A privacy-preserving deep learning approach for face recognition with edge computing Y Mao, S Yi, Q Li, J Feng, F Xu, S Zhong Proc. USENIX Workshop Hot Topics Edge Comput.(HotEdge), 1-6, 2018 | 89 | 2018 |
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks Y Mao, X Yuan, X Zhao, S Zhong European Symposium on Research in Computer Security, 476-496, 2021 | 48 | 2021 |
Learning from Differentially Private Neural Activations with Edge Computing Y Mao, S Yi, Q Li, J Feng, F Xu, S Zhong 2018 IEEE/ACM Symposium on Edge Computing (SEC), 90-102, 2018 | 43 | 2018 |
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training Y Mao, W Hong, H Wang, Q Li, S Zhong IEEE Transactions on Parallel and Distributed Systems 32 (7), 1777-1788, 2020 | 29 | 2020 |
Towards thwarting template side-channel attacks in secure cloud deduplications Y Zhang, Y Mao, M Xu, F Xu, S Zhong IEEE Transactions on Dependable and Secure Computing 18 (3), 1008-1018, 2019 | 26 | 2019 |
An improved traffic congestion monitoring system based on federated learning C Xu, Y Mao Information 11 (7), 365, 2020 | 24 | 2020 |
Joint differentially private Gale–Shapley mechanisms for location privacy protection in mobile traffic offloading systems Y Zhang, Y Mao, S Zhong IEEE Journal on Selected Areas in Communications 34 (10), 2738-2749, 2016 | 17 | 2016 |
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism Y Mao, W Hong, B Zhu, Z Zhu, Y Zhang, S Zhong IEEE Transactions on Parallel and Distributed Systems 33 (11), 3079-3091, 2021 | 15 | 2021 |
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing Y Mao, T Chen, Y Zhang, T Wang, S Zhong IEEE Transactions on Information Forensics and Security 12 (6), 1483-1493, 2017 | 12 | 2017 |
Secure split learning against property inference, data reconstruction, and feature space hijacking attacks Y Mao, Z Xin, Z Li, J Hong, Q Yang, S Zhong European Symposium on Research in Computer Security, 23-43, 2023 | 10 | 2023 |
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks Y Mao, Y Zhang, S Zhong Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 10 | 2016 |
Protecting location information in collaborative sensing of cognitive radio networks Y Mao, T Chen, Y Zhang, T Wang, S Zhong Proceedings of the 18th ACM International Conference on Modeling, Analysis …, 2015 | 10 | 2015 |
Secure deduplication schemes for content delivery in mobile edge computing Y Lin, Y Mao, Y Zhang, S Zhong Computers & Security 114, 102602, 2022 | 9 | 2022 |
Privacy preserving market schemes for mobile sensing Y Zhang, Y Mao, H Zhang, S Zhong 2015 44th International Conference on Parallel Processing, 909-918, 2015 | 9 | 2015 |
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack Y Mao, Y He, Y Zhang, J Hua, S Zhong IEEE Transactions on Mobile Computing 19 (12), 2916-2932, 2019 | 7 | 2019 |
Private Deep Neural Network Models Publishing for Machine Learning as a Service Y Mao, B Zhu, W Hong, Z Zhu, Y Zhang, S Zhong 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020 | 6 | 2020 |
Toward wireless security without computational assumptions—oblivious transfer based on wireless channel characteristics Z Hao, Y Mao, S Zhong, LE Li, H Yao, N Yu IEEE Transactions on Computers 63 (6), 1580-1593, 2014 | 5 | 2014 |
A Split-and-Privatize Framework for Large Language Model Fine-Tuning X Shen, Y Liu, H Liu, J Hong, B Duan, Z Huang, Y Mao, Y Wu, D Wu arXiv preprint arXiv:2312.15603, 2023 | 4 | 2023 |
Unbalanced private set intersection with linear communication complexity Q Zhao, B Jiang, Y Zhang, H Wang, Y Mao, S Zhong Science China Information Sciences 67 (3), 132105, 2024 | 3 | 2024 |
Towards Universal Detection of Adversarial Examples via Pseudorandom Classifiers B Zhu, C Dong, Y Zhang, Y Mao, S Zhong IEEE Transactions on Information Forensics and Security, 2023 | 3 | 2023 |