What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yifeng Zheng
Google Scholar
ORCID:
0000-0001-7852-6051
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Decaf: Data Distribution Decompose Attack Against Federated Learning.
Zhiyang Dai
Yansong Gao
Chunyi Zhou
Anmin Fu
Zhi Zhang
Minhui Xue
Yifeng Zheng
Yuqing Zhang
2025
journals/tifs
Division and Union: Latent Model Watermarking.
Zhiyang Dai
Yansong Gao
Boyu Kuang
Yifeng Zheng
Ajmal Mian
Ruimin Wang
Anmin Fu
2024
journals/compsec
BopSkyline: Boosting privacy-preserving skyline query service in the cloud.
Weibo Wang
Yifeng Zheng
Songlei Wang
Zhongyun Hua
Lei Xu
Yansong Gao
2024
journals/tifs
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark.
Zhongyun Hua
Yan Tong
Yifeng Zheng
Yuhong Li
Yushu Zhang
2024
journals/tifs
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
Yinshan Li
Hua Ma
Zhi Zhang
Yansong Gao
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Yifeng Zheng
Said F. Al-Sarawi
Derek Abbott
2024
journals/tifs
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing.
Mingyang Song
Zhongyun Hua
Yifeng Zheng
Tao Xiang
Xiaohua Jia
2024
journals/tifs
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Cong Wang
2024
conf/ccs
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy.
Shuangqing Xu
Yifeng Zheng
Zhongyun Hua
2024
conf/uss
GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
2024
conf/esorics
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting.
Rui Lian
Yulong Ming
Chengjun Cai
Yifeng Zheng
Cong Wang
Xiaohua Jia
2023
journals/compsec
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Hua Ma
Qun Li
Yifeng Zheng
Zhi Zhang
Xiaoning Liu
Yansong Gao
Said F. Al-Sarawi
Derek Abbott
2023
journals/tifs
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Qian Wang
Cong Wang
2022
journals/compsec
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Yansong Gao
Qun Li
Yifeng Zheng
Guohong Wang
Jiannan Wei
Mang Su
2022
journals/tifs
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Xun Yi
2022
journals/tifs
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Hejiao Huang
Cong Wang
2021
conf/esorics
[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Xiaoning Liu
Yifeng Zheng
Xingliang Yuan
Xun Yi
2021
conf/dsn
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Bedeuro Kim
Alsharif Abuadbba
Yansong Gao
Yifeng Zheng
Muhammad Ejaz Ahmed
Surya Nepal
Hyoungshick Kim
2019
conf/esorics
Towards Secure and Efficient Outsourcing of Machine Learning Classification.
Yifeng Zheng
Huayi Duan
Cong Wang
2018
journals/tifs
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
Yifeng Zheng
Huayi Duan
Cong Wang
2017
journals/tifs
Privacy-Preserving Image Denoising From External Cloud Databases.
Yifeng Zheng
Helei Cui
Cong Wang
Jiantao Zhou
2015
conf/ccs
Enabling Encrypted Cloud Media Center with Secure Deduplication.
Yifeng Zheng
Xingliang Yuan
Xinyu Wang
Jinghua Jiang
Cong Wang
Xiaolin Gui
Coauthors
Ajmal Mian
(1)
Alsharif Abuadbba
(2)
Anmin Fu
(3)
Bedeuro Kim
(1)
Boyu Kuang
(1)
Chengjun Cai
(1)
Chunyi Zhou
(1)
Cong Wang
(8)
Derek Abbott
(2)
Guohong Wang
(1)
Hejiao Huang
(1)
Helei Cui
(1)
Hua Ma
(2)
Huayi Duan
(2)
Hyoungshick Kim
(1)
Jiannan Wei
(1)
Jiantao Zhou
(1)
Jinghua Jiang
(1)
Lei Xu
(1)
Mang Su
(1)
Mingyang Song
(1)
Minhui Xue
(2)
Muhammad Ejaz Ahmed
(1)
Qian Wang
(1)
Qun Li
(2)
Rui Lian
(1)
Ruimin Wang
(1)
Said F. Al-Sarawi
(2)
Shuangqing Xu
(1)
Songlei Wang
(6)
Surya Nepal
(1)
Tao Xiang
(1)
Weibo Wang
(1)
Xiaohua Jia
(7)
Xiaolin Gui
(1)
Xiaoning Liu
(2)
Xingliang Yuan
(2)
Xinyu Wang
(1)
Xun Yi
(2)
Yan Tong
(1)
Yansong Gao
(7)
Yifeng Zheng
(21)
Yinshan Li
(1)
Yuhong Li
(1)
Yulong Ming
(1)
Yuqing Zhang
(1)
Yushu Zhang
(1)
Zhi Zhang
(3)
Zhiyang Dai
(2)
Zhongyun Hua
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to