Lei Yu

Orcid: 0000-0001-5968-0344

Affiliations:
  • Rensselaer Polytechnic Institute, Department of Computer Science, Troy, NY, USA (2013 - )
  • IBM Research (2019 - 2022)
  • Georgia Institute of Technology, School of Computer Science, Atlanta, GA, USA (2015 - 2019)
  • Clemson University, Department of Electrical and Computer Engineering, Clemson, SC, USA (2011 - 2013)
  • Harbin Institute of Technology, China (PhD 2011)


According to our database1, Lei Yu authored at least 53 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control.
CoRR, 2024

2023
Privacy-Preserving Redaction of Diagnosis Data through Source Code Analysis.
Proceedings of the 35th International Conference on Scientific and Statistical Database Management, 2023

A Comparison of End-to-End Decision Forest Inference Pipelines.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

2022
Serving Deep Learning Models with Deduplication from Relational Databases.
Proc. VLDB Endow., 2022

Documentation based Semantic-Aware Log Parsing.
CoRR, 2022

2021
Demystifying Membership Inference Attacks in Machine Learning as a Service.
IEEE Trans. Serv. Comput., 2021

Towards Deadline Guaranteed Cloud Storage Services.
IEEE Trans. Serv. Comput., 2021

2020
Stochastic Load Balancing for Virtual Resource Management in Datacenters.
IEEE Trans. Cloud Comput., 2020

2019
Towards Green Wireless Networking: Fading-Resistant Time Constraint Broadcasts Using Cooperative Communication.
IEEE Trans. Netw. Sci. Eng., 2019

Data Collection with Accuracy-Aware Congestion Control in Sensor Networks.
IEEE Trans. Mob. Comput., 2019

Differentially Private and Utility Preserving Publication of Trajectory Data.
IEEE Trans. Mob. Comput., 2019

Demystifying Learning Rate Polices for High Accuracy Training of Deep Neural Networks.
CoRR, 2019

Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability.
Proceedings of the First IEEE International Conference on Trust, 2019

Differentially Private Model Publishing for Deep Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

GRAHIES: Multi-Scale Graph Representation Learning with Latent Hierarchical Structure.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019

Demystifying Learning Rate Policies for High Accuracy Training of Deep Neural Networks.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Towards Bandwidth Guarantee for Virtual Clusters Under Demand Uncertainty in Multi-Tenant Clouds.
IEEE Trans. Parallel Distributed Syst., 2018

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2018

Towards Demystifying Membership Inference Attacks.
CoRR, 2018

Adversarial Examples in Deep Learning: Characterization and Divergence.
CoRR, 2018

Cloud Assisted Traffic Redundancy Elimination for Power Efficiency in Smartphones.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement.
IEEE Trans. Serv. Comput., 2017

CoRE: Cooperative End-to-End Traffic Redundancy Elimination for Reducing Cloud Bandwidth Cost.
IEEE Trans. Parallel Distributed Syst., 2017

Prediction-based redundant data elimination with content overhearing in wireless networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Dynamic Differential Location Privacy with Personalized Error Bounds.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Privacy-Preserving Inductive Learning with Decision Trees.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
A Review of Communication, Driver Characteristics, and Controls Aspects of Cooperative Adaptive Cruise Control (CACC).
IEEE Trans. Intell. Transp. Syst., 2016

Low-Latency Multi-Flow Cooperative Broadcast in Fading Wireless Networks.
IEEE Trans. Computers, 2016

Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Probabilistic Network-Aware Task Placement for MapReduce Scheduling.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

Goodbye to Fixed Bandwidth Reservation: Job Scheduling with Elastic Bandwidth Reservation in Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Towards Deadline Guaranteed Cloud Storage Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks.
IEEE Trans. Mob. Comput., 2015

Characterizing data deliverability of greedy routing in wireless sensor networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Congestion-adaptive data collection with accuracy guarantee in cyber-physical systems.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Energy-Efficient and Delay-Constrained Broadcast in Time-Varying Energy-Demand Graphs.
Proceedings of the 44th International Conference on Parallel Processing, 2015

2014
Secure Continuous Aggregation in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Efficient Data Collection for Large-Scale Mobile Monitoring Applications.
IEEE Trans. Parallel Distributed Syst., 2014

Energy-efficient cooperative broadcast in fading wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Bandwidth Guarantee under Demand Uncertainty in Multi-tenant Clouds.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
Low-latency multi-flow broadcasts in fading wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs.
IEEE Trans. Parallel Distributed Syst., 2012

HAS: Hidden anti-theft system based on wireless sensor networks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Efficient algorithms for sensor deployment and routing in sensor networks for network-structured environment monitoring.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Location Aware Peak Value Queries in sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Secure continuous aggregation via sampling-based verification in wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Approximate Continuous Aggregation via Time Window Based Compression and Sampling in WSNs.
Wirel. Sens. Netw., 2010

Bernoulli Sampling Based (element of, delta)-Approximate Aggregation in Large-Scale Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Maximize the Lifetime of a Data-gathering Wireless Sensor Network.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
SpyMon: Hidden network monitoring for security in wireless sensor Networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008


  Loading...