Yifeng Zheng

Orcid: 0009-0002-5072-5184

According to our database1, Yifeng Zheng authored at least 107 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

LSDedup: Layered Secure Deduplication for Cloud Storage.
IEEE Trans. Computers, February, 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024

DRL-Based Contract Incentive for Wireless-Powered and UAV-Assisted Backscattering MEC System.
IEEE Trans. Cloud Comput., 2024

2023
FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing.
IEEE Trans. Parallel Distributed Syst., October, 2023

PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service.
IEEE Trans. Knowl. Data Eng., October, 2023

MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023

SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases.
IEEE Trans. Knowl. Data Eng., September, 2023

Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition.
IEEE Trans. Knowl. Data Eng., July, 2023

Mobile edge computing-enabled blockchain: contract-guided computation offloading.
J. Supercomput., May, 2023

Toward Robust Hierarchical Federated Learning in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., May, 2023

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing.
Comput. Networks, April, 2023

Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN.
Comput. Networks, April, 2023

Enabling Large-Capacity Reversible Data Hiding Over Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., March, 2023

Contract-based Cooperative Computation and Communication Resources Sharing in Mobile Edge Computing.
J. Grid Comput., March, 2023

Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables.
IEEE Trans. Serv. Comput., 2023

SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service.
IEEE Trans. Serv. Comput., 2023

MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2023

Optimizing Secure Decision Tree Inference Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques.
IEEE Trans. Dependable Secur. Comput., 2023

Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes.
IEEE Trans. Cloud Comput., 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023

ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud.
CoRR, 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

SSUIE 1.0: A Dataset for Chinese Space Science and Utilization Information Extraction.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

A Lexicon Enhanced Chinese Long Named Entity Recognition Using Word-Aware Attention.
Proceedings of the 6th International Conference on Machine Learning and Natural Language Processing, 2023

Computation Offloading in Mobile Edge Computing-Enabled Blockchain using Matching and Contract Theory.
Proceedings of the 12th International Conference on Networks, Communication and Computing, 2023

Efficient and Secure Spatial Range Query over Large-scale Encrypted Data.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2022

OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2022

Securely and Efficiently Outsourcing Decision Tree Inference.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Collaborative Analytics on Medical Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy.
IEEE Trans. Cloud Comput., 2022

Towards privacy-preserving and verifiable federated matrix factorization.
Knowl. Based Syst., 2022

Research on the Bionic Flexible End-Effector Based on Tomato Harvesting.
J. Sensors, 2022

Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization.
IACR Cryptol. ePrint Arch., 2022

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022

Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service.
CoRR, 2022

SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Comput. Secur., 2022

An optimization approach with weighted SCiForest and weighted Hausdorff distance for noise data and redundant data.
Appl. Intell., 2022

Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Deep Reinforcement Learning based Contract Incentive for UAVs and Energy Harvest Assisted Computing.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.
IEEE Trans. Serv. Comput., 2021

Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising.
IEEE Trans. Dependable Secur. Comput., 2021

Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Rhythm Capsule Network Recognition Structure for Motor Imagery Classification.
J. Web Eng., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

A novel feature selection approach with Pareto optimality for multi-label data.
Appl. Intell., 2021

Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Distributed Algorithm for Computation Offloading in Mobile Edge Computing.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Proceedings of the Computer Security - ESORICS 2021, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
A Practical System for Privacy-Aware Targeted Mobile Advertising Services.
IEEE Trans. Serv. Comput., 2020

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2020

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

A New Efficient Algorithm Based on Multi-Classifiers Model for Classification.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2020

Distributed algorithm for AP association with random arrivals and departures of users.
IET Commun., 2020

RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System.
CoRR, 2020

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

Towards IoT Security Automation and Orchestration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019

Feature Selection With Ensemble Learning Based on Improved Dempster-Shafer Evidence Fusion.
IEEE Access, 2019

A Privacy-Preserving System for Targeted Coupon Service.
IEEE Access, 2019

Semi-Supervised Learning Based on Generative Adversarial Network and Its Applied to Lithology Recognition.
IEEE Access, 2019

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

An Improved Over-sampling Algorithm based on iForest and SMOTE.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Towards Secure and Efficient Outsourcing of Machine Learning Classification.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2018

Spectrum Sharing for Heterogeneous Networks and Application Systems in TV White Spaces.
IEEE Access, 2018

Energy Efficiency Consideration for Indoor Femtocell Networks in TV White Spaces.
IEEE Access, 2018

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern.
IEEE Access, 2018

Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Toward Secure Image Denoising: A Machine Learning Based Realization.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Direct, Near Real Time Animation of a 3D Tongue Model Using Non-Invasive Ultrasound Images.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multim., 2017

Privacy-Preserving Image Denoising From External Cloud Databases.
IEEE Trans. Inf. Forensics Secur., 2017

A New Algorithm for Classification Based on Multi-classifiers Learning.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
Towards privacy-preserving user targeting.
J. Commun. Inf. Networks, 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos.
Multim. Tools Appl., 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A novel image scrambling degree blind evaluation scheme based on Bhattacharyya coefficient.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2010
A bi-labeling based XPath processing system.
Inf. Syst., 2010

2006
Crimson: A Data Management System to Support Evaluating Phylogenetic Tree Reconstruction Algorithms.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

An Efficient XPath Query Processor for XML Streams.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Designing and Evaluating an XPath Dialect for Linguistic Queries.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2005
Efficiently Supporting Structure Queries on Phylogenetic Trees.
Proceedings of the 17th International Conference on Scientific and Statistical Database Management, 2005

ViteX: A Streaming XPath Processing System.
Proceedings of the 21st International Conference on Data Engineering, 2005

2004
BLAS: An Efficient XPath Processing System.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004

2003
RRXF: Redundancy reducing XML storage in relations.
Proceedings of 29th International Conference on Very Large Data Bases, 2003

2002
Constraints preserving schema mapping from XML to relations.
Proceedings of the Fifth International Workshop on the Web and Databases, 2002

XKvalidator: a constraint validator for XML.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002


  Loading...