Yifan Tian

According to our database1, Yifan Tian authored at least 14 papers between 2016 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest.
EAI Endorsed Trans. Security Safety, 2020

Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference.
IACR Cryptol. ePrint Arch., 2020

2019
Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset.
IEEE Trans. Cloud Comput., 2019

Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones.
J. Inf. Secur. Appl., 2019

LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT.
CoRR, 2019

Edge-Assisted CNN Inference over Encrypted Data for Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2019

PDF-DS: Privacy-Preserving Data Filtering for Distributed Data Streams in Cloud.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Secure and Reliable Decentralized Truth Discovery Using Blockchain.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications.
Proceedings of the 1st Conference on Automated Knowledge Base Construction, 2019

2018
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized KD-Forest.
CoRR, 2018

2017
CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural Network.
Proceedings of the VI International Conference on Network, Communication and Computingm, 2017

CAPIA: Cloud assisted privacy-preserving image annotation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Securing commercial WiFi-based UAVs from common security attacks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

SBPA: Social behavior based cross Social Network phishing attacks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016


  Loading...