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing.
J. Inf. Secur. Appl., 2024

Knowledge Distillation Enables Federated Learning: A Data-free Federated Aggregation Scheme.
Proceedings of the International Joint Conference on Neural Networks, 2024

LSTN: A Lightweight Secure Three-Party Inference Framework for Deep Neural Networks.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing.
IEEE Internet Things J., September, 2023

A privacy preserving data aggregation and query for metro passenger flow via mobile crowdsensing.
Concurr. Comput. Pract. Exp., 2023

Marine litter detection based on YOLOv7 algorithm and data encryption protection.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

AntiMal: an Approach of Malware Detection Employing Swin Transformer.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

PracticalHAR: A Practical Method of Human Activity Recognition Based on Embedded Sensors of Mobile Phone.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing.
Mob. Networks Appl., December, 2022

Secure Heterogeneous Data Deduplication via Fog-Assisted Mobile Crowdsensing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2022

Achieving Privacy-Preserving Multitask Allocation for Mobile Crowdsensing.
IEEE Internet Things J., 2022

An incentive mechanism for collaborative intelligence.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2022

SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2020
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020

2019
Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

2018
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
Mob. Networks Appl., 2018

2017
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
A secure access and associate deleting scheme for multi-replica in multi-cloud environment.
Int. J. High Perform. Syst. Archit., 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016


  Loading...