Yuan Hong
Orcid: 0000-0003-4095-4506Affiliations:
- University of Connecticut, Connecticut Advanced Computing Center (CACC), Mansfield, CT, USA
- Illinois Institute of Technology, Chicago, IL, USA
- Rutgers University, Piscataway, NJ, USA (PhD)
According to our database1,
Yuan Hong
authored at least 111 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective.
CoRR, June, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024
GALOT: Generative Active Learning via Optimizable Zero-shot Text-to-image Generation.
CoRR, 2024
Understanding Data Reconstruction Leakage in Federated Learning from a Theoretical Perspective.
CoRR, 2024
A Learning-Based Attack Framework to Break SOTA Poisoning Defenses in Federated Learning.
CoRR, 2024
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
CoRR, 2024
LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models.
CoRR, 2024
Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness.
CoRR, 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Intell. Transp. Syst., December, 2023
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023
Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples.
CoRR, 2023
FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023
Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023
2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
CoRR, 2022
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Student Research Workshop, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021
VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2021
Cybersecur., 2021
Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
2020
ACM Trans. Manag. Inf. Syst., 2020
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid.
IEEE Trans. Inf. Forensics Secur., 2020
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020
Proc. Priv. Enhancing Technol., 2020
Oper. Res., 2020
Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs.
Multim. Tools Appl., 2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020
Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 23rd International Conference on Extending Database Technology, 2020
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
EAI Endorsed Trans. Security Safety, 2019
Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019
CoRR, 2019
CoRR, 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017
On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions.
IEEE Trans. Engineering Management, 2017
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
2016
Web Intell., 2016
Information diffusion and opinion change during the gezi park protests: Homophily or social influence?
Proceedings of the Creating Knowledge, Enhancing Lives through Information & Technology, 2016
2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the International Conference on Connected Vehicles and Expo, 2015
2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014
J. Inf. Syst., 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
Proceedings of the 15th International Conference on Extending Database Technology, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
2011
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008