Yuwen Pu

According to our database1, Yuwen Pu authored at least 20 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
CoRR, 2024

The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness.
CoRR, 2024

Integer Is Enough: When Vertical Federated Learning Meets Rounding.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

MEAOD: Model Extraction Attack against Object Detectors.
CoRR, 2023

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
CoRR, 2023

Facial Data Minimization: Shallow Model as Your Privacy Filter.
CoRR, 2023

TextDefense: Adversarial Text Detection based on Word Importance Entropy.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022

Hijack Vertical Federated Learning Models with Adversarial Embedding.
CoRR, 2022

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme.
IEEE Internet Things J., 2020

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean.
IEEE Internet Things J., 2020

A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2019
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT.
Wirel. Commun. Mob. Comput., 2019

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

2018
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018


  Loading...