Yuan Hong

Orcid: 0000-0003-4095-4506

Affiliations:
  • University of Connecticut, Connecticut Advanced Computing Center (CACC), Mansfield, CT, USA
  • Illinois Institute of Technology, Chicago, IL, USA
  • Rutgers University, Piscataway, NJ, USA (PhD)


According to our database1, Yuan Hong authored at least 111 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective.
CoRR, June, 2025

Backdoor Attacks on Discrete Graph Diffusion Models.
CoRR, March, 2025

Delay-allowed Differentially Private Data Stream Release.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025

Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025

Learning Robust and Privacy-Preserving Representations via Information Theory.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents.
IEEE Trans. Dependable Secur. Comput., 2024

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient Differentially Private Set Intersection.
IACR Cryptol. ePrint Arch., 2024

GALOT: Generative Active Learning via Optimizable Zero-shot Text-to-image Generation.
CoRR, 2024

Understanding Data Reconstruction Leakage in Federated Learning from a Theoretical Perspective.
CoRR, 2024

A Learning-Based Attack Framework to Break SOTA Poisoning Defenses in Federated Learning.
CoRR, 2024

Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
CoRR, 2024

LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models.
CoRR, 2024

Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness.
CoRR, 2024

Differentially Private Federated Learning: A Systematic Review.
CoRR, 2024

An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

FedGMark: Certifiably Robust Watermarking for Federated Graph Learning.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

On the Faithfulness of Vision Transformer Explanations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Infrastructure-Enabled GPS Spoofing Detection and Correction.
IEEE Trans. Intell. Transp. Syst., December, 2023

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing.
IEEE Trans. Knowl. Data Eng., 2023

Stealthy 3D Poisoning Attack on Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2023

Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023

Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples.
CoRR, 2023

FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023

Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022

On Fair Classification with Mostly Private Sensitive Attributes.
CoRR, 2022

Certified Adversarial Robustness via Anisotropic Randomized Smoothing.
CoRR, 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

An Eye for an Eye: Defending against Gradient-based Attacks with Gradients.
CoRR, 2022

Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Differentially Private Instance Encoding against Privacy Attacks.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Student Research Workshop, 2022

A Model-Agnostic Approach to Differentially Private Topic Mining.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

UniCR: Universally Approximated Certified Robustness via Randomized Smoothing.
Proceedings of the Computer Vision - ECCV 2022, 2022

L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Cryptographic Inferences for Video Deep Neural Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

WPES '22: 21st Workshop on Privacy in the Electronic Society.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Dynamic Pricing for Electric Vehicle Extreme Fast Charging.
IEEE Trans. Intell. Transp. Syst., 2021

A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021

Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021

VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy preserving divisible double auction with a hybridized TEE-blockchain system.
Cybersecur., 2021

Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Privacy-Preserving Cloud-Based DNN Inference.
Proceedings of the IEEE International Conference on Acoustics, 2021

Reconstruction Attack on Instance Encoding for Language Understanding.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

2020
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.
ACM Trans. Manag. Inf. Syst., 2020

Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid.
IEEE Trans. Inf. Forensics Secur., 2020

Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020

VideoDP: A Flexible Platform for Video Analytics with Differential Privacy.
Proc. Priv. Enhancing Technol., 2020

A distance matrix based algorithm for solving the traveling salesman problem.
Oper. Res., 2020

Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs.
Multim. Tools Appl., 2020

R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020

Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Privacy Preserving Distributed Energy Trading.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Publishing Video Data with Indistinguishable Objects.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

Security, Privacy and Trust for Responsible Innovations and Governance.
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020

LogBug: Generating Adversarial System Logs in Real Time.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

PANDA: Privacy-Aware Double Auction for Divisible Resources without a Mediator.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

Exploring the Privacy Bound for Differential Privacy: From Theory to Practice.
EAI Endorsed Trans. Security Safety, 2019

Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019

VideoDP: A Universal Platform for Video Analytics with Differential Privacy.
CoRR, 2019

WIDER Face and Pedestrian Challenge 2018: Methods and Results.
CoRR, 2019

Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy.
CoRR, 2019

Imbalance-Aware Scheduler for Fast and Secure Ring ORAM Data Retrieval.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Fault-tolerant tile mining.
Expert Syst. Appl., 2018

Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018

Privacy Preserving and Collusion Resistant Energy Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017

On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions.
IEEE Trans. Engineering Management, 2017

Discovering energy communities for microgrids on the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

2016
Accurate and efficient query clustering via top ranked search results.
Web Intell., 2016

Privacy Preserving Linear Programming.
CoRR, 2016

Information diffusion and opinion change during the gezi park protests: Homophily or social influence?
Proceedings of the Creating Knowledge, Enhancing Lives through Information & Technology, 2016

2015
Cyber War Games: Strategic Jostling Among Traditional Adversaries.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015

Towards user-oriented RBAC model.
J. Comput. Secur., 2015

Privacy preserving driving style recognition.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014

A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications.
J. Inf. Syst., 2014

Dynamic Workflow Adjustment with Security Constraints.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

2012
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Secur. Comput., 2012

Secure and efficient distributed linear programming.
J. Comput. Secur., 2012

Overlapping Clustering with Sparseness Constraints.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2009
Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Preserving Privacy in E-health Systems Using Hippocratic Databases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Securing Telehealth Applications in a Web-Based e-Health Portal.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...