Follow
Yunlong Mao
Yunlong Mao
Verified email at smail.nju.edu.cn - Homepage
Title
Cited by
Cited by
Year
A privacy-preserving deep learning approach for face recognition with edge computing
Y Mao, S Yi, Q Li, J Feng, F Xu, S Zhong
Proc. USENIX Workshop Hot Topics Edge Comput.(HotEdge), 1-6, 2018
892018
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks
Y Mao, X Yuan, X Zhao, S Zhong
European Symposium on Research in Computer Security, 476-496, 2021
482021
Learning from Differentially Private Neural Activations with Edge Computing
Y Mao, S Yi, Q Li, J Feng, F Xu, S Zhong
2018 IEEE/ACM Symposium on Edge Computing (SEC), 90-102, 2018
432018
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training
Y Mao, W Hong, H Wang, Q Li, S Zhong
IEEE Transactions on Parallel and Distributed Systems 32 (7), 1777-1788, 2020
292020
Towards thwarting template side-channel attacks in secure cloud deduplications
Y Zhang, Y Mao, M Xu, F Xu, S Zhong
IEEE Transactions on Dependable and Secure Computing 18 (3), 1008-1018, 2019
262019
An improved traffic congestion monitoring system based on federated learning
C Xu, Y Mao
Information 11 (7), 365, 2020
242020
Joint differentially private Gale–Shapley mechanisms for location privacy protection in mobile traffic offloading systems
Y Zhang, Y Mao, S Zhong
IEEE Journal on Selected Areas in Communications 34 (10), 2738-2749, 2016
172016
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism
Y Mao, W Hong, B Zhu, Z Zhu, Y Zhang, S Zhong
IEEE Transactions on Parallel and Distributed Systems 33 (11), 3079-3091, 2021
152021
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing
Y Mao, T Chen, Y Zhang, T Wang, S Zhong
IEEE Transactions on Information Forensics and Security 12 (6), 1483-1493, 2017
122017
Secure split learning against property inference, data reconstruction, and feature space hijacking attacks
Y Mao, Z Xin, Z Li, J Hong, Q Yang, S Zhong
European Symposium on Research in Computer Security, 23-43, 2023
102023
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
Y Mao, Y Zhang, S Zhong
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
102016
Protecting location information in collaborative sensing of cognitive radio networks
Y Mao, T Chen, Y Zhang, T Wang, S Zhong
Proceedings of the 18th ACM International Conference on Modeling, Analysis …, 2015
102015
Secure deduplication schemes for content delivery in mobile edge computing
Y Lin, Y Mao, Y Zhang, S Zhong
Computers & Security 114, 102602, 2022
92022
Privacy preserving market schemes for mobile sensing
Y Zhang, Y Mao, H Zhang, S Zhong
2015 44th International Conference on Parallel Processing, 909-918, 2015
92015
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack
Y Mao, Y He, Y Zhang, J Hua, S Zhong
IEEE Transactions on Mobile Computing 19 (12), 2916-2932, 2019
72019
Private Deep Neural Network Models Publishing for Machine Learning as a Service
Y Mao, B Zhu, W Hong, Z Zhu, Y Zhang, S Zhong
2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020
62020
Toward wireless security without computational assumptions—oblivious transfer based on wireless channel characteristics
Z Hao, Y Mao, S Zhong, LE Li, H Yao, N Yu
IEEE Transactions on Computers 63 (6), 1580-1593, 2014
52014
A Split-and-Privatize Framework for Large Language Model Fine-Tuning
X Shen, Y Liu, H Liu, J Hong, B Duan, Z Huang, Y Mao, Y Wu, D Wu
arXiv preprint arXiv:2312.15603, 2023
42023
Unbalanced private set intersection with linear communication complexity
Q Zhao, B Jiang, Y Zhang, H Wang, Y Mao, S Zhong
Science China Information Sciences 67 (3), 132105, 2024
32024
Towards Universal Detection of Adversarial Examples via Pseudorandom Classifiers
B Zhu, C Dong, Y Zhang, Y Mao, S Zhong
IEEE Transactions on Information Forensics and Security, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20