Tao Leng

Orcid: 0009-0002-2705-3826

According to our database1, Tao Leng authored at least 23 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT.
IEEE Internet Things J., July, 2025

Accuracy-Improved Privacy-Preserving Asynchronous Federated Learning in IoT.
IEEE Internet Things J., May, 2025

Efficient Homomorphic-Encryption-Based Secure Search in Multiowner Setting for Internet of Things.
IEEE Internet Things J., April, 2025

Outsourcing collaboration analysis of multiparty privacy data using the improved Yannakakis.
J. Supercomput., February, 2025

A bias evaluation solution for multiple sensitive attribute speech recognition.
Comput. Speech Lang., 2025

TaintAttack: rapid attack investigation based on information flow tracking.
Comput. J., 2025

Interpretability adversarial example detection through multi-interpretation aggregation comparison.
Appl. Soft Comput., 2025

2024
Efficient Secure Inference Scheme in Multiparty Settings for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, October, 2024

Tripartite evolutionary game in the process of network attack and defense.
Telecommun. Syst., June, 2024

An explainable deepfake of speech detection method with spectrograms and waveforms.
J. Inf. Secur. Appl., 2024

A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy.
Comput. Secur., 2024

Efficient privacy-preserving federated learning under dishonest-majority setting.
Sci. China Inf. Sci., 2024

GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

SGCML: Detecting Hacker Community Hidden in Chat Group.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

2023
MemInspect: Memory Forensics for investigating Fileless Attacks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Improving Adversarial Robustness via Channel and Depth Compatibility.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Cooperative user association and resource allocation for task offloading in hybrid GEO-LEO satellite networks.
Int. J. Satell. Commun. Netw., 2022

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Proceedings of the Security and Privacy in Communication Networks, 2022

2021
Caching-Aware Intelligent Handover Strategy for LEO Satellite Networks.
Remote. Sens., 2021

A Framework of Darknet Forensics.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021


  Loading...