default search action
Yuan Zhang 0004
Person information
- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
- affiliation (2009 - 2013): State University of New York at Buffalo, Amherst, NY, USA
Other persons with the same name
- Yuan Zhang (aka: Yu-an Zhang, Yuan-Zhang) — disambiguation page
- Yuan Zhang 0001 — Massachusetts Institute of Technology, Cambridge, MA, USA
- Yuan Zhang 0002 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Yuan Zhang 0003 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Yuan Zhang 0005 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Yuan Zhang 0006 — University of Electronic Science and Technology of China, Center for Cyber Security, Chengdu, China
- Yuan Zhang 0007 — Southwest University, College of Electronic and Information Engineering, Chongqing, China (and 1 more)
- Yuan Zhang 0008 — Arizona State University, Tempe, AZ, USA
- Yuan Zhang 0009 — Fudan University, China
- Yuan Zhang 0010 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China (and 1 more)
- Yuan Zhang 0011 — University of New South Wales, School of Electrical Engineering and Telecommunications, Sydney, NSW, Australia
- Yuan Zhang 0012 — University of Texas at Dallas, Naveen Jindal School of Management, Richardson, TX, USA
- Yuan Zhang 0013 — Communication University of China, Beijing, China (and 1 more)
- Yuan Zhang 0014 — Chinese Academy and Sciences, Graduate School, China (and 1 more)
- Yuan Zhang 0015 — Westlake University, School of Engineering, Hangzhou, China (and 2 more)
- Yuan Zhang 0016 — Beijing Institute of Technology, School of Automation, China (and 1 more)
- Yuan Zhang 0017 — China University of Geosciences, Beijing, China
- Yuan Zhang 0018 — South China University of Technology, School of Mechanical and Automotive Engineering, Guangzhou, China
- Yuan Zhang 0019 — Southeast University, Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications, Nanjing, China
- Yuan Zhang 0020 — Peking University, Center on Frontiers of Computing Studies, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Quanyu Zhao, Bingbing Jiang, Yuan Zhang, Heng Wang, Yunlong Mao, Sheng Zhong:
Unbalanced private set intersection with linear communication complexity. Sci. China Inf. Sci. 67(3) (2024) - [j27]Jiacheng Gao, Yuan Zhang, Sheng Zhong:
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing. IEEE Trans. Dependable Secur. Comput. 21(4): 3211-3226 (2024) - [j26]Yunlong Mao, Ziqin Dang, Heng Wang, Yuan Zhang, Sheng Zhong:
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms. IEEE Trans. Dependable Secur. Comput. 21(5): 4684-4698 (2024) - [j25]Boyu Zhu, Changyu Dong, Yuan Zhang, Yunlong Mao, Sheng Zhong:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. IEEE Trans. Inf. Forensics Secur. 19: 1810-1825 (2024) - 2023
- [c30]Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong:
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch. ACNS (1) 2023: 476-500 - [c29]Minze Xu, Yuan Zhang, Sheng Zhong:
SilenTower: A Robust, Scalable and Secure Watchtower with Silent Executors. SRDS 2023: 173-186 - 2022
- [j24]Yu Lin, Yunlong Mao, Yuan Zhang, Sheng Zhong:
Secure deduplication schemes for content delivery in mobile edge computing. Comput. Secur. 114: 102602 (2022) - [j23]Yunlong Mao, Wenbo Hong, Boyu Zhu, Zhifei Zhu, Yuan Zhang, Sheng Zhong:
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism. IEEE Trans. Parallel Distributed Syst. 33(11): 3079-3091 (2022) - [c28]Yuan Zhang, Ziwei Zhang, Minze Xu, Chen Tian, Sheng Zhong:
On Designing Secure Cross-user Redundancy Elimination for WAN Optimization. INFOCOM 2022: 1589-1598 - [i2]Minze Xu, Yuan Zhang, Sheng Zhong:
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems. IACR Cryptol. ePrint Arch. 2022: 176 (2022) - 2021
- [j22]Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, Sheng Zhong:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. IEEE Trans. Dependable Secur. Comput. 18(3): 1008-1018 (2021) - [j21]Xiaowei Jia, Xiaoyi Li, Nan Du, Yuan Zhang, Vishrawas Gopalakrishnan, Guangxu Xun, Aidong Zhang:
Tracking Community Consistency in Dynamic Networks: An Influence-Based Approach. IEEE Trans. Knowl. Data Eng. 33(2): 782-795 (2021) - [c27]Minze Xu, Yuan Zhang, Fengyuan Xu, Sheng Zhong:
Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels. IWQoS 2021: 1-10 - 2020
- [j20]Quanyu Zhao, Siyi Chen, Zheli Liu, Thar Baker, Yuan Zhang:
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manag. 57(6): 102355 (2020) - [j19]Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong:
Secure Inter-Domain Forwarding Loop Test in Software Defined Networks. IEEE Trans. Dependable Secur. Comput. 17(1): 162-178 (2020) - [j18]Yunlong Mao, Ying He, Yuan Zhang, Jingyu Hua, Sheng Zhong:
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack. IEEE Trans. Mob. Comput. 19(12): 2916-2932 (2020) - [c26]Yunlong Mao, Boyu Zhu, Wenbo Hong, Zhifei Zhu, Yuan Zhang, Sheng Zhong:
Private Deep Neural Network Models Publishing for Machine Learning as a Service. IWQoS 2020: 1-10 - [c25]Quanyu Zhao, Fengqian Zhang, Yuan Zhang:
A Novel Defending Scheme for Graph-Based Classification Against Graph Structure Manipulating Attack. SocialSec 2020: 289-302
2010 – 2019
- 2019
- [j17]Binru Wang, Yuan Zhang, Zhi-Hua Zhou, Sheng Zhong:
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3): 1002-1015 (2019) - [c24]Jun Wu, Yuan Zhang, Yu Qiao, Lei Zhang, Chongjun Wang, Junyuan Xie:
Multi-unit Budget Feasible Mechanisms for Cellular Traffic Offloading. AAMAS 2019: 1693-1701 - 2018
- [j16]Bingbing Jiang, Yuan Zhang:
Securely min and k-th min computations with fully homomorphic encryption. Sci. China Inf. Sci. 61(5): 058103:1-058103:3 (2018) - [j15]Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. Comput. Secur. 73: 425-438 (2018) - 2017
- [j14]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems. IEEE Trans. Dependable Secur. Comput. 14(1): 9-21 (2017) - [j13]Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Trans. Inf. Forensics Secur. 12(6): 1483-1493 (2017) - [j12]Fan Wu, Dongxin Liu, Zhihao Wu, Yuan Zhang, Guihai Chen:
Cost-Efficient Indoor White Space Exploration Through Compressive Sensing. IEEE/ACM Trans. Netw. 25(3): 1686-1702 (2017) - [c23]Binru Wang, Yuan Zhang, Sheng Zhong:
On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection. AAMAS 2017: 1751-1753 - [c22]Yu Zhou, Yuan Zhang, Sheng Zhong:
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit. ICCCN 2017: 1-9 - [c21]Yu Li, Yazhe Wang, Yuan Zhang:
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. ICICS 2017: 339-351 - 2016
- [j11]Yuan Zhang, Yunlong Mao, Sheng Zhong:
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems. IEEE J. Sel. Areas Commun. 34(10): 2738-2749 (2016) - [j10]Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong:
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees. IEEE Trans. Inf. Forensics Secur. 11(1): 100-113 (2016) - [j9]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Privacy-Preserving Data Aggregation in Mobile Phone Sensing. IEEE Trans. Inf. Forensics Secur. 11(5): 980-992 (2016) - [j8]Yuan Zhang, Wei Tong, Sheng Zhong:
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy. IEEE Trans. Inf. Forensics Secur. 11(11): 2528-2541 (2016) - [c20]Xiaowei Jia, Xiaoyi Li, Nan Du, Yuan Zhang, Vishrawas Gopalakrishnan, Guangxu Xun, Aidong Zhang:
Influence based analysis of community consistency in dynamic networks. ASONAM 2016: 1-8 - [c19]Baojia Zhang, He Zhang, Boqun Yan, Yuan Zhang:
A New Secure Index Supporting Efficient Index Updating and Similarity Search on Clouds. SCC@AsiaCCS 2016: 37-43 - [c18]Yunlong Mao, Yuan Zhang:
Privacy Preserving Distributed Permutation Test. SCC@AsiaCCS 2016: 67-73 - [c17]Yunlong Mao, Yuan Zhang, Sheng Zhong:
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. CCS 2016: 1580-1590 - [c16]Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong:
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain. INFOCOM 2016: 1-9 - 2015
- [j7]Yuan Zhang, Yue Cheng, Liang Ge, Nan Du, Kebin Jia, Aidong Zhang:
A graph-based integrative method of detecting consistent protein functional modules from multiple data sources. Int. J. Data Min. Bioinform. 13(2): 122-140 (2015) - [c15]Yuan Zhang, Yixin Fang, Sheng Zhong:
Incentive Mechanism Design for Smartphone Crowdsensing. BDCloud 2015: 287-292 - [c14]Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong:
Privacy Preserving Market Schemes for Mobile Sensing. ICPP 2015: 909-918 - [c13]Bingbing Jiang, Yuan Zhang:
Privacy-preserving min and k-th min computations with fully homomorphic encryption. IPCCC 2015: 1-8 - [c12]Dongxin Liu, Zhihao Wu, Fan Wu, Yuan Zhang, Guihai Chen:
FIWEX: Compressive Sensing Based Cost-Efficient Indoor White Space Exploration. MobiHoc 2015: 17-26 - [c11]Yuan Zhang, Sheng Zhong, Haifan Yao:
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding. MSN 2015: 52-59 - [c10]Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks. MSWiM 2015: 219-226 - [i1]Junjie Shi, Yuan Zhang, Sheng Zhong:
Privacy-preserving Network Functionality Outsourcing. CoRR abs/1502.00389 (2015) - 2014
- [j6]Yu Li, Yuan Zhang, Yue Ji:
Privacy-Preserving Restricted Boltzmann Machine. Comput. Math. Methods Medicine 2014: 138498:1-138498:7 (2014) - 2013
- [j5]Shaopeng Guan, Yuan Zhang, Yue Ji:
Privacy-Preserving Health Data Collection for Preschool Children. Comput. Math. Methods Medicine 2013: 501607:1-501607:5 (2013) - [j4]Yuan Zhang, Sheng Zhong:
A privacy-preserving algorithm for distributed training of neural network ensembles. Neural Comput. Appl. 22(Supplement-1): 269-282 (2013) - [j3]Yuan Zhang, Sheng Zhong:
Privacy preserving perceptron learning in malicious model. Neural Comput. Appl. 23(3-4): 843-856 (2013) - [j2]Sheng Zhong, Yuan Zhang:
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning. IEEE Trans. Wirel. Commun. 12(11): 5620-5630 (2013) - [c9]Chunhua Weng, Yu Li, George Hripcsak, Yuan Zhang, Jie Gao, Feng Liu, J. Thomas Bigger:
Using Electronic Health Records To Assess Generalizability of Clinical Trials. AMIA 2013 - [c8]Yuan Zhang, Nan Du, Kang Li, Jinchao Feng, Kebin Jia, Aidong Zhang:
Critical protein detection in dynamic PPI networks with multi-source integrated deep belief nets. BIBM 2013: 29-36 - [c7]Nan Du, Xiaoyi Li, Yuan Zhang, Aidong Zhang:
Detecting mutual functional gene clusters from multiple related diseases. BIBM 2013: 159-164 - [c6]Kang Li, Xiaoyi Li, Yuan Zhang, Aidong Zhang:
Affective state recognition from EEG with deep belief networks. BIBM 2013: 305-310 - [c5]Hui Li, Xiaoyi Li, Yuan Zhang, Murali Ramanathan, Aidong Zhang:
A generative framework for prediction and informative risk factor selection of bone diseases. BIBM 2013: 554-559 - [c4]Yuan Zhang, Kebin Jia:
A Novel Approach of Extracting Traffic Parameters by Using Video Features. IIH-MSP 2013: 230-233 - 2012
- [c3]Nan Du, Yuan Zhang, Kang Li, Jing Gao, Supriya D. Mahajan, Bindukumar B. Nair, Stanley A. Schwartz, Aidong Zhang:
Evolutionary analysis of functional modules in dynamic PPI networks. BCB 2012: 250-257 - [c2]Yuan Zhang, Liang Ge, Nan Du, Guoqiang Fan, Kebin Jia, Aidong Zhang:
A graph-based cluster ensemble method to detect protein functional modules from multiple information sources. BCB 2012: 567-569 - [c1]Yuan Zhang, Nan Du, Liang Ge, Kebin Jia, Aidong Zhang:
A collective NMF method for detecting protein functional module from multiple data sources. BCB 2012: 655-660 - 2011
- [j1]Sheng Zhong, Yuan Zhang:
Approximation algorithm for estimating failure probability of multipath transmission. Math. Comput. Simul. 81(9): 1729-1732 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint