Segueix
Yifeng Zheng
Yifeng Zheng
Correu electrònic verificat a hit.edu.cn - Pàgina d'inici
Títol
Citada per
Citada per
Any
Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing
Y Zheng, H Duan, C Wang
IEEE Transactions on Information Forensics and Security 13 (10), 2475-2489, 2018
1382018
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery
Y Zheng, H Duan, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 121 - 133, 2020
942020
Toward privacy-preserving personalized recommendation services
C Wang, Y Zheng, J Jiang, K Ren
Engineering 4 (1), 21-28, 2018
792018
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 2023
712023
Toward Encrypted Cloud Media Center With Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2017
662017
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization
H Duan, Y Zheng, Y Du, A Zhou, C Wang, MH Au
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
572019
Enabling Encrypted Cloud Media Center with Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proc. of ACM AsiaCCS, 2015
552015
Privacy-Preserving Image Denoising From External Cloud Databases
Y Zheng, H Cui, C Wang, J Zhou
IEEE Transactions on Information Forensics and Security, 2017
512017
Towards private, robust, and verifiable crowdsensing systems via public blockchains
C Cai, Y Zheng, Y Du, Z Qin, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1893-1907, 2019
462019
Leveraging crowdsensed data streams to discover and sell knowledge: A secure and efficient realization
C Cai, Y Zheng, C Wang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
462018
A Novel Image Encryption Scheme Based on Hénon Map and Compound Spatiotemporal Chaos
Y Zheng, J Jin
Multimedia Tools and Applications 74 (18), 7803-7820, 2015
412015
Towards secure and efficient outsourcing of machine learning classification
Y Zheng, H Duan, C Wang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
402019
You can access but you cannot leak: Defending against illegal content redistribution in encrypted cloud media center
LY Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren
IEEE Transactions on Dependable and Secure Computing 17 (6), 1218-1231, 2018
362018
Denoising in the dark: Privacy-preserving deep neural network-based image denoising
Y Zheng, H Duan, X Tang, C Wang, J Zhou
IEEE Transactions on Dependable and Secure Computing 18 (3), 1261-1275, 2019
342019
Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
H Cui, X Yuan, Y Zheng, C Wang
Proc. of IEEE INFOCOM, 2016
332016
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
S Hu, Z Zhou, Y Zhang, LY Zhang, Y Zheng, Y He, H Jin
ACM International Conference on Multimedia (MM), 2022
252022
Securely and Efficiently Outsourcing Decision Tree Inference
Y Zheng, H Duan, C Wang, R Wang, S Nepal
IEEE Transactions on Dependable and Secure Computing, 2020
242020
Securely outsourcing neural network inference to the cloud with lightweight techniques
X Liu, Y Zheng, X Yuan, X Yi
IEEE Transactions on Dependable and Secure Computing 20 (1), 620-636, 2022
222022
Treasure collection on foggy islands: building secure network archives for internet of things
H Duan, Y Zheng, C Wang, X Yuan
IEEE Internet of Things Journal 6 (2), 2637-2650, 2018
212018
Towards IoT Security Automation and Orchestration
Y Zheng, A Pal, S Abuadbba, PS Raj, S Nepal, H Janicke
IEEE International Conference on Trust, Privacy and Security in Intelligent …, 2020
202020
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20