What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yulong Shen
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Quantifying Privacy Risks of Behavioral Semantics in Mobile Communication Services.
Guoying Qiu
Tiecheng Bai
Guoming Tang
Deke Guo
Chuandong Li
Yan Gan
Baoping Zhou
Yulong Shen
2025
journals/tifs
On the Impact of Warden Collusion on Covert Communication in Wireless Networks.
Shuangrui Zhao
Jia Liu
Yulong Shen
Xiaohong Jiang
Tarik Taleb
Norio Shiratori
2025
journals/tifs
Local Differential Privacy Is Not Enough: A Sample Reconstruction Attack Against Federated Learning With Local Differential Privacy.
Zhichao You
Xuewen Dong
Shujun Li
Ximeng Liu
Siqi Ma
Yulong Shen
2024
journals/tifs
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming.
Yu Zhang
Shuangrui Zhao
Yulong Shen
Xiaohong Jiang
Norio Shiratori
2024
journals/tifs
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning.
Xutong Mu
Ke Cheng
Teng Liu
Tao Zhang
Xueli Geng
Yulong Shen
2024
journals/tifs
FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing.
Jiaxuan Fu
Ke Cheng
Anxiao Song
Yuheng Xia
Zhao Chang
Yulong Shen
2024
conf/acisp
Action-Driven UAV Fingerprint Verification with Perception Data.
Yuxin Liu
Ning Xi
Ruidong Han
Yuanzhao Li
Jian Feng Ma
Yulong Shen
2024
conf/esorics
Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing.
Jiaxuan Fu
Ke Cheng
Yuheng Xia
Anxiao Song
Qianxing Li
Yulong Shen
2023
journals/tifs
Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems.
Yangyang Liu
Pinchang Zhang
Jun Liu
Yulong Shen
Xiaohong Jiang
2022
journals/tifs
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems.
Jiaqing Bai
Ji He
Yanping Chen
Yulong Shen
Xiaohong Jiang
2022
journals/tifs
Enhancing Leakage Prevention for MapReduce.
Yongzhi Wang
Xiaoyu Zhang
Yao Wu
Yulong Shen
2022
journals/tifs
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security.
Yuanyu Zhang
Yulong Shen
Xiaohong Jiang
Shoji Kasahara
2021
journals/tifs
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems.
Pinchang Zhang
Jun Liu
Yulong Shen
Xiaohong Jiang
2021
journals/tifs
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems.
Shuangrui Zhao
Jia Liu
Yulong Shen
Xiaohong Jiang
Norio Shiratori
2021
conf/uss
Research on the Security of Visual Reasoning CAPTCHA.
Yipeng Gao
Haichang Gao
Sainan Luo
Yang Zi
Shudong Zhang
Wenjie Mao
Ping Wang
Yulong Shen
Jeff Yan
2020
journals/tifs
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks.
Ji He
Jia Liu
Yulong Shen
Xiaohong Jiang
Norio Shiratori
2020
journals/tifs
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems.
Shuangrui Zhao
Jia Liu
Yulong Shen
Xiaohong Jiang
Norio Shiratori
2019
journals/compsec
Selfholding: A combined attack model using selfish mining with block withholding attack.
Xuewen Dong
Feng Wu
Anter Faree
Deke Guo
Yulong Shen
Jianfeng Ma
2018
journals/tifs
Practical Verifiable Computation-A MapReduce Case Study.
Yongzhi Wang
Yulong Shen
Xiaohong Jiang
2016
conf/ccs
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications.
Yongzhi Wang
Yulong Shen
Coauthors
Anter Faree
(1)
Anxiao Song
(2)
Baoping Zhou
(1)
Chuandong Li
(1)
Deke Guo
(2)
Feng Wu
(1)
Guoming Tang
(1)
Guoying Qiu
(1)
Haichang Gao
(1)
Jeff Yan
(1)
Ji He
(2)
Jia Liu
(4)
Jian Feng Ma
(1)
Jianfeng Ma
(1)
Jiaqing Bai
(1)
Jiaxuan Fu
(2)
Jun Liu
(2)
Ke Cheng
(3)
Ning Xi
(1)
Norio Shiratori
(5)
Pinchang Zhang
(2)
Ping Wang
(1)
Qianxing Li
(1)
Ruidong Han
(1)
Sainan Luo
(1)
Shoji Kasahara
(1)
Shuangrui Zhao
(4)
Shudong Zhang
(1)
Shujun Li
(1)
Siqi Ma
(1)
Tao Zhang
(1)
Tarik Taleb
(1)
Teng Liu
(1)
Tiecheng Bai
(1)
Wenjie Mao
(1)
Xiaohong Jiang
(10)
Xiaoyu Zhang
(1)
Ximeng Liu
(1)
Xueli Geng
(1)
Xuewen Dong
(2)
Xutong Mu
(1)
Yan Gan
(1)
Yang Zi
(1)
Yangyang Liu
(1)
Yanping Chen
(1)
Yao Wu
(1)
Yipeng Gao
(1)
Yongzhi Wang
(3)
Yu Zhang
(1)
Yuanyu Zhang
(1)
Yuanzhao Li
(1)
Yuheng Xia
(2)
Yulong Shen
(20)
Yuxin Liu
(1)
Zhao Chang
(1)
Zhichao You
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to