Segui
Yifeng Zheng
Yifeng Zheng
Email verificata su hit.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing
Y Zheng, H Duan, C Wang
IEEE Transactions on Information Forensics and Security 13 (10), 2475-2489, 2018
1392018
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery
Y Zheng, H Duan, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 121 - 133, 2020
952020
Toward privacy-preserving personalized recommendation services
C Wang, Y Zheng, J Jiang, K Ren
Engineering 4 (1), 21-28, 2018
812018
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 2023
752023
Toward Encrypted Cloud Media Center With Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2017
672017
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization
H Duan, Y Zheng, Y Du, A Zhou, C Wang, MH Au
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
572019
Enabling Encrypted Cloud Media Center with Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proc. of ACM AsiaCCS, 2015
552015
Privacy-Preserving Image Denoising From External Cloud Databases
Y Zheng, H Cui, C Wang, J Zhou
IEEE Transactions on Information Forensics and Security, 2017
512017
Towards private, robust, and verifiable crowdsensing systems via public blockchains
C Cai, Y Zheng, Y Du, Z Qin, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1893-1907, 2019
472019
Leveraging crowdsensed data streams to discover and sell knowledge: A secure and efficient realization
C Cai, Y Zheng, C Wang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
472018
Towards secure and efficient outsourcing of machine learning classification
Y Zheng, H Duan, C Wang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
422019
A Novel Image Encryption Scheme Based on Hénon Map and Compound Spatiotemporal Chaos
Y Zheng, J Jin
Multimedia Tools and Applications 74 (18), 7803-7820, 2015
412015
You can access but you cannot leak: Defending against illegal content redistribution in encrypted cloud media center
LY Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren
IEEE Transactions on Dependable and Secure Computing 17 (6), 1218-1231, 2018
382018
Denoising in the dark: Privacy-preserving deep neural network-based image denoising
Y Zheng, H Duan, X Tang, C Wang, J Zhou
IEEE Transactions on Dependable and Secure Computing 18 (3), 1261-1275, 2019
352019
Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
H Cui, X Yuan, Y Zheng, C Wang
Proc. of IEEE INFOCOM, 2016
332016
Securely and Efficiently Outsourcing Decision Tree Inference
Y Zheng, H Duan, C Wang, R Wang, S Nepal
IEEE Transactions on Dependable and Secure Computing, 2020
272020
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
S Hu, Z Zhou, Y Zhang, LY Zhang, Y Zheng, Y He, H Jin
ACM International Conference on Multimedia (MM), 2022
262022
Securely outsourcing neural network inference to the cloud with lightweight techniques
X Liu, Y Zheng, X Yuan, X Yi
IEEE Transactions on Dependable and Secure Computing 20 (1), 620-636, 2022
262022
Building a secure knowledge marketplace over crowdsensed data streams
C Cai, Y Zheng, A Zhou, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2601-2616, 2019
222019
Treasure collection on foggy islands: building secure network archives for internet of things
H Duan, Y Zheng, C Wang, X Yuan
IEEE Internet of Things Journal 6 (2), 2637-2650, 2018
212018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20