Yifeng Zheng

Orcid: 0000-0001-7852-6051

According to our database1, Yifeng Zheng authored at least 99 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enabling Verifiable Search and Integrity Auditing in Encrypted Decentralized Storage Using One Proof.
IEEE Trans. Computers, August, 2025

PrivAGM: Secure Construction of Differentially Private Directed Attributed Graph Models on Decentralized Social Graphs.
Proc. VLDB Endow., July, 2025

Kill Two Birds with One Stone! Trajectory enabled Unified Online Detection of Adversarial Examples and Backdoor Attacks.
CoRR, June, 2025

Reversible Data Hiding over Encrypted Images via Intrinsic Correlation in Block-Based Secret Sharing.
CoRR, February, 2025

Boosting Deepfake Detection Generalizability via Expansive Learning and Confidence Judgement.
IEEE Trans. Circuits Syst. Video Technol., January, 2025

Privacy-Preserving Competitive Detour Tasking in Spatial Crowdsourcing.
IEEE Trans. Serv. Comput., 2025

ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud.
IEEE Trans. Serv. Comput., 2025

OblivTime: Oblivious and Efficient Interval Skyline Query Processing Over Encrypted Time-Series Data.
IEEE Trans. Serv. Comput., 2025

Decaf: Data Distribution Decompose Attack Against Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Division and Union: Latent Model Watermarking.
IEEE Trans. Inf. Forensics Secur., 2025

Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2025

${\sf GoCrowd}$GoCrowd: Obliviously Aggregating Crowd Wisdom With Quality Awareness in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2025

FineBID: Fine-Grained Protocol Reverse Engineering for Bit-Level Field IDentification.
IEEE Trans. Dependable Secur. Comput., 2025

2024
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models.
IEEE Trans. Circuits Syst. Video Technol., November, 2024

Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024

Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions.
Wirel. Networks, July, 2024

Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

LSDedup: Layered Secure Deduplication for Cloud Storage.
IEEE Trans. Computers, February, 2024

PrivRo: A Privacy-Preserving Crowdsourcing Service With Robust Quality Awareness.
IEEE Trans. Serv. Comput., 2024

Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service.
IEEE Trans. Serv. Comput., 2024

eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security.
IEEE Trans. Inf. Forensics Secur., 2024

SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark.
IEEE Trans. Inf. Forensics Secur., 2024

SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024

Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024

BopSkyline: Boosting privacy-preserving skyline query service in the cloud.
Comput. Secur., 2024

Towards robust and privacy-preserving federated learning in edge computing.
Comput. Networks, 2024

SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud.
Proceedings of the 33rd USENIX Security Symposium, 2024

Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting.
Proceedings of the Computer Security - ESORICS 2024, 2024

Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing.
IEEE Trans. Parallel Distributed Syst., October, 2023

PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service.
IEEE Trans. Knowl. Data Eng., October, 2023

MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023

SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases.
IEEE Trans. Knowl. Data Eng., September, 2023

Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition.
IEEE Trans. Knowl. Data Eng., July, 2023

Toward Robust Hierarchical Federated Learning in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., May, 2023

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing.
Comput. Networks, April, 2023

Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN.
Comput. Networks, April, 2023

Enabling Large-Capacity Reversible Data Hiding Over Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., March, 2023

Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables.
IEEE Trans. Serv. Comput., 2023

SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service.
IEEE Trans. Serv. Comput., 2023

MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2023

Optimizing Secure Decision Tree Inference Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques.
IEEE Trans. Dependable Secur. Comput., 2023

Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes.
IEEE Trans. Cloud Comput., 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

2022
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2022

OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2022

Securely and Efficiently Outsourcing Decision Tree Inference.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Collaborative Analytics on Medical Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy.
IEEE Trans. Cloud Comput., 2022

Towards privacy-preserving and verifiable federated matrix factorization.
Knowl. Based Syst., 2022

Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization.
IACR Cryptol. ePrint Arch., 2022

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022

Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service.
CoRR, 2022

SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Comput. Secur., 2022

Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

2021
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.
IEEE Trans. Serv. Comput., 2021

Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising.
IEEE Trans. Dependable Secur. Comput., 2021

Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Proceedings of the Computer Security - ESORICS 2021, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
A Practical System for Privacy-Aware Targeted Mobile Advertising Services.
IEEE Trans. Serv. Comput., 2020

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2020

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System.
CoRR, 2020

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

Towards IoT Security Automation and Orchestration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019

A Privacy-Preserving System for Targeted Coupon Service.
IEEE Access, 2019

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

Towards Secure and Efficient Outsourcing of Machine Learning Classification.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2018

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern.
IEEE Access, 2018

Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Toward Secure Image Denoising: A Machine Learning Based Realization.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multim., 2017

Privacy-Preserving Image Denoising From External Cloud Databases.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Towards privacy-preserving user targeting.
J. Commun. Inf. Networks, 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos.
Multim. Tools Appl., 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A novel image scrambling degree blind evaluation scheme based on Bhattacharyya coefficient.
Proceedings of the 9th International Symposium on Communication Systems, 2014


  Loading...