Seguir
Yunlong Mao
Yunlong Mao
Dirección de correo verificada de smail.nju.edu.cn - Página principal
Título
Citado por
Citado por
Año
A privacy-preserving deep learning approach for face recognition with edge computing
Y Mao, S Yi, Q Li, J Feng, F Xu, S Zhong
Proc. USENIX Workshop Hot Topics Edge Comput.(HotEdge), 1-6, 2018
812018
Learning from Differentially Private Neural Activations with Edge Computing
Y Mao, S Yi, Q Li, J Feng, F Xu, S Zhong
2018 IEEE/ACM Symposium on Edge Computing (SEC), 90-102, 2018
412018
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks
Y Mao, X Yuan, X Zhao, S Zhong
European Symposium on Research in Computer Security, 476-496, 2021
362021
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training
Y Mao, W Hong, H Wang, Q Li, S Zhong
IEEE Transactions on Parallel and Distributed Systems 32 (7), 1777-1788, 2020
262020
Towards thwarting template side-channel attacks in secure cloud deduplications
Y Zhang, Y Mao, M Xu, F Xu, S Zhong
IEEE Transactions on Dependable and Secure Computing 18 (3), 1008-1018, 2019
212019
An improved traffic congestion monitoring system based on federated learning
C Xu, Y Mao
Information 11 (7), 365, 2020
202020
Joint differentially private Gale–Shapley mechanisms for location privacy protection in mobile traffic offloading systems
Y Zhang, Y Mao, S Zhong
IEEE Journal on Selected Areas in Communications 34 (10), 2738-2749, 2016
152016
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism
Y Mao, W Hong, B Zhu, Z Zhu, Y Zhang, S Zhong
IEEE Transactions on Parallel and Distributed Systems 33 (11), 3079-3091, 2021
112021
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing
Y Mao, T Chen, Y Zhang, T Wang, S Zhong
IEEE Transactions on Information Forensics and Security 12 (6), 1483-1493, 2017
112017
Protecting location information in collaborative sensing of cognitive radio networks
Y Mao, T Chen, Y Zhang, T Wang, S Zhong
Proceedings of the 18th ACM International Conference on Modeling, Analysis …, 2015
102015
Privacy preserving market schemes for mobile sensing
Y Zhang, Y Mao, H Zhang, S Zhong
2015 44th International Conference on Parallel Processing, 909-918, 2015
92015
Secure deduplication schemes for content delivery in mobile edge computing
Y Lin, Y Mao, Y Zhang, S Zhong
Computers & Security 114, 102602, 2022
82022
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
Y Mao, Y Zhang, S Zhong
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
72016
Private Deep Neural Network Models Publishing for Machine Learning as a Service
Y Mao, B Zhu, W Hong, Z Zhu, Y Zhang, S Zhong
2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020
62020
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack
Y Mao, Y He, Y Zhang, J Hua, S Zhong
IEEE Transactions on Mobile Computing 19 (12), 2916-2932, 2019
52019
Toward wireless security without computational assumptions—oblivious transfer based on wireless channel characteristics
Z Hao, Y Mao, S Zhong, LE Li, H Yao, N Yu
IEEE Transactions on Computers 63 (6), 1580-1593, 2014
52014
Secure split learning against property inference, data reconstruction, and feature space hijacking attacks
Y Mao, Z Xin, Z Li, J Hong, Q Yang, S Zhong
European Symposium on Research in Computer Security, 23-43, 2023
42023
Location privacy in public access points positioning: An optimization and geometry approach
Y Mao, Y Zhang, X Zhang, F Xu, S Zhong
Computers & Security 73, 425-438, 2018
32018
A Split-and-Privatize Framework for Large Language Model Fine-Tuning
X Shen, Y Liu, H Liu, J Hong, B Duan, Z Huang, Y Mao, Y Wu, D Wu
arXiv preprint arXiv:2312.15603, 2023
22023
Solution Probing Attack Against Blockchain-based Quality-aware Crowdsourcing Platforms
H Wang, Y Mao, S Zhong
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022
12022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20