Yantian Hou

According to our database1, Yantian Hou authored at least 30 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020

CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest.
EAI Endorsed Trans. Security Safety, 2020

2019
LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT.
CoRR, 2019

Edge-Assisted CNN Inference over Encrypted Data for Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2019

Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree.
Proceedings of the Security and Privacy in Communication Networks, 2019

Workload-Aware Task Placement in Edge-Assisted Human Re-identification.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

PDF-DS: Privacy-Preserving Data Filtering for Distributed Data Streams in Cloud.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

FlowCon: Elastic Flow Configuration for Containerized Deep Learning Applications.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Flexibly and Securely Shape Your Data Disclosed to Others.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized KD-Forest.
CoRR, 2018

On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Secure Similar Sequence Query on Outsourced Genomic Data.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Making Wireless Body Area Networks Robust Under Cross-Technology Interference.
IEEE Trans. Wirel. Commun., 2017

Security and Privacy in Internet of Things with Crowd-Sensing.
J. Electr. Comput. Eng., 2017

Throughput optimization in multi-hop wireless networks with reconfigurable antennas.
Proceedings of the 2017 International Conference on Computing, 2017

Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks.
Proceedings of the 2017 International Conference on Computing, 2017

EDOS: Edge Assisted Offloading System for Mobile Devices.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

CAPIA: Cloud assisted privacy-preserving image annotation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence.
IEEE Trans. Wirel. Commun., 2016

Practical and secure nearest neighbor search on encrypted large-scale data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A game theoretical approach to coexistence of heterogeneous MIMO wireless networks with interference cancellation.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Surviving the RF smog: Making Body Area Networks robust to cross-technology interference.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

2011
A Low-complexity Video Coding Scheme Based on Compressive Sensing.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011


  Loading...