


default search action
Yifeng Zheng 0001
Person information
- affiliation: Hong Kong Polytechnic University, Hong Kong, SAR, China
Other persons with the same name
- Yifeng Zheng — disambiguation page
- Yifeng Zheng 0002
— Center for Space Utilization, Chinese Academy of Sciences, Beijing, China - Yifeng Zheng 0003
— Industrial Center, Nanjing Institute of Technology, Nanjing, China - Yifeng Zheng 0004
— Minnan Normal University, Zhangzhou, Fujian, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j79]Shuangqing Xu
, Yifeng Zheng, Yansong Gao
, Zhongyun Hua:
PrivBoost: A federated learning framework for differentially private tree boosting. Comput. Networks 274: 111817 (2026)
[j78]Tao Huang, Yansong Gao
, Yifeng Zheng, Boyu Kuang
, Zhidan Yuan
, Anmin Fu:
Automating bit-level field localization with hybrid neural network. Comput. Networks 277: 112041 (2026)
[j77]Zhongyun Hua
, Jianhui Zou, Yifeng Zheng
, Zhili Zhou
, Fei Peng
, Qing Liao
:
Large-Capacity Reversible Data Hiding Over Encrypted Images via Pixel Correlation Recovery. IEEE Trans. Dependable Secur. Comput. 23(1): 766-781 (2026)
[j76]Chunfei Pan
, Lei Zhou
, Anmin Fu
, Zhenzhu Chen
, Huaqun Wang
, Yifeng Zheng
, Yansong Gao
:
Blockchain-Enabled Efficient Deduplication and Mixed Auditing for Dynamic Cloud Data. IEEE Trans. Dependable Secur. Comput. 23(2): 3554-3570 (2026)
[j75]Qihao Dong
, Zhiyang Dai, Yansong Gao
, Yifeng Zheng
, Anmin Fu
, Willy Susilo
:
FORCE: Byzantine-Resilient Decentralized Federated Learning via Game-Theoretic Contribution Aggregation. IEEE Trans. Inf. Forensics Secur. 21: 3182-3196 (2026)
[j74]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Rushi Lan
, Qing Liao
, Guoai Xu:
Enabling Reliable and Anonymous Data Collection for Fog-Assisted Mobile Crowdsensing With Malicious User Detection. IEEE Trans. Mob. Comput. 25(1): 1414-1430 (2026)
[j73]Jianhui Zou, Weijia Cao, Nankun Mu, Shuang Yi, Yifeng Zheng, Zhaoquan Gu, Zhongyun Hua:
Reversible Data Hiding over Encrypted Images via Intrinsic Correlation in Block-Based Secret Sharing. ACM Trans. Multim. Comput. Commun. Appl. 22(2): 51:1-51:25 (2026)- 2025
[j72]Songlei Wang
, Yifeng Zheng, Xiaohua Jia, Haibo Hu:
PrivAGM: Secure Construction of Differentially Private Directed Attributed Graph Models on Decentralized Social Graphs. Proc. VLDB Endow. 18(11): 4682-4694 (2025)
[j71]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Qing Liao
, Xiaohua Jia
:
Enabling Verifiable Search and Integrity Auditing in Encrypted Decentralized Storage Using One Proof. IEEE Trans. Computers 74(8): 2731-2744 (2025)
[j70]Kuiyuan Zhang
, Zeming Hou, Zhongyun Hua
, Yifeng Zheng
, Leo Yu Zhang
:
Boosting Deepfake Detection Generalizability via Expansive Learning and Confidence Judgement. IEEE Trans. Circuits Syst. Video Technol. 35(1): 953-966 (2025)
[j69]Xiaoning Liu
, Yifeng Zheng
, Xingliang Yuan
, Xun Yi
:
${\sf GoCrowd}$GoCrowd: Obliviously Aggregating Crowd Wisdom With Quality Awareness in Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 22(1): 710-722 (2025)
[j68]Tao Huang
, Yansong Gao
, Yifeng Zheng
, Zhanfeng Wang, Chao Hu, Anmin Fu
:
FineBID: Fine-Grained Protocol Reverse Engineering for Bit-Level Field IDentification. IEEE Trans. Dependable Secur. Comput. 22(3): 2670-2686 (2025)
[j67]Zhili Zhou
, Ching-Nung Yang
, Shaowei Wang
, Guoshun Nan
, Stelvio Cimato
, Yifeng Zheng
, Qian Wang
:
Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 22(5): 4565-4579 (2025)
[j66]Zhongyun Hua
, Zizheng Wang, Mingyang Song
, Yifeng Zheng
, Guangxia Xu
, Xiaohua Jia
:
Enabling Secure Auditing and Deduplication in Multi-Replica Cloud Storage. IEEE Trans. Dependable Secur. Comput. 22(6): 6653-6670 (2025)
[j65]Zhiyang Dai, Yansong Gao
, Chunyi Zhou
, Anmin Fu
, Zhi Zhang
, Minhui Xue
, Yifeng Zheng
, Yuqing Zhang
:
Decaf: Data Distribution Decompose Attack Against Federated Learning. IEEE Trans. Inf. Forensics Secur. 20: 405-420 (2025)
[j64]Zhiyang Dai, Yansong Gao
, Boyu Kuang
, Yifeng Zheng
, Ajmal Mian
, Ruimin Wang, Anmin Fu
:
Division and Union: Latent Model Watermarking. IEEE Trans. Inf. Forensics Secur. 20: 9523-9538 (2025)
[j63]Yifeng Zheng
, Weibo Wang, Songlei Wang
, Zhongyun Hua
, Yansong Gao
:
ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud. IEEE Trans. Serv. Comput. 18(1): 314-327 (2025)
[j62]Yifeng Zheng
, Menglun Zhou
, Songlei Wang
, Zhongyun Hua
, Jinghua Jiang, Yansong Gao
:
Privacy-Preserving Competitive Detour Tasking in Spatial Crowdsourcing. IEEE Trans. Serv. Comput. 18(1): 385-398 (2025)
[j61]Huajie Ouyang, Yifeng Zheng
, Songlei Wang
, Zhongyun Hua
:
OblivTime: Oblivious and Efficient Interval Skyline Query Processing Over Encrypted Time-Series Data. IEEE Trans. Serv. Comput. 18(3): 1602-1617 (2025)
[j60]Rui Lian
, Yifeng Zheng
, Yulong Ming
, Chengjun Cai
, Cong Wang
, Xiaohua Jia
:
Combating Abusive Information in Encrypted Messaging Services: A Secure and Efficient Realization. IEEE Trans. Serv. Comput. 18(6): 3581-3594 (2025)
[c22]Shuangqing Xu
, Yifeng Zheng
, Zhongyun Hua
:
Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization. CCS 2025: 2354-2368
[c21]Longji Li, Yifeng Zheng, Songlei Wang, Zhongyun Hua, Lei Xu, Yansong Gao:
Privacy-Assured Analytics on Decentralized Graphs:The Case of Graph Learning. TrustCom 2025: 1396-1405
[c20]Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, Guoai Xu, Xingliang Yuan:
Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting. USENIX Security Symposium 2025: 7683-7702
[i26]Jianhui Zou, Weijia Cao, Shuang Yi, Yifeng Zheng, Zhongyun Hua:
Reversible Data Hiding over Encrypted Images via Intrinsic Correlation in Block-Based Secret Sharing. CoRR abs/2502.11121 (2025)
[i25]Anmin Fu, Fanyu Meng, Huaibing Peng, Hua Ma, Zhi Zhang, Yifeng Zheng, Willy Susilo
, Yansong Gao:
Kill Two Birds with One Stone! Trajectory enabled Unified Online Detection of Adversarial Examples and Backdoor Attacks. CoRR abs/2506.22722 (2025)
[i24]Shuangqing Xu, Yifeng Zheng, Zhongyun Hua:
Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization. CoRR abs/2511.07123 (2025)- 2024
[j59]Hongliang Zhou
, Yifeng Zheng
, Xiaohua Jia:
Towards robust and privacy-preserving federated learning in edge computing. Comput. Networks 243: 110321 (2024)
[j58]Weibo Wang, Yifeng Zheng
, Songlei Wang
, Zhongyun Hua, Lei Xu, Yansong Gao:
BopSkyline: Boosting privacy-preserving skyline query service in the cloud. Comput. Secur. 140: 103803 (2024)
[j57]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Hejiao Huang
, Xiaohua Jia
:
LSDedup: Layered Secure Deduplication for Cloud Storage. IEEE Trans. Computers 73(2): 422-435 (2024)
[j56]Zhongyun Hua
, Xingyu Liu
, Yifeng Zheng
, Shuang Yi
, Yushu Zhang
:
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1799-1814 (2024)
[j55]Linshan Hou
, Zhongyun Hua
, Yuhong Li, Yifeng Zheng
, Leo Yu Zhang
:
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models. IEEE Trans. Circuits Syst. Video Technol. 34(11): 11299-11312 (2024)
[j54]Yifeng Zheng
, Menglun Zhou
, Songlei Wang
, Hejiao Huang
, Xiaohua Jia
, Xun Yi
, Cong Wang
:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. IEEE Trans. Dependable Secur. Comput. 21(2): 789-803 (2024)
[j53]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 21(4): 3545-3561 (2024)
[j52]Yinshan Li, Hua Ma, Zhi Zhang
, Yansong Gao
, Alsharif Abuadbba, Minhui Xue
, Anmin Fu
, Yifeng Zheng
, Said F. Al-Sarawi
, Derek Abbott
:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. IEEE Trans. Inf. Forensics Secur. 19: 104-119 (2024)
[j51]Zhongyun Hua
, Yan Tong, Yifeng Zheng
, Yuhong Li
, Yushu Zhang
:
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark. IEEE Trans. Inf. Forensics Secur. 19: 3644-3658 (2024)
[j50]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing. IEEE Trans. Inf. Forensics Secur. 19: 4700-4715 (2024)
[j49]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Cong Wang
:
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security. IEEE Trans. Inf. Forensics Secur. 19: 5999-6014 (2024)
[j48]Zhongyun Hua
, Yufei Yao
, Mingyang Song
, Yifeng Zheng
, Yushu Zhang
, Cong Wang
:
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service. IEEE Trans. Serv. Comput. 17(3): 821-835 (2024)
[j47]Rui Lian
, Yifeng Zheng
, Cong Wang
:
PrivRo: A Privacy-Preserving Crowdsourcing Service With Robust Quality Awareness. IEEE Trans. Serv. Comput. 17(4): 1682-1697 (2024)
[j46]Rui Lian
, Anxin Zhou
, Yifeng Zheng
:
Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions. Wirel. Networks 30(5): 4329-4341 (2024)
[j45]Jihyeon Ryu
, Yifeng Zheng
, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024)
[c19]Shuangqing Xu
, Yifeng Zheng
, Zhongyun Hua
:
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. CCS 2024: 243-257
[c18]Rui Lian
, Yulong Ming
, Chengjun Cai
, Yifeng Zheng, Cong Wang, Xiaohua Jia:
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting. ESORICS (2) 2024: 247-267
[c17]Songlei Wang, Yifeng Zheng, Xiaohua Jia:
GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud. USENIX Security Symposium 2024
[c16]Yifeng Zheng
, Tianchen Xiong, Huajie Ouyang, Songlei Wang
, Zhongyun Hua, Yansong Gao:
SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization. WISE (2) 2024: 227-242
[i23]Shuangqing Xu, Yifeng Zheng, Zhongyun Hua:
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. CoRR abs/2410.03407 (2024)- 2023
[j44]Menglun Zhou, Yifeng Zheng
, Songlei Wang
, Zhongyun Hua, Hejiao Huang, Yansong Gao, Xiaohua Jia:
PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing. Comput. Networks 224: 109600 (2023)
[j43]Hongliang Zhou, Yifeng Zheng
, Xiaohua Jia, Jiangang Shu
:
Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN. Comput. Networks 225: 109642 (2023)
[j42]Hua Ma, Qun Li
, Yifeng Zheng
, Zhi Zhang
, Xiaoning Liu
, Yansong Gao
, Said F. Al-Sarawi
, Derek Abbott
:
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning. Comput. Secur. 133: 103406 (2023)
[j41]Chandra Thapa
, Jun Wen Tang
, Alsharif Abuadbba
, Yansong Gao, Seyit Camtepe
, Surya Nepal
, Mahathir Almashor
, Yifeng Zheng:
Evaluation of Federated Learning in Phishing Email Detection. Sensors 23(9): 4346 (2023)
[j40]Huming Qiu, Hua Ma, Zhi Zhang
, Yansong Gao
, Yifeng Zheng
, Anmin Fu
, Pan Zhou
, Derek Abbott
, Said F. Al-Sarawi
:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1185-1198 (2023)
[j39]Jing Yao
, Xiangyi Meng
, Yifeng Zheng
, Cong Wang
:
Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes. IEEE Trans. Cloud Comput. 11(2): 1854-1870 (2023)
[j38]Zhongyun Hua
, Ziyi Wang, Yifeng Zheng
, Yongyong Chen
, Yuanman Li
:
Enabling Large-Capacity Reversible Data Hiding Over Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 33(3): 1003-1018 (2023)
[j37]Xiaoning Liu
, Yifeng Zheng
, Xingliang Yuan
, Xun Yi
:
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques. IEEE Trans. Dependable Secur. Comput. 20(1): 620-636 (2023)
[j36]Yifeng Zheng
, Shangqi Lai
, Yi Liu
, Xingliang Yuan
, Xun Yi
, Cong Wang
:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. IEEE Trans. Dependable Secur. Comput. 20(2): 988-1001 (2023)
[j35]Yifeng Zheng
, Cong Wang
, Ruochen Wang, Huayi Duan
, Surya Nepal
:
Optimizing Secure Decision Tree Inference Outsourcing. IEEE Trans. Dependable Secur. Comput. 20(4): 3079-3092 (2023)
[j34]Zhongyun Hua
, Yanxiang Wang, Shuang Yi
, Yifeng Zheng
, Xingyu Liu
, Yongyong Chen
, Xinpeng Zhang
:
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images. IEEE Trans. Dependable Secur. Comput. 20(5): 3669-3686 (2023)
[j33]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Hejiao Huang
, Xiaohua Jia
:
Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(6): 4928-4945 (2023)
[j32]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Qian Wang
, Cong Wang
:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2929-2944 (2023)
[j31]Hongliang Zhou, Yifeng Zheng
, Hejiao Huang
, Jiangang Shu
, Xiaohua Jia
:
Toward Robust Hierarchical Federated Learning in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 24(5): 5600-5614 (2023)
[j30]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Xun Yi
:
Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition. IEEE Trans. Knowl. Data Eng. 35(7): 7341-7356 (2023)
[j29]Yifeng Zheng
, Weibo Wang, Songlei Wang
, Xiaohua Jia
, Hejiao Huang
, Cong Wang
:
SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases. IEEE Trans. Knowl. Data Eng. 35(9): 8955-8967 (2023)
[j28]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Hejiao Huang
, Cong Wang
:
PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service. IEEE Trans. Knowl. Data Eng. 35(10): 10478-10496 (2023)
[j27]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing. IEEE Trans. Parallel Distributed Syst. 34(10): 2642-2656 (2023)
[j26]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
:
SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service. IEEE Trans. Serv. Comput. 16(4): 2923-2938 (2023)
[j25]Yifeng Zheng
, Shuangqing Xu
, Songlei Wang
, Yansong Gao
, Zhongyun Hua
:
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. IEEE Trans. Serv. Comput. 16(5): 3604-3620 (2023)
[i22]Qun Li, Chandra Thapa, Lawrence Ong
, Yifeng Zheng, Hua Ma, Seyit Ahmet Çamtepe, Anmin Fu, Yansong Gao:
Vertical Federated Learning: Taxonomies, Threats, and Prospects. CoRR abs/2302.01550 (2023)
[i21]Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, Zhongyun Hua:
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. CoRR abs/2305.12652 (2023)
[i20]Yifeng Zheng, Weibo Wang, Songlei Wang
, Zhongyun Hua, Yansong Gao:
ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud. CoRR abs/2310.07148 (2023)- 2022
[j24]Yansong Gao, Qun Li
, Yifeng Zheng
, Guohong Wang, Jiannan Wei, Mang Su:
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning. Comput. Secur. 121: 102857 (2022)
[j23]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. J. Comput. Secur. 30(6): 795-827 (2022)
[j22]Xicheng Wan
, Yifeng Zheng
, Qun Li, Anmin Fu
, Mang Su, Yansong Gao:
Towards privacy-preserving and verifiable federated matrix factorization. Knowl. Based Syst. 250: 109193 (2022)
[j21]Lingjuan Lyu, Sid Chi-Kin Chau
, Nan Wang
, Yifeng Zheng
:
Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy. IEEE Trans. Cloud Comput. 10(3): 1647-1660 (2022)
[j20]Xiaoning Liu
, Yifeng Zheng
, Xun Yi
, Surya Nepal
:
Privacy-Preserving Collaborative Analytics on Medical Time Series Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1687-1702 (2022)
[j19]Yifeng Zheng
, Huayi Duan
, Cong Wang
, Ruochen Wang, Surya Nepal
:
Securely and Efficiently Outsourcing Decision Tree Inference. IEEE Trans. Dependable Secur. Comput. 19(3): 1841-1855 (2022)
[j18]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Xun Yi
:
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs. IEEE Trans. Inf. Forensics Secur. 17: 3179-3194 (2022)
[j17]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Hejiao Huang
, Cong Wang
:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. IEEE Trans. Inf. Forensics Secur. 17: 3582-3596 (2022)
[c15]Shengshan Hu, Ziqi Zhou, Yechao Zhang
, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. ACM Multimedia 2022: 678-686
[c14]Minghui Li
, Wei Wan
, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng:
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints. MSN 2022: 178-185
[i19]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022)
[i18]Songlei Wang, Yifeng Zheng, Xiaohua Jia:
Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service. CoRR abs/2202.07835 (2022)
[i17]Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu
, Mang Su, Yansong Gao:
Towards Privacy-Preserving and Verifiable Federated Matrix Factorization. CoRR abs/2204.01601 (2022)
[i16]Songlei Wang
, Yifeng Zheng, Xiaohua Jia, Xun Yi:
Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition. CoRR abs/2206.09388 (2022)
[i15]Shengshan Hu, Ziqi Zhou, Yechao Zhang
, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. CoRR abs/2207.00278 (2022)
[i14]Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott:
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning. CoRR abs/2207.09080 (2022)
[i13]Songlei Wang
, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. CoRR abs/2209.03526 (2022)
[i12]Yifeng Zheng, Weibo Wang, Songlei Wang
, Xiaohua Jia, Hejiao Huang, Cong Wang:
SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases. CoRR abs/2209.07064 (2022)
[i11]Minghui Li, Wei Wan
, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng:
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints. CoRR abs/2210.01437 (2022)
[i10]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization. IACR Cryptol. ePrint Arch. 2022: 899 (2022)- 2021
[j16]Yifeng Zheng
, Huayi Duan
, Xiaoting Tang, Cong Wang
, Jiantao Zhou
:
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising. IEEE Trans. Dependable Secur. Comput. 18(3): 1261-1275 (2021)
[j15]Chengjun Cai
, Yifeng Zheng
, Yuefeng Du
, Zhan Qin
, Cong Wang
:
Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains. IEEE Trans. Dependable Secur. Comput. 18(4): 1893-1907 (2021)
[j14]Chengjun Cai
, Yifeng Zheng
, Anxin Zhou
, Cong Wang
:
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams. IEEE Trans. Dependable Secur. Comput. 18(6): 2601-2616 (2021)
[j13]Helei Cui
, Xingliang Yuan
, Yifeng Zheng
, Cong Wang
:
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection. IEEE Trans. Serv. Comput. 14(4): 998-1012 (2021)
[c13]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. DSN 2021: 63-74
[c12]Xiaoning Liu
, Yifeng Zheng, Xingliang Yuan, Xun Yi:
MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service. ESORICS (1) 2021: 519-541
[c11]Rui Lian
, Anxin Zhou
, Yifeng Zheng, Cong Wang:
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics. QSHINE 2021: 42-53
[i9]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021)
[i8]Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things. CoRR abs/2105.03822 (2021)
[i7]Yansong Gao, Qun Li, Yifeng Zheng, Guohong Wang, Jiannan Wei, Mang Su:
SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning. CoRR abs/2110.13499 (2021)
[i6]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
Optimizing Secure Decision Tree Inference Outsourcing. CoRR abs/2111.00397 (2021)
[i5]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Backdoor Detection. CoRR abs/2111.11157 (2021)- 2020
[j12]Yifeng Zheng
, Huayi Duan
, Xingliang Yuan
, Cong Wang
:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. IEEE Trans. Dependable Secur. Comput. 17(1): 121-133 (2020)
[j11]Leo Yu Zhang
, Yifeng Zheng
, Jian Weng
, Cong Wang
, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 17(6): 1218-1231 (2020)
[j10]Jinghua Jiang, Yifeng Zheng
, Zhenkui Shi, Xingliang Yuan
, Xiaolin Gui
, Cong Wang
:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. IEEE Trans. Serv. Comput. 13(3): 410-424 (2020)
[c10]Jing Yao
, Yifeng Zheng, Yu Guo, Cong Wang:
SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search. SBC@AsiaCCS 2020: 14-20
[c9]Jing Yao
, Yifeng Zheng, Cong Wang, Surya Nepal
:
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness. ICETE (2) 2020: 295-301
[c8]Yifeng Zheng, Arindam Pal
, Sharif Abuadbba
, Shiva Raj Pokhrel, Surya Nepal
, Helge Janicke:
Towards IoT Security Automation and Orchestration. TPS-ISA 2020: 55-63
[i4]Lingjuan Lyu, Sid Chi-Kin Chau, Nan Wang, Yifeng Zheng:
Cloud-based Privacy-Preserving Collaborative Consumption for Sharing Economy. CoRR abs/2007.07499 (2020)
[i3]Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit Ahmet Çamtepe, Surya Nepal, Mahathir Almashor:
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. CoRR abs/2007.13300 (2020)
[i2]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal:
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks. CoRR abs/2010.03735 (2020)
[i1]Yi Liu, Xingliang Yuan, Ruihui Zhao, Yifeng Zheng, Yefeng Zheng:
RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System. CoRR abs/2012.04432 (2020)
2010 – 2019
- 2019
[j9]Jing Yao
, Yifeng Zheng, Yu Guo, Chengjun Cai
, Anxin Zhou
, Cong Wang
, Xiaolin Gui
:
A Privacy-Preserving System for Targeted Coupon Service. IEEE Access 7: 120817-120830 (2019)
[j8]Huayi Duan
, Yifeng Zheng
, Cong Wang
, Xingliang Yuan
:
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things. IEEE Internet Things J. 6(2): 2637-2650 (2019)
[c7]Yifeng Zheng, Huayi Duan
, Cong Wang:
Towards Secure and Efficient Outsourcing of Machine Learning Classification. ESORICS (1) 2019: 22-40
[c6]Huayi Duan
, Yifeng Zheng
, Yuefeng Du
, Anxin Zhou
, Cong Wang, Man Ho Au:
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. PerCom 2019: 1-10- 2018
[j7]Jing Yao
, Yifeng Zheng
, Cong Wang
, Xiaolin Gui:
Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern. IEEE Access 6: 11112-11122 (2018)
[j6]Yifeng Zheng
, Huayi Duan
, Cong Wang
:
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 13(10): 2475-2489 (2018)
[c5]Yifeng Zheng
, Cong Wang, Jiantao Zhou:
Toward Secure Image Denoising: A Machine Learning Based Realization. ICASSP 2018: 6936-6940
[c4]Chengjun Cai
, Yifeng Zheng
, Cong Wang:
Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization. ICDCS 2018: 589-599- 2017
[j5]Yifeng Zheng
, Helei Cui
, Cong Wang
, Jiantao Zhou
:
Privacy-Preserving Image Denoising From External Cloud Databases. IEEE Trans. Inf. Forensics Secur. 12(6): 1285-1298 (2017)
[j4]Yifeng Zheng
, Xingliang Yuan
, Xinyu Wang
, Jinghua Jiang, Cong Wang
, Xiaolin Gui:
Toward Encrypted Cloud Media Center With Secure Deduplication. IEEE Trans. Multim. 19(2): 251-265 (2017)- 2016
[j3]Jinghua Jiang, Yifeng Zheng
, Xingliang Yuan
, Zhenkui Shi, Xiaolin Gui, Cong Wang
, Jing Yao
:
Towards Secure and Accurate Targeted Mobile Coupon Delivery. IEEE Access 4: 8116-8126 (2016)
[j2]Jinghua Jiang, Yifeng Zheng
, Zhenkui Shi, Jing Yao
, Cong Wang
, Xiaolin Gui:
Towards privacy-preserving user targeting. J. Commun. Inf. Networks 1(4): 22-32 (2016)
[c3]Helei Cui, Xingliang Yuan
, Yifeng Zheng
, Cong Wang:
Enabling secure and effective near-duplicate detection over encrypted in-network storage. INFOCOM 2016: 1-9- 2015
[j1]Yifeng Zheng
, Jianxiu Jin:
A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos. Multim. Tools Appl. 74(18): 7803-7820 (2015)
[c2]Yifeng Zheng
, Xingliang Yuan
, Xinyu Wang
, Jinghua Jiang, Cong Wang
, Xiaolin Gui:
Enabling Encrypted Cloud Media Center with Secure Deduplication. AsiaCCS 2015: 63-72- 2014
[c1]Yifeng Zheng
, Jianxiu Jin:
A novel image scrambling degree blind evaluation scheme based on Bhattacharyya coefficient. CSNDSP 2014: 161-165
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-31 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







