What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yong Xiang
Google Scholar
9
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Trustworthy and Fair Federated Learning via Reputation-Based Consensus and Adaptive Incentives.
Md. Mamunur Rashid
Yong Xiang
Md. Palash Uddin
Jine Tang
Keshav Sood
Longxiang Gao
2025
conf/sp
Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning.
Zirui Gong
Yanjun Zhang
Leo Yu Zhang
Zhaoxi Zhang
Yong Xiang
Shirui Pan
2024
journals/tifs
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification.
Zirui Gong
Liyue Shen
Yanjun Zhang
Leo Yu Zhang
Jingwei Wang
Guangdong Bai
Yong Xiang
2023
journals/compsec
DIVRS: Data integrity verification based on ring signature in cloud storage.
Miao Tian
Yushu Zhang
Youwen Zhu
Liangmin Wang
Yong Xiang
2023
journals/istr
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things.
Nai Wang
Junjun Chen
Di Wu
Wencheng Yang
Yong Xiang
Atul Sajjanhar
2020
journals/tifs
Secure and Efficient Outsourcing of PCA-Based Face Recognition.
Yushu Zhang
Xiangli Xiao
Lu-Xing Yang
Yong Xiang
Sheng Zhong
2019
journals/tifs
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
Lu-Xing Yang
Pengdeng Li
Yushu Zhang
Xiaofan Yang
Yong Xiang
Wanlei Zhou
2013
journals/tifs
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
Jun Zhang
Chao Chen
Yang Xiang
Wanlei Zhou
Yong Xiang
2012
journals/tifs
A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
Yong Xiang
Iynkaran Natgunanathan
Dezhong Peng
Wanlei Zhou
Shui Yu
Coauthors
Atul Sajjanhar
(1)
Chao Chen
(1)
Dezhong Peng
(1)
Di Wu
(1)
Guangdong Bai
(1)
Iynkaran Natgunanathan
(1)
Jine Tang
(1)
Jingwei Wang
(1)
Jun Zhang
(1)
Junjun Chen
(1)
Keshav Sood
(1)
Leo Yu Zhang
(2)
Liangmin Wang
(1)
Liyue Shen
(1)
Longxiang Gao
(1)
Lu-Xing Yang
(2)
Md. Mamunur Rashid
(1)
Md. Palash Uddin
(1)
Miao Tian
(1)
Nai Wang
(1)
Pengdeng Li
(1)
Sheng Zhong
(1)
Shirui Pan
(1)
Shui Yu
(1)
Wanlei Zhou
(3)
Wencheng Yang
(1)
Xiangli Xiao
(1)
Xiaofan Yang
(1)
Yang Xiang
(1)
Yanjun Zhang
(2)
Yong Xiang
(9)
Youwen Zhu
(1)
Yushu Zhang
(3)
Zhaoxi Zhang
(1)
Zirui Gong
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to