default search action
Yuan Hong
Person information
Other persons with a similar name
- Hong-yuan Fu
- Fu-Yuan Hong
- Yuan-Jin Hong
- Hong-Yuan Huang
- Hong-Yuan Jheng
- Hong-Yuan Li
- Hong-Yuan Mark Liao (aka: Mark Liao 0001) — Academia Sinica, Institute of Information Science, Taipei, Taiwan
- Yuan-Hong Liao
- Yuan-Hong Tao (aka: Yuanhong Tao)
- Hong Yuan
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Yuan Hong, Yang Xu, Mu Hu:
Aggregation-Based Perceptual Deep Model for Scenic Image Recognition. IEEE Access 12: 67368-67378 (2024) - [j52]Yang Xu, Yuan Hong, Xinchen Li, Mu Hu:
MedTrans: Intelligent Computing for Medical Diagnosis Using Multiscale Cross-Attention Vision Transformer. IEEE Access 12: 146575-146586 (2024) - [j51]Rui Zhang, Yao Wang, Zhi Li, Yushu Shi, Danping Yu, Qiang Huang, Feng Chen, Wenbo Xiao, Yuan Hong, Zhan Feng:
Dynamic radiomics based on contrast-enhanced MRI for predicting microvascular invasion in hepatocellular carcinoma. BMC Medical Imaging 24(1): 80 (2024) - [j50]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. Proc. ACM Manag. Data 2(1): 30:1-30:27 (2024) - [j49]Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. IEEE Trans. Dependable Secur. Comput. 21(1): 31-46 (2024) - [j48]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9534-9549 (2024) - [c58]Caridad Arroyo Arevalo, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong, Binghui Wang:
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks. AAAI 2024: 10909-10917 - [c57]Matta Varun, Shuya Feng, Han Wang, Shamik Sural, Yuan Hong:
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response. CODASPY 2024: 307-318 - [c56]Junyi Wu, Weitai Kang, Hao Tang, Yuan Hong, Yan Yan:
On the Faithfulness of Vision Transformer Explanations. CVPR 2024: 10936-10945 - [c55]Yinhao Wu, Jinzhou Tang, Zequan Yao, Mingjie Li, Yuan Hong, Dongdong Yu, Zhifan Gao, Bin Chen, Shen Zhao:
VertFound: Synergizing Semantic and Spatial Understanding for Fine-Grained Vertebrae Classification via Foundation Models. MICCAI (12) 2024: 763-772 - [c54]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. SP 2024: 1009-1027 - [c53]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. SP 2024: 2920-2938 - [c52]Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang:
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks. USENIX Security Symposium 2024 - [c51]Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong:
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection. USENIX Security Symposium 2024 - [i39]Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang:
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks. CoRR abs/2403.02116 (2024) - [i38]Junyi Wu, Weitai Kang, Hao Tang, Yuan Hong, Yan Yan:
On the Faithfulness of Vision Transformer Explanations. CoRR abs/2404.01415 (2024) - [i37]Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao:
Differentially Private Federated Learning: A Systematic Review. CoRR abs/2405.08299 (2024) - [i36]Jieren Deng, Hanbin Hong, Aaron Palmer, Xin Zhou, Jinbo Bi, Kaleel Mahmood, Yuan Hong, Derek Aguiar:
Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness. CoRR abs/2405.16036 (2024) - [i35]Qin Yang, Meisam Mohammady, Han Wang, Ali Payani, Ashish Kundu, Kai Shu, Yan Yan, Yuan Hong:
LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models. CoRR abs/2405.18776 (2024) - [i34]Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong:
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection. CoRR abs/2406.06822 (2024) - [i33]Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang:
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses. CoRR abs/2407.08935 (2024) - [i32]Shuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang, Yuan Hong:
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence. CoRR abs/2407.14710 (2024) - [i31]Yuxin Yang, Qiang Li, Chenfei Nie, Yuan Hong, Meng Pang, Binghui Wang:
A Learning-Based Attack Framework to Break SOTA Poisoning Defenses in Federated Learning. CoRR abs/2407.15267 (2024) - [i30]Zifan Wang, Binghui Zhang, Meng Pang, Yuan Hong, Binghui Wang:
Understanding Data Reconstruction Leakage in Federated Learning from a Theoretical Perspective. CoRR abs/2408.12119 (2024) - [i29]Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, Yuan Hong:
Efficient Differentially Private Set Intersection. IACR Cryptol. ePrint Arch. 2024: 1239 (2024) - 2023
- [j47]Lu Ou, Yi He, Shaolin Liao, Zheng Qin, Yuan Hong, Dafang Zhang, Xiaohua Jia:
FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks. IEEE Access 11: 31829-31841 (2023) - [j46]Shangyu Xie, Yan Yan, Yuan Hong:
Stealthy 3D Poisoning Attack on Video Recognition Models. IEEE Trans. Dependable Secur. Comput. 20(2): 1730-1743 (2023) - [j45]Feilong Wang, Yuan Hong, Xuegang Ban:
Infrastructure-Enabled GPS Spoofing Detection and Correction. IEEE Trans. Intell. Transp. Syst. 24(12): 13878-13892 (2023) - [j44]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing. IEEE Trans. Knowl. Data Eng. 35(1): 1-15 (2023) - [c50]Yuan Hong, Dirk Arnold:
Evolutionary Mixed-Integer Optimization with Explicit Constraints. GECCO 2023: 822-830 - [c49]Fereshteh Razmi, Jian Lou, Yuan Hong, Li Xiong:
Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records. ECML/PKDD (3) 2023: 446-461 - [i28]Hanbin Hong, Yuan Hong:
Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples. CoRR abs/2304.04343 (2023) - [i27]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. CoRR abs/2307.16630 (2023) - [i26]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. CoRR abs/2310.13424 (2023) - [i25]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. CoRR abs/2311.16062 (2023) - [i24]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. CoRR abs/2312.04738 (2023) - [i23]Caridad Arroyo Arevalo, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong, Binghui Wang:
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning Against Attribute Inference Attacks. CoRR abs/2312.06989 (2023) - [i22]Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong:
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage. IACR Cryptol. ePrint Arch. 2023: 1619 (2023) - 2022
- [j43]Gang Yu, Wenlong Yang, Jingkun Zhang, Qi Zhang, Jian Zhou, Yuan Hong, Jiaojiao Luo, Quan Shi, Zhidan Yang, Kangyu Zhang, Hong Tu:
Application of a nomogram to radiomics labels in the treatment prediction scheme for lumbar disc herniation. BMC Medical Imaging 22(1): 51 (2022) - [j42]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. Proc. VLDB Endow. 16(2): 202-215 (2022) - [c48]Zhang Yang, Tao Ping, Liu Rui, Xianghong Li, Li Ran, Yaping Li, Yang Guang, Yuan Hong:
Observation Geometry Improvement of BDS by Near-Space Balloons in Regional Navigation Augmentation. AsiaSim (2) 2022: 153-163 - [c47]Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. CCS 2022: 2809-2823 - [c46]Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong:
Poster: Cryptographic Inferences for Video Deep Neural Networks. CCS 2022: 3395-3397 - [c45]Yuan Hong, Lingyu Wang:
WPES '22: 21st Workshop on Privacy in the Electronic Society. CCS 2022: 3535-3537 - [c44]Hanbin Hong, Binghui Wang, Yuan Hong:
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing. ECCV (5) 2022: 86-103 - [c43]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract). ICDE 2022: 1549-1550 - [c42]Han Wang, Jayashree Sharma, Shuya Feng, Kai Shu, Yuan Hong:
A Model-Agnostic Approach to Differentially Private Topic Mining. KDD 2022: 1835-1845 - [c41]Shangyu Xie, Yuan Hong:
Differentially Private Instance Encoding against Privacy Attacks. NAACL-HLT (Student Research Workshop) 2022: 172-180 - [c40]Shangyu Xie, Han Wang, Yu Kong, Yuan Hong:
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems. SP 2022: 1390-1407 - [e2]Chunjie Cao, Yuqing Zhang, Yuan Hong, Ding Wang:
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers. Communications in Computer and Information Science 1558, Springer 2022, ISBN 978-981-19-0522-3 [contents] - [e1]Yuan Hong, Lingyu Wang:
Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9873-2 [contents] - [i21]Hanbin Hong, Yuan Hong, Yu Kong:
An Eye for an Eye: Defending against Gradient-based Attacks with Gradients. CoRR abs/2202.01117 (2022) - [i20]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - [i19]Hanbin Hong, Binghui Wang, Yuan Hong:
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing. CoRR abs/2207.02152 (2022) - [i18]Hanbin Hong, Yuan Hong:
Certified Adversarial Robustness via Anisotropic Randomized Smoothing. CoRR abs/2207.05327 (2022) - [i17]Canyu Chen, Yueqing Liang, Xiongxiao Xu, Shangyu Xie, Yuan Hong, Kai Shu:
On Fair Classification with Mostly Private Sensitive Attributes. CoRR abs/2207.08336 (2022) - [i16]Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. CoRR abs/2209.15091 (2022) - [i15]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. CoRR abs/2210.01318 (2022) - 2021
- [j41]Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong:
Privacy preserving divisible double auction with a hybridized TEE-blockchain system. Cybersecur. 4(1): 37 (2021) - [j40]Yuan Hong, Valérie Issarny, Surya Nepal, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Dependable Secur. Comput. 18(4): 1511-1512 (2021) - [j39]Bingyu Liu, Shangyu Xie, Han Wang, Yuan Hong, Xuegang Ban, Meisam Mohammady:
VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility. IEEE Trans. Dependable Secur. Comput. 18(6): 2643-2657 (2021) - [j38]Yuan Hong, Valérie Issarny, Surya Nepal, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Emerg. Top. Comput. 9(3): 1328-1329 (2021) - [j37]Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [j36]Cheng Fang, Haibing Lu, Yuan Hong, Shan Liu, Jasmine Chang:
Dynamic Pricing for Electric Vehicle Extreme Fast Charging. IEEE Trans. Intell. Transp. Syst. 22(1): 531-541 (2021) - [c39]Fake Lin, Weican Cao, Wen Zhang, Liyi Chen, Yuan Hong, Tong Xu, Chang Tan:
Knowledge-Enhanced Retrieval: A Scheme for Question Answering. CCKS (Evaluation Track) 2021: 102-113 - [c38]Shangyu Xie, Yuan Hong:
Reconstruction Attack on Instance Encoding for Language Understanding. EMNLP (1) 2021: 2038-2044 - [c37]Shangyu Xie, Bingyu Liu, Yuan Hong:
Privacy-Preserving Cloud-Based DNN Inference. ICASSP 2021: 2675-2679 - [c36]Bingyu Liu, Yuanzhou Yang, Rujia Wang, Yuan Hong:
Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System. ICDCS 2021: 1144-1145 - [i14]Shangyu Xie, Bingyu Liu, Yuan Hong:
Privacy-preserving Cloud-based DNN Inference. CoRR abs/2102.03915 (2021) - [i13]Zhikun Liu, Yuanpeng Liu, Yuan Hong, Jinwen Meng, Jianguo Wang, Shusen Zheng, Xiao Xu:
Deep learning for prediction of hepatocellular carcinoma recurrence after resection or liver transplantation: a discovery and validation study. CoRR abs/2106.00090 (2021) - [i12]Shangyu Xie, Han Wang, Yu Kong, Yuan Hong:
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems. CoRR abs/2107.04284 (2021) - 2020
- [j35]Yunlong Zhang, Yuan Hong, Ken Choi:
Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs. Multim. Tools Appl. 79(23-24): 15923-15944 (2020) - [j34]Shengbin Wang, Weizhen Rao, Yuan Hong:
A distance matrix based algorithm for solving the traveling salesman problem. Oper. Res. 20(3): 1505-1542 (2020) - [j33]Han Wang, Shangyu Xie, Yuan Hong:
VideoDP: A Flexible Platform for Video Analytics with Differential Privacy. Proc. Priv. Enhancing Technol. 2020(4): 277-296 (2020) - [j32]Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong, Xiaohua Jia:
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy. IEEE Trans. Dependable Secur. Comput. 17(5): 1109-1123 (2020) - [j31]Shangyu Xie, Yuan Hong, Peng-Jun Wan:
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid. IEEE Trans. Inf. Forensics Secur. 15: 1114-1127 (2020) - [j30]Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. ACM Trans. Manag. Inf. Syst. 11(2): 7:1-7:33 (2020) - [c35]Bingyu Liu, Shangyu Xie, Yuan Hong:
PANDA: Privacy-Aware Double Auction for Divisible Resources without a Mediator. AAMAS 2020: 1904-1906 - [c34]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c33]Jingyu Sun, Bingyu Liu, Yuan Hong:
LogBug: Generating Adversarial System Logs in Real Time. CIKM 2020: 2229-2232 - [c32]Vijay Atluri, Yuan Hong, Soon Ae Chun:
Security, Privacy and Trust for Responsible Innovations and Governance. DG.O 2020: 365-366 - [c31]Han Wang, Yuan Hong, Yu Kong, Jaideep Vaidya:
Publishing Video Data with Indistinguishable Objects. EDBT 2020: 323-334 - [c30]Shangyu Xie, Han Wang, Yuan Hong, My Thai:
Privacy Preserving Distributed Energy Trading. ICDCS 2020: 322-332 - [c29]Hanbin Hong, Wentao Bao, Yuan Hong, Yu Kong:
Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification. ICPR 2020: 4245-4251 - [i11]Shangyu Xie, Han Wang, Yuan Hong, My Thai:
Privacy Preserving Distributed Energy Trading. CoRR abs/2004.12216 (2020) - [i10]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [j29]Yuan Hong, Li Chen, Lianguang Mo:
Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm. Clust. Comput. 22(Supplement): 7379-7387 (2019) - [j28]Xi Chen, Cheng Fang, Jasmine Chang, Yanjiang Yang, Yuan Hong, Haibing Lu:
Chinese address standardisation via hybrid approach combining statistical and rule-based methods. Int. J. Internet Enterp. Manag. 9(2): 179-193 (2019) - [j27]Feng Chen, Yunlei Pan, Tianzeng Lin, Shan Chen, Yuan Hong:
Computed Tomography-Guided Biopsy Assisted by 18F-FDG Coincidence Imaging for Solid Tumours. J. Medical Imaging Health Informatics 9(2): 366-370 (2019) - [j26]Xianmang He, Yuan Hong, Yindong Chen:
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. EAI Endorsed Trans. Security Safety 5(18): e2 (2019) - [j25]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c28]Shangyu Xie, Yuan Hong, Peng-Jun Wan:
A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid. AAMAS 2019: 2273-2275 - [c27]Yuezhi Che, Yuan Hong, Rujia Wang:
Imbalance-Aware Scheduler for Fast and Secure Ring ORAM Data Retrieval. ICCD 2019: 604-612 - [i9]Shangyu Xie, Han Wang, Shengbin Wang, Haibing Lu, Yuan Hong, Dong Jin, Qi Liu:
Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy. CoRR abs/1902.03916 (2019) - [i8]Chen Change Loy, Dahua Lin, Wanli Ouyang, Yuanjun Xiong, Shuo Yang, Qingqiu Huang, Dongzhan Zhou, Wei Xia, Quanquan Li, Ping Luo, Junjie Yan, Jianfeng Wang, Zuoxin Li, Ye Yuan, Boxun Li, Shuai Shao, Gang Yu, Fangyun Wei, Xiang Ming, Dong Chen, Shifeng Zhang, Cheng Chi, Zhen Lei, Stan Z. Li, Hongkai Zhang, Bingpeng Ma, Hong Chang, Shiguang Shan, Xilin Chen, Wu Liu, Boyan Zhou, Huaxiong Li, Peng Cheng, Tao Mei, Artem Kukharenko, Artem Vasenin, Nikolay Sergievskiy, Hua Yang, Liangqi Li, Qiling Xu, Yuan Hong, Lin Chen, Mingjun Sun, Yirong Mao, Shiying Luo, Yongjun Li, Ruiping Wang, Qiaokang Xie, Ziyang Wu, Lei Lu, Yiheng Liu, Wengang Zhou:
WIDER Face and Pedestrian Challenge 2018: Methods and Results. CoRR abs/1902.06854 (2019) - [i7]Han Wang, Shangyu Xie, Yuan Hong:
VideoDP: A Universal Platform for Video Analytics with Differential Privacy. CoRR abs/1909.08729 (2019) - 2018
- [j24]Haibing Lu, Wendong Zhu, Joseph Phan, Manoochehr Ghiassi, Yi Fang, Yuan Hong, Xiaoyun He:
Fault-tolerant tile mining. Expert Syst. Appl. 101: 25-42 (2018) - [c26]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c25]Yanfeng Qu, Xin Liu, Dong Jin, Yuan Hong, Chen Chen:
Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control. SDN-NFV@CODASPY 2018: 13-18 - [c24]Yuan Hong, Han Wang, Shangyu Xie, Bingyu Liu:
Privacy Preserving and Collusion Resistant Energy Sharing. ICASSP 2018: 6941-6945 - [i6]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Securely Solving the Distributed Graph Coloring Problem. CoRR abs/1803.05606 (2018) - [i5]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2017
- [j23]Wang Hao, Yuan Hong:
Training project arrangement for tennis athletes based on BP neural network model. Int. J. Reason. based Intell. Syst. 9(3/4): 144-148 (2017) - [j22]Xiao Wang, Tielin Shi, Guanglan Liao, Yichun Zhang, Yuan Hong, Kepeng Chen:
Using Wavelet Packet Transform for Surface Roughness Evaluation and Texture Extraction. Sensors 17(4): 933 (2017) - [j21]Feng Liu, Shengbin Wang, Yuan Hong, Xiaohang Yue:
On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions. IEEE Trans. Engineering Management 64(4): 539-553 (2017) - [j20]Yuan Hong, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. IEEE Trans. Inf. Forensics Secur. 12(9): 2227-2241 (2017) - [c23]Yuan Hong, Sanjay Goel, Haibing Lu, Shengbin Wang:
Discovering energy communities for microgrids on the power grid. SmartGridComm 2017: 64-70 - [i4]Yuan Hong, Han Wang, Shangyu Xie, Bingyu Liu:
Privacy Preserving and Collusion Resistant Energy Sharing. CoRR abs/1711.00208 (2017) - 2016
- [j19]Yichun Zhang, Tielin Shi, Lei Su, Xiao Wang, Yuan Hong, Kepeng Chen, Guanglan Liao:
Sparse Reconstruction for Micro Defect Detection in Acoustic Micro Imaging. Sensors 16(10): 1773 (2016) - [j18]Yuan Hong, Jaideep Vaidya, Haibing Lu, Wen Ming Liu:
Accurate and efficient query clustering via top ranked search results. Web Intell. 14(2): 119-138 (2016) - [c22]Ersin Dincelli, Yuan Hong, Nic DePaula:
Information diffusion and opinion change during the gezi park protests: Homophily or social influence? ASIST 2016: 1-5 - [i3]Yuan Hong, Jaideep Vaidya, Nicholas Rizzo, Qi Liu:
Privacy Preserving Linear Programming. CoRR abs/1610.02339 (2016) - 2015
- [j17]Huiqiu Lin, Yuan Hong, Jinlong Shu:
Some Relations Between the Eigenvalues of Adjacency, Laplacian and Signless Laplacian Matrix of a Graph. Graphs Comb. 31(3): 669-677 (2015) - [j16]Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards user-oriented RBAC model. J. Comput. Secur. 23(1): 107-129 (2015) - [j15]Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, Sanjay Goel:
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. IEEE Trans. Dependable Secur. Comput. 12(5): 504-518 (2015) - [c21]Nicholas Rizzo, Ethan Sprissler, Yuan Hong, Sanjay Goel:
Privacy preserving driving style recognition. ICCVE 2015: 232-237 - [p1]Sanjay Goel, Yuan Hong:
Cyber War Games: Strategic Jostling Among Traditional Adversaries. Cyber Warfare 2015: 1-13 - [i2]Nicholas Rizzo, Ethan Sprissler, Yuan Hong, Sanjay Goel:
Privacy Preserving Driving Style Recognition. CoRR abs/1511.00329 (2015) - 2014
- [j14]Yuan Hong, Haibo Liao, Yazhi Jiang:
Construction Engineering Cost Evaluation Model and Application Based on RS-IPSO-BP Neural Network. J. Comput. 9(4): 1020-1025 (2014) - [j13]Yuan Hong, Jaideep Vaidya, Shengbin Wang:
A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications. J. Inf. Syst. 28(1): 243-268 (2014) - [j12]Yuan Hong, Jaideep Vaidya:
An inference-proof approach to privacy-preserving horizontally partitioned linear programs. Optim. Lett. 8(1): 267-277 (2014) - [c20]Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. DBSec 2014: 179-194 - [c19]Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan:
Dynamic Workflow Adjustment with Security Constraints. DBSec 2014: 211-226 - 2013
- [c18]Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards User-Oriented RBAC Model. DBSec 2013: 81-96 - [c17]Yuan Hong, Changhao Xia, Shixiang Zhang, Lin Wu, Chao Yuan, Ying Huang, Xuxu Wang, Haifeng Zhu:
Load forecasting using elastic gradient descent. ICNC 2013: 247-251 - [c16]Jaideep Vaidya, Basit Shafiq, Anirban Basu, Yuan Hong:
Differentially Private Naive Bayes Classification. Web Intelligence 2013: 571-576 - 2012
- [j11]Yarong Wu, Jinlong Shu, Yuan Hong:
The Minimal Limit Point of the Third Largest Laplacian Eigenvalues of Graphs. Ars Comb. 103: 119-127 (2012) - [j10]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Secure and efficient distributed linear programming. J. Comput. Secur. 20(5): 583-634 (2012) - [j9]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. IEEE Trans. Dependable Secur. Comput. 9(5): 655-669 (2012) - [c15]Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri:
Privacy-Preserving Subgraph Discovery. DBSec 2012: 161-176 - [c14]Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu:
Differentially private search log sanitization with optimal output utility. EDBT 2012: 50-61 - [c13]Haibing Lu, Yuan Hong, W. Nick Street, Fei Wang, Hanghang Tong:
Overlapping Clustering with Sparseness Constraints. ICDM Workshops 2012: 486-494 - 2011
- [j8]Mingqing Zhai, Jinlong Shu, Yuan Hong:
On the Laplacian spread of graphs. Appl. Math. Lett. 24(12): 2097-2101 (2011) - [j7]Zhen Liu, Yuan Hong, Qiong Liu, Yan-Jie Chai:
An Emotion Model for Virtual Agents with Evolvable Motivation. Trans. Edutainment 6: 154-163 (2011) - [c12]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Efficient Distributed Linear Programming with Limited Disclosure. DBSec 2011: 170-185 - [c11]Yuan Hong, Jaideep Vaidya, Haibing Lu, Basit Shafiq:
Privacy-Preserving Tabu Search for Distributed Graph Coloring. SocialCom/PASSAT 2011: 951-958 - [c10]Yuan Hong, Jaideep Vaidya, Haibing Lu:
Search Engine Query Clustering Using Top-k Search Results. Web Intelligence 2011: 112-119 - [i1]Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu:
Differentially Private Search Log Sanitization with Optimal Output Utility. CoRR abs/1108.0186 (2011)
2000 – 2009
- 2009
- [c9]Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri:
Effective anonymization of query logs. CIKM 2009: 1465-1468 - [c8]Fan Wang, Yuan Hong, Wenbin Zhang, Gagan Agrawal:
Personality Based Latent Friendship Mining. DMIN 2009: 427-433 - [c7]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Extended Boolean Matrix Decomposition. ICDM 2009: 317-326 - [c6]Bangquan Liu, Zhen Liu, Yuan Hong:
A Simulation Based on Emotions Model for Virtual Human Crowds. ICIG 2009: 836-840 - 2008
- [j6]Yuan Hong, Han-Wei Shen:
Parallel reflective symmetry transformation for volume data. Comput. Graph. 32(1): 41-54 (2008) - [c5]Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 - [c4]Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli:
Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 - [c3]Hao Liu, Yuan Hong, Hongwei Hao, Chengyao Wang:
Kernel: A RDB-Based Object Persistence Component Set for Java. CSSE (2) 2008: 64-67 - 2007
- [c2]Yuan Hong, Han-Wei Shen:
Parallel Reflective Symmetry Transformation for Volume Data. EGPGV 2007: 77-83 - 2005
- [j5]Yuan Hong, Xiao-Dong Zhang:
Sharp upper and lower bounds for largest eigenvalue of the Laplacian matrices of trees. Discret. Math. 296(2-3): 187-197 (2005) - [c1]Danny van Noort, Yuan Hong, Joseph Ibershoff, Jerzy W. Jaromczyk:
Simulation and Visualization for DNA Computing in Microreactors. ICNC (2) 2005: 1206-1217 - 2004
- [j4]Yuan Hong:
Tree-width, clique-minors, and eigenvalues. Discret. Math. 274(1-3): 281-287 (2004) - 2001
- [j3]Yuan Hong, Jinlong Shu, Kunfu Fang:
A Sharp Upper Bound of the Spectral Radius of Graphs. J. Comb. Theory B 81(2): 177-183 (2001) - 2000
- [j2]Yuan Hong, Jinlong Shu:
A sharp upper bound for the spectral radius of the Nordhaus-Gaddum type. Discret. Math. 211: 229-232 (2000)
1990 – 1999
- 1993
- [j1]Yuan Hong:
Bounds of eigenvalues of graphs. Discret. Math. 123(1-3): 65-74 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint