Yunlong Mao

Orcid: 0000-0001-9024-9544

According to our database1, Yunlong Mao authored at least 30 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comprehensive Study of Trajectory Forgery and Detection in Location-Based Services.
IEEE Trans. Mob. Comput., April, 2024

Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers.
IEEE Trans. Inf. Forensics Secur., 2024

Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness.
IEEE Trans. Inf. Forensics Secur., 2024

Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation.
CoRR, 2024

Unbalanced private set intersection with linear communication complexity.
Sci. China Inf. Sci., 2024

UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Design of Ultra-Wideband Phased Array Applicator for Breast Cancer Hyperthermia Therapy.
Sensors, February, 2023

A Split-and-Privatize Framework for Large Language Model Fine-Tuning.
CoRR, 2023

Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023

FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism.
IEEE Trans. Parallel Distributed Syst., 2022

Secure deduplication schemes for content delivery in mobile edge computing.
Comput. Secur., 2022

Are You Moving as You Claim: GPS Trajectory Forgery and Detection in Location-Based Services.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training.
IEEE Trans. Parallel Distributed Syst., 2021

Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications.
IEEE Trans. Dependable Secur. Comput., 2021

Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack.
IEEE Trans. Mob. Comput., 2020

An Improved Traffic Congestion Monitoring System Based on Federated Learning.
Inf., 2020

Private Deep Neural Network Models Publishing for Machine Learning as a Service.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2018
WPD and DE/BBO-RBFNN for solution of rolling bearing fault diagnosis.
Neurocomputing, 2018

Location privacy in public access points positioning: An optimization and geometry approach.
Comput. Secur., 2018

Learning from Differentially Private Neural Activations with Edge Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.
IEEE J. Sel. Areas Commun., 2016

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Privacy Preserving Distributed Permutation Test.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Privacy Preserving Market Schemes for Mobile Sensing.
Proceedings of the 44th International Conference on Parallel Processing, 2015

2014
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014


  Loading...