Follow
Yifeng Zheng
Yifeng Zheng
Verified email at hit.edu.cn - Homepage
Title
Cited by
Cited by
Year
Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing
Y Zheng, H Duan, C Wang
IEEE Transactions on Information Forensics and Security 13 (10), 2475-2489, 2018
1452018
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery
Y Zheng, H Duan, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 121 - 133, 2020
992020
Toward privacy-preserving personalized recommendation services
C Wang, Y Zheng, J Jiang, K Ren
Engineering 4 (1), 21-28, 2018
872018
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 2023
842023
Toward Encrypted Cloud Media Center With Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2017
672017
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization
H Duan, Y Zheng, Y Du, A Zhou, C Wang, MH Au
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
622019
Enabling Encrypted Cloud Media Center with Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proc. of ACM AsiaCCS, 2015
562015
Privacy-Preserving Image Denoising From External Cloud Databases
Y Zheng, H Cui, C Wang, J Zhou
IEEE Transactions on Information Forensics and Security, 2017
522017
Towards private, robust, and verifiable crowdsensing systems via public blockchains
C Cai, Y Zheng, Y Du, Z Qin, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1893-1907, 2019
492019
Leveraging crowdsensed data streams to discover and sell knowledge: A secure and efficient realization
C Cai, Y Zheng, C Wang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
482018
Towards secure and efficient outsourcing of machine learning classification
Y Zheng, H Duan, C Wang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
422019
A Novel Image Encryption Scheme Based on Hénon Map and Compound Spatiotemporal Chaos
Y Zheng, J Jin
Multimedia Tools and Applications 74 (18), 7803-7820, 2015
412015
You can access but you cannot leak: Defending against illegal content redistribution in encrypted cloud media center
LY Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren
IEEE Transactions on Dependable and Secure Computing 17 (6), 1218-1231, 2018
392018
Denoising in the dark: Privacy-preserving deep neural network-based image denoising
Y Zheng, H Duan, X Tang, C Wang, J Zhou
IEEE Transactions on Dependable and Secure Computing 18 (3), 1261-1275, 2019
372019
Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
H Cui, X Yuan, Y Zheng, C Wang
Proc. of IEEE INFOCOM, 2016
332016
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
S Hu, Z Zhou, Y Zhang, LY Zhang, Y Zheng, Y He, H Jin
ACM International Conference on Multimedia (MM), 2022
302022
Securely and Efficiently Outsourcing Decision Tree Inference
Y Zheng, H Duan, C Wang, R Wang, S Nepal
IEEE Transactions on Dependable and Secure Computing, 2020
292020
Securely outsourcing neural network inference to the cloud with lightweight techniques
X Liu, Y Zheng, X Yuan, X Yi
IEEE Transactions on Dependable and Secure Computing 20 (1), 620-636, 2022
282022
Collaborative Prediction and Detection of DDoS Attacks in Edge Computing: A Deep Learning-Based Approach with Distributed SDN
H Zhou, Y Zheng, XJ Jia, J Shu
Computer Networks, 2023
242023
Treasure collection on foggy islands: building secure network archives for internet of things
H Duan, Y Zheng, C Wang, X Yuan
IEEE Internet of Things Journal 6 (2), 2637-2650, 2018
232018
The system can't perform the operation now. Try again later.
Articles 1–20