Yuan Hong
Illinois Institute of Technology
H-index: 23
North America-United States
Top articles of Yuan Hong
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents | IEEE Transactions on Dependable and Secure Computing | Xinyu Zhang Huiyu Xu Zhongjie Ba Zhibo Wang Yuan Hong | 2024/3/5 |
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks | Sayedeh Leila Noorbakhsh Binghui Zhang Yuan Hong Binghui Wang | 2024/8 | |
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks | Caridad Arroyo Arevalo Sayedeh Leila Noorbakhsh Yun Dong Yuan Hong Binghui Wang | 2024/2 | |
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming | Shuya Feng Meisam Mohammady Han Wang Xiaochen Li Zhan Qin | 2024/5 | |
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory | Xiaochen Li Weiran Liu Jian Lou Yuan Hong Lei Zhang | 2024/2 | |
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks | arXiv preprint arXiv:2307.16630 | Xinyu Zhang Hanbin Hong Yuan Hong Peng Huang Binghui Wang | 2023/7/31 |
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response | Matta Varun Shuya Feng Han Wang Shamik Sural Yuan Hong | 2024 | |
Data poisoning attacks on traffic state estimation and prediction | Available at SSRN 4396123 | Feilong Wang Xin Wang Yuan Hong Xuegang Ban | 2022/12/5 |
On the Faithfulness of Vision Transformer Explanations | arXiv preprint arXiv:2404.01415 | Junyi Wu Weitai Kang Hao Tang Yuan Hong Yan Yan | 2024/4/1 |
Fltracer: Accurate poisoning attack provenance in federated learning | arXiv preprint arXiv:2310.13424 | Xinyu Zhang Qingyu Liu Zhongjie Ba Yuan Hong Tianhang Zheng | 2023/10/20 |
Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records | Fereshteh Razmi Jian Lou Yuan Hong Li Xiong | 2023/9/17 | |
Uniap: Protecting speech privacy with non-targeted universal adversarial perturbations | IEEE Transactions on Dependable and Secure Computing | Peng Cheng Yuexin Wu Yuan Hong Zhongjie Ba Feng Lin | 2023/2/6 |
Dpod: differentially private outsourcing of anomaly detection | 2023/8/31 | ||
Theoretically Understanding Data Reconstruction Leakage in Federated Learning | Zifan Wang Binghui Zhang Meng Pang Yuan Hong Binghui Wang | 2023/10/13 | |
Stealthy 3d poisoning attack on video recognition models | IEEE Transactions on Dependable and Secure Computing | Shangyu Xie Yan Yan Yuan Hong | 2023 |
Infrastructure-Enabled Gps Spoofing Detection and Correction | IEEE Transactions on Intelligent Transportation Systems | Feilong Wang Yuan Hong Xuegang Ban | 2023 |
Universally Amplifying Randomized Smoothing for Certified Robustness with Anisotropic Noise | Hanbin Hong Ali Payani Ashish Kundu Binghui Wang Yuan Hong | 2023/10/13 | |
OpBoost: a vertical federated tree boosting framework based on order-preserving desensitization | arXiv preprint arXiv:2210.01318 | Xiaochen Li Yuke Hu Weiran Liu Hanwen Feng Li Peng | 2022/10/4 |
A generalized framework for preserving both privacy and utility in data outsourcing | IEEE Transactions on Knowledge and Data Engineering | Shangyu Xie Meisam Mohammady Han Wang Lingyu Wang Jaideep Vaidya | 2023 |
LMO-DP: Accurately Fine-Tuning Language Models with Stronger Differential Privacy | Qin Yang Meisam Mohammady Han Wang Ali Payani Ashish Kundu | 2023/10/13 |