Yupeng Zhang

According to our database1, Yupeng Zhang authored at least 28 papers between 2002 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G Slices.
CoRR, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Exploring LTE-V link level performance by geometry enhanced winner II channel model.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
A Zero-Knowledge Version of vSQL.
IACR Cryptology ePrint Archive, 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
IACR Cryptology ePrint Archive, 2017

SecureML: A System for Scalable Privacy-Preserving Machine Learning.
IACR Cryptology ePrint Archive, 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SecureML: A System for Scalable Privacy-Preserving Machine Learning.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

An Expressive (Zero-Knowledge) Set Accumulator.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
IACR Cryptology ePrint Archive, 2016

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
Proceedings of the 25th USENIX Security Symposium, 2016

Efficient Authenticated Multi-Pattern Matching.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
IntegriDB: Verifiable SQL for Outsourced Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks.
TIIS, 2014

Anonymous Camera for Privacy Protection.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

ALITHEIA: Towards Practical Verifiable Graph Processing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Streaming Authenticated Data Structures: Abstraction and Implementation.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
Distributed load balancing in a multiple server system by shift-invariant protocol sequences.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

BodyAvatar: creating freeform 3D avatars using first-person body gestures.
Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology, 2013

Time Machine: A Mobile Augmented Reality System for Tourism Based on Coded-Aperture Camera.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2011
Failure of TCP congestion control under diversity routing.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Simulation of depth from coded aperture cameras with Zemax.
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011

2009
Agent-Based Web Healthcare Systems for Real-Time Chronic Disease.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

2008
A prototype automated knowledge acquisition system.
Proceedings of the 2008 International Conference on Information & Knowledge Engineering, 2008

A Study of Combination Genetic Algorithm and MMAS for VRP problem.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

A Model of Active Agent design to cope Hypertension's Emergencies situation rapidly Home healthcare.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

2007
A Reactive Multi-Agent Based Ant Colony Algorithm.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

2002
Robust and Efficient Detection of Non-Lint Material in Cotton Fiber Samples.
Proceedings of the 6th IEEE Workshop on Applications of Computer Vision (WACV 2002), 2002


  Loading...