Qingqing Ye

Orcid: 0000-0003-1547-2847

Affiliations:
  • Hong Kong Polytechnic University, Hong Kong
  • Renmin University of China, Beijing, China (PhD 2020)


According to our database1, Qingqing Ye authored at least 100 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
GeoRecover: Recovery From Poisoning Attacks for LDP-Enabled Spatial Density Aggregation.
IEEE Trans. Knowl. Data Eng., October, 2025

Analyzing and Enhancing LDP Perturbation Mechanisms in Federated Learning.
IEEE Trans. Knowl. Data Eng., October, 2025

Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts.
CoRR, October, 2025

Decision Potential Surface: A Theoretical and Practical Approximation of LLM's Decision Boundary.
CoRR, October, 2025

Virus Infection Attack on LLMs: Your Poisoning Can Spread "VIA" Synthetic Data.
CoRR, September, 2025

A Survey on Securing Image-Centric Edge Intelligence.
ACM Trans. Multim. Comput. Commun. Appl., August, 2025

WiFinger: Fingerprinting Noisy IoT Event Traffic Using Packet-level Sequence Matching.
CoRR, August, 2025

Reminiscence Attack on Residuals: Exploiting Approximate Machine Unlearning for Privacy.
CoRR, July, 2025

How Much Do Large Language Model Cheat on Evaluation? Benchmarking Overestimation under the One-Time-Pad-Based Framework.
CoRR, July, 2025

<i>PrivRM</i>: A Framework for Range Mean Estimation under Local Differential Privacy.
Proc. ACM Manag. Data, June, 2025

Unlearning Isn't Deletion: Investigating Reversibility of Machine Unlearning in LLMs.
CoRR, May, 2025

Does Low Rank Adaptation Lead to Lower Robustness against Training-Time Attacks?
CoRR, May, 2025

OBLIVIATE: Robust and Practical Machine Unlearning for Large Language Models.
CoRR, May, 2025

A Novel Modeling Approach for Cumulative Belief Rule-Base With Joint Optimization and Rule Synthesis.
IEEE Trans. Syst. Man Cybern. Syst., April, 2025

Membership Inference Attacks and Defenses in Federated Learning: A Survey.
ACM Comput. Surv., April, 2025

Technical Report: Full Version of Analyzing and Optimizing Perturbation of DP-SGD Geometrically.
CoRR, April, 2025

Privacy for Free: Leveraging Local Differential Privacy Perturbed Data from Multiple Services.
Proc. VLDB Endow., February, 2025

Federated Heavy Hitter Analytics with Local Differential Privacy.
Proc. ACM Manag. Data, February, 2025

Fine-tuning is Not Fine: Mitigating Backdoor Attacks in GNNs with Limited Clean Data.
CoRR, January, 2025

DPDeno: A Post-Processing Framework for Releasing Differentially Private Spatio-Temporal Mobility Features.
IEEE Trans. Inf. Forensics Secur., 2025

Enhancing Federated Learning With Differentially Private Continuous Data Release via k-Ary Trees.
IEEE Trans. Inf. Forensics Secur., 2025

ProVFL: Property Inference Attacks Against Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Unlocking High-Fidelity Learning: Towards Neuron-Grained Model Extraction.
IEEE Trans. Dependable Secur. Comput., 2025

Top-k Discovery Under Local Differential Privacy: An Adaptive Sampling Approach.
IEEE Trans. Dependable Secur. Comput., 2025

RMR: A Relative Membership Risk Measure for Machine Learning Models.
IEEE Trans. Dependable Secur. Comput., 2025

Multi-hop sanitizable signature for collaborative edge computing.
J. Comput. Secur., 2025

Secure bi-attribute index: Batch membership tests over the non-sensitive attribute.
Comput. Secur., 2025

MER-Inspector: Assessing Model Extraction Risks from An Attack-Agnostic Perspective.
Proceedings of the ACM on Web Conference 2025, 2025

FUNU: Boosting Machine Unlearning Efficiency by Filtering Unnecessary Unlearning.
Proceedings of the ACM on Web Conference 2025, 2025

From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

PrivDPR: Synthetic Graph Publishing with Deep PageRank under Differential Privacy.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025

AdvSGM: Differentially Private Graph Learning via Adversarial Skip-Gram Model.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

Structure-Preference Enabled Graph Embedding Generation Under Differential Privacy.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

Multi-Class Item Mining Under Local Differential Privacy.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

PrivIM: Differentially Private Graph Neural Networks for Influence Maximization.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

Data Poisoning Attacks to Local Differential Privacy Protocols for Graphs.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

Analyzing and Optimizing Perturbation of DP-SGD Geometrically.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

Dual Utilization of Perturbation for Stream Data Publication Under Local Differential Privacy.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025

"Yes, My LoRD." Guiding Language Model Extraction with Locality Reinforced Distillation.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

Exploring Intrinsic Alignments Within Text Corpus.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

A Sample-Level Evaluation and Generative Framework for Model Inversion Attacks.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
EPS$^{2}$2: Privacy Preserving Set-Valued Data Analysis in the Shuffle Model.
IEEE Trans. Knowl. Data Eng., November, 2024

LDPGuard: Defenses Against Data Poisoning Attacks to Local Differential Privacy Protocols.
IEEE Trans. Knowl. Data Eng., July, 2024

PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential Privacy.
Proc. VLDB Endow., July, 2024

Utility-Aware Time Series Data Release With Anomalies Under TLDP.
IEEE Trans. Mob. Comput., June, 2024

TED$^+$+: Towards Discovering Top-k Edge-Diversified Patterns in a Graph Database.
IEEE Trans. Knowl. Data Eng., May, 2024

DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release.
Proc. VLDB Endow., February, 2024

PUTS: Privacy-Preserving and Utility-Enhancing Framework for Trajectory Synthesization.
IEEE Trans. Knowl. Data Eng., January, 2024

LDPTube: Theoretical Utility Benchmark and Enhancement for LDP Mechanisms in High-Dimensional Space.
IEEE Trans. Knowl. Data Eng., 2024

DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.
ACM Trans. Priv. Secur., 2024

Generating Location Traces With Semantic- Constrained Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices.
IEEE Trans. Inf. Forensics Secur., 2024

Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

A Federated Learning Framework Based on Differentially Private Continuous Data Release.
IEEE Trans. Dependable Secur. Comput., 2024

DWSSA: Alleviating over-smoothness for deep Graph Neural Networks.
Neural Networks, 2024

Differential Privacy for Time Series: A Survey.
IEEE Data Eng. Bull., 2024

New Paradigm of Adversarial Training: Breaking Inherent Trade-Off between Accuracy and Robustness via Dummy Classes.
CoRR, 2024

Alignment-Aware Model Extraction Attacks on Large Language Models.
CoRR, 2024

Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models.
CoRR, 2024

Time-Specific Integrity Service in MQTT Protocol.
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024

LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Differentially Private Graph Neural Networks for Link Prediction.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

PrivShape: Extracting Shapes in Time Series Under User-Level Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

FRESH: Towards Efficient Graph Queries in an Outsourced Graph.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Interactive Trimming Against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

LDP-Purifier: Defending against Poisoning Attacks in Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2024

2023
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM.
IEEE Trans. Intell. Transp. Syst., December, 2023

Partial message verification in fog-based industrial Internet of things.
Comput. Secur., December, 2023

DDRM: A Continual Frequency Estimation Mechanism With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., July, 2023

Synthesizing Realistic Trajectory Data With Differential Privacy.
IEEE Trans. Intell. Transp. Syst., May, 2023

Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware Enclave.
IEEE Trans. Cloud Comput., 2023

Trajectory Data Collection with Local Differential Privacy.
Proc. VLDB Endow., 2023

TED: Towards Discovering Top-k Edge-Diversified Patterns in a Graph Database.
Proc. ACM Manag. Data, 2023

OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol.
J. Comput. Secur., 2023

Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.
Future Gener. Comput. Syst., 2023

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Stateful Switch: Optimized Time Series Release with Local Differential Privacy.
Proceedings of the IEEE INFOCOM 2023, 2023

Differential Aggregation against General Colluding Attackers.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Towards Defending Against Byzantine LDP Amplified Gain Attacks.
Proceedings of the Database Systems for Advanced Applications, 2023

CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Privacy and efficiency guaranteed social subgraph matching.
VLDB J., 2022

SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.
IEEE Trans. Netw. Serv. Manag., 2022

LF-GDPR: A Framework for Estimating Graph Metrics With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2022

Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications.
IEEE Trans. Inf. Forensics Secur., 2022

Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

VINCENT: Towards Efficient Exploratory Subgraph Search in Graph Databases.
Proc. VLDB Endow., 2022

Stateful-CCSH: An Efficient Authentication Scheme for High-Resolution Video Surveillance System.
IEEE Internet Things J., 2022

MExMI: Pool-based Active Model Extraction Crossover Membership Inference.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Practical Escrow Protocol for Bitcoin.
IEEE Trans. Inf. Forensics Secur., 2020

Towards Locally Differentially Private Generic Graph Metric Estimation.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Local Differential Privacy: Tools, Challenges, and Opportunities.
Proceedings of the Web Information Systems Engineering, 2019

PrivKV: Key-Value Data Collection with Local Differential Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Mobile Data Collection and Analysis with Local Differential Privacy.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019


  Loading...