Yuan Hong

According to our database1, Yuan Hong authored at least 77 papers between 1993 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Dynamic Pricing for Electric Vehicle Extreme Fast Charging.
IEEE Trans. Intell. Transp. Syst., 2021

Privacy-preserving Cloud-based DNN Inference.
CoRR, 2021

2020
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.
ACM Trans. Manag. Inf. Syst., 2020

Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid.
IEEE Trans. Inf. Forensics Secur., 2020

Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020

VideoDP: A Flexible Platform for Video Analytics with Differential Privacy.
Proc. Priv. Enhancing Technol., 2020

A distance matrix based algorithm for solving the traveling salesman problem.
Oper. Res., 2020

Optimal energy-dissipation control for SOC based balancing in series connected Lithium-ion battery packs.
Multim. Tools Appl., 2020

R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020

Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Privacy Preserving Distributed Energy Trading.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Publishing Video Data with Indistinguishable Objects.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

Security, Privacy and Trust for Responsible Innovations and Governance.
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020

LogBug: Generating Adversarial System Logs in Real Time.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

PANDA: Privacy-Aware Double Auction for Divisible Resources without a Mediator.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

Exploring the Privacy Bound for Differential Privacy: From Theory to Practice.
EAI Endorsed Trans. Security Safety, 2019

Computed Tomography-Guided Biopsy Assisted by 18F-FDG Coincidence Imaging for Solid Tumours.
J. Medical Imaging Health Informatics, 2019

Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019

VideoDP: A Universal Platform for Video Analytics with Differential Privacy.
CoRR, 2019

WIDER Face and Pedestrian Challenge 2018: Methods and Results.
CoRR, 2019

Homogeneous and Mixed Energy Communities Discovery with Spatial-Temporal Net Energy.
CoRR, 2019

Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm.
Clust. Comput., 2019

Imbalance-Aware Scheduler for Fast and Secure Ring ORAM Data Retrieval.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Fault-tolerant tile mining.
Expert Syst. Appl., 2018

Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018

Privacy Preserving and Collusion Resistant Energy Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017

On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions.
IEEE Trans. Engineering Management, 2017

Using Wavelet Packet Transform for Surface Roughness Evaluation and Texture Extraction.
Sensors, 2017

Training project arrangement for tennis athletes based on BP neural network model.
Int. J. Reason. based Intell. Syst., 2017

Discovering energy communities for microgrids on the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

2016
Accurate and efficient query clustering via top ranked search results.
Web Intell., 2016

Sparse Reconstruction for Micro Defect Detection in Acoustic Micro Imaging.
Sensors, 2016

Privacy Preserving Linear Programming.
CoRR, 2016

Information diffusion and opinion change during the gezi park protests: Homophily or social influence?
Proceedings of the Creating Knowledge, Enhancing Lives through Information & Technology, 2016

2015
Cyber War Games: Strategic Jostling Among Traditional Adversaries.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015

Towards user-oriented RBAC model.
J. Comput. Secur., 2015

Some Relations Between the Eigenvalues of Adjacency, Laplacian and Signless Laplacian Matrix of a Graph.
Graphs Comb., 2015

Privacy preserving driving style recognition.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014

A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications.
J. Inf. Syst., 2014

Construction Engineering Cost Evaluation Model and Application Based on RS-IPSO-BP Neural Network.
J. Comput., 2014

Dynamic Workflow Adjustment with Security Constraints.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Load forecasting using elastic gradient descent.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2012
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Secur. Comput., 2012

Secure and efficient distributed linear programming.
J. Comput. Secur., 2012

The Minimal Limit Point of the Third Largest Laplacian Eigenvalues of Graphs.
Ars Comb., 2012

Overlapping Clustering with Sparseness Constraints.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
An Emotion Model for Virtual Agents with Evolvable Motivation.
Trans. Edutainment, 2011

On the Laplacian spread of graphs.
Appl. Math. Lett., 2011

Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2009
A Simulation Based on Emotions Model for Virtual Human Crowds.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

Personality Based Latent Friendship Mining.
Proceedings of The 2009 International Conference on Data Mining, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Parallel reflective symmetry transformation for volume data.
Comput. Graph., 2008

Kernel: A RDB-Based Object Persistence Component Set for Java.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Preserving Privacy in E-health Systems Using Hippocratic Databases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Securing Telehealth Applications in a Web-Based e-Health Portal.
Proceedings of the The Third International Conference on Availability, 2008

2005
Sharp upper and lower bounds for largest eigenvalue of the Laplacian matrices of trees.
Discret. Math., 2005

Simulation and Visualization for DNA Computing in Microreactors.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Tree-width, clique-minors, and eigenvalues.
Discret. Math., 2004

2001
A Sharp Upper Bound of the Spectral Radius of Graphs.
J. Comb. Theory, Ser. B, 2001

2000
A sharp upper bound for the spectral radius of the Nordhaus-Gaddum type.
Discret. Math., 2000

1993
Bounds of eigenvalues of graphs.
Discret. Math., 1993


  Loading...