Yingpeng Sang

Orcid: 0000-0002-2085-4359

According to our database1, Yingpeng Sang authored at least 60 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Guest editorial - Parallel and distributed computing and applications.
Comput. Sci. Inf. Syst., 2023

Differentially Private Functional Mechanism for Broad Learning System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

LHKV: A Key-Value Data Collection Mechanism Under Local Differential Privacy.
Proceedings of the Database and Expert Systems Applications, 2023

Lightweight and Efficient Privacy-Preserving Multimodal Representation Inference via Fully Homomorphic Encryption.
Proceedings of the Intelligent Information and Database Systems - 15th Asian Conference, 2023

2022
A multimodal differential privacy framework based on fusion representation learning.
Connect. Sci., 2022

Broad Learning Inference Based on Fully Homomorphic Encryption.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2022

2021
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud.
Sensors, 2021

Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption.
Secur. Commun. Networks, 2021

Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion.
ISPRS Int. J. Geo Inf., 2021

Introduction to the special section on advances in parallel and distributed computing, applications and technologies (VSI-pdcat3).
Comput. Electr. Eng., 2021

Traffic Matrix Prediction Based on Differential Privacy and LSTM.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

Federated Data Integration for Heterogeneous Partitions Based on Differential Privacy.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

Multimodal Fusion Representation Learning Based on Differential Privacy.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

Traffic Matrix Prediction with Attention-based Recurrent Neural Network.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

2020
An efficient method for privacy-preserving trajectory data publishing based on data partitioning.
J. Supercomput., 2020

Guest editorial: Parallel computing and applications.
Comput. Sci. Inf. Syst., 2020

Blockchain-Based Secure Outsourcing of Fully Homomorphic Encryption Using Hidden Ideal Lattice.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2020

Preventing DDoS Attacks on Bitcoin Memory Pool by the Dynamic Fee Threshold Mechanism.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2020

A Pufferfish Privacy Mechanism for the Trajectory Clustering Task.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2020

2019
Foreword to the Special Section on Parallel and Distributed Computing, Applications and Technologies.
Concurr. Comput. Pract. Exp., 2019

Introduction to the Special Section on Parallel and Distributed Computing, Applications and Technologies.
Comput. Electr. Eng., 2019

Secure Multi-Party Computation on Blockchain: An Overview.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on Cloud.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

Pufferfish Privacy Mechanism Based on Multi-dimensional Markov Chain Model for Correlated Categorical Data Sequences.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

A Survey of Privacy-Preserving Techniques on Trajectory Data.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

2018
An Efficient Model and Algorithm for Privacy-Preserving Trajectory Data Publishing.
Proceedings of the Parallel and Distributed Computing, 2018

2017
Click-boosted graph ranking for image retrieval.
Comput. Sci. Inf. Syst., 2017

2016
Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model.
IEEE Trans. Inf. Forensics Secur., 2016

Introduction to the special section on parallel architectures, algorithms and programming.
Comput. Electr. Eng., 2016

Anonymity-Based Privacy Preserving Network Data Publication.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Leveraging Click Completion for Graph-Based Image Ranking.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems.
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016

2014
Maximizing network lifetime in wireless sensor networks with regular topologies.
J. Supercomput., 2014

Probability-model based network traffic matrix estimation.
Comput. Sci. Inf. Syst., 2014

A Selectively Re-train Approach Based on Clustering to Classify Concept-Drifting Data Streams with Skewed Distribution.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

A New Evaluation Function for Entropy-Based Feature Selection from Incomplete Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Using Symmetry Dicke State as Security Detection Particle in Quantum "Ping-Pong" Protocol.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

A Privacy-Preserving Data Publishing Method for Multiple Numerical Sensitive Attributes via Clustering and Multi-sensitive Bucketization.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

2013
Foreword to Special Issue.
J. Interconnect. Networks, 2013

Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Achieving Probabilistic Anonymity Against One-to-Multiple Linkage Attacks.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2012
Effective Reconstruction of Data Perturbed by Random Projections.
IEEE Trans. Computers, 2012

An Improved Chord Based on Counting Bloom Filter and Topology-Aware Lookup.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

A Clustering Algorithm Based on Density-Grid for Stream Data.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Incorporating Manifold Ranking with Active Learning in Relevance Feedback for Image Retrieval.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

On Robust Multicast in Multi-channel Multi-radio Wireless Mesh Networks.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2011
Diffusion Wavelets-Based Analysis on Traffic Matrices.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

New methods for network traffic matrix estimation based on a probability model.
Proceedings of the 17th IEEE International Conference on Networks, 2011

2009
Privacy-Preserving Tuple Matching in Distributed Databases.
IEEE Trans. Knowl. Data Eng., 2009

Efficient and secure protocols for privacy-preserving set operations.
ACM Trans. Inf. Syst. Secur., 2009

Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009

2008
Privacy preserving set intersection based on bilinear groups.
Proceedings of the Computer Science 2008, 2008

2007
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection.
Int. J. Netw. Secur., 2007

Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

2006
Secure Data Aggregation in Wireless Sensor Networks: A Survey.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
A Brief Comparative Study on Analytical Models of Computer System Dependability and Security.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Protocol for the Problem of Secure Two-party Vector Dominance.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Scheme for Testing Privacy State in Pervasive Sensor Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004


  Loading...