Haomiao Yang

According to our database1, Haomiao Yang authored at least 57 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Dropout-Tolerated Privacy-Preserving Method for Decentralized Crowdsourced Federated Learning.
IEEE Internet Things J., January, 2024

2023
FedVAE: Communication-Efficient Federated Learning With Non-IID Private Data.
IEEE Syst. J., September, 2023

Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator.
Peer Peer Netw. Appl., September, 2023

Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

A Comprehensive Overview of Backdoor Attacks in Large Language Models within Communication Networks.
CoRR, 2023

Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
PIPC: Privacy- and Integrity-Preserving Clustering Analysis for Load Profiling in Smart Grids.
IEEE Internet Things J., 2022

An intrusion detection system based on multiple interpretation methods.
Proceedings of the IEEE Smartworld, 2022

Secure SVM Services with Multiple Service Providers and Subscribers in the Cloud.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Predictive Model of COVID-19 mRNA Vaccine Reactivity based on Dual Attention for Federated Learning Scenarios.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Pragmatic Label-Specific Backdoor Attack.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
AEALV: Accurate and Efficient Aircraft Location Verification for ADS-B.
IEEE Trans. Cogn. Commun. Netw., 2021

A public key encryption scheme based on a new variant of LWE with small cipher size.
J. Syst. Archit., 2021

Cloud-based privacy- and integrity-protecting density peaks clustering.
Future Gener. Comput. Syst., 2021

Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Accurate Image-Based Pedestrian Detection With Privacy Preservation.
IEEE Trans. Veh. Technol., 2020

Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage.
IEEE Trans. Serv. Comput., 2020

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence.
IEEE Trans. Ind. Informatics, 2020

Secure and Efficient k NN Classification for Industrial Internet of Things.
IEEE Internet Things J., 2020

Accelerating Poisoning Attack Through Momentum and Adam Algorithms.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Improving Communication Efficiency for Encrypted Distributed Training.
Proceedings of the Security and Privacy in Digital Economy, 2020

Private, Fair, and Verifiable Aggregate Statistics for Mobile Crowdsensing in Blockchain Era.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

Privacy-preserving HE-based clustering for load profiling over encrypted smart meter data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning.
IEEE Netw., 2019

Securing content-centric networks with content-based encryption.
J. Netw. Comput. Appl., 2019

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019

A Practical and Compatible Cryptographic Solution to ADS-B Security.
IEEE Internet Things J., 2019

An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare.
IEEE Internet Things J., 2019

Design and development of a DDDAMS-based border surveillance system via UVs and hybrid simulations.
Expert Syst. Appl., 2019

Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Efficient and Privacy-Preserving Federated Deep Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
An Improved Characters Recognition Approach Using Fast Determinant Recursion.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Towards practical personalized recommendation with multi-level differential privacy controls.
Proceedings of the IEEE INFOCOM 2018, 2018

Efficient and Secure kNN Classification over Encrypted Data Using Vector Homomorphic Encryption.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Efficient and Secure Outsourced Linear Regression.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

Image Feature Extraction with Homomorphic Encryption on Integer Vector.
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017

LHCSAS: A Lightweight and Highly-Compatible Solution for ADS-B Security.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Practical blacklist-based anonymous authentication scheme for mobile crowd sensing.
Peer-to-Peer Netw. Appl., 2016

SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system.
Peer-to-Peer Netw. Appl., 2015

Achieving efficient and privacy-preserving multi-feature search for mobile sensing.
Comput. Commun., 2015

Statistical modeling of heterogeneous robotic assembly time with Weibull regression.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

2014
EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014

Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2014

Efficient public key encryption with revocable keyword search.
Secur. Commun. Networks, 2014

Achieving Multi-Authority Access Control with Efficient Attribute Revocation in smart grid.
Proceedings of the IEEE International Conference on Communications, 2014

2013
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages.
KSII Trans. Internet Inf. Syst., 2013

An Efficient Somewhat HE scheme over Integers and Its Variation.
KSII Trans. Internet Inf. Syst., 2013

Attack on Recent Homomorphic Encryption Scheme over Integers.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Identity-Based Privacy Preservation Framework over u-Healthcare System.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

ADS-B Data Authentication Based on AH Protocol.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2009
Identity-Based Authentication for Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009


  Loading...