Yuan Hong

Yuan Hong

Illinois Institute of Technology

H-index: 23

North America-United States

About Yuan Hong

Yuan Hong, With an exceptional h-index of 23 and a recent h-index of 18 (since 2020), a distinguished researcher at Illinois Institute of Technology, specializes in the field of Differential Privacy, Applied Cryptography, Trustworthy AI, IoT Security.

His recent articles reflect a diverse array of research interests and contributions to the field:

PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents

Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks

Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks

DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks

Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response

Data poisoning attacks on traffic state estimation and prediction

Yuan Hong Information

University

Position

___

Citations(all)

1893

Citations(since 2020)

1244

Cited By

1027

hIndex(all)

23

hIndex(since 2020)

18

i10Index(all)

49

i10Index(since 2020)

32

Email

University Profile Page

Illinois Institute of Technology

Google Scholar

View Google Scholar Profile

Yuan Hong Skills & Research Interests

Differential Privacy

Applied Cryptography

Trustworthy AI

IoT Security

Top articles of Yuan Hong

Title

Journal

Author(s)

Publication Date

PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents

IEEE Transactions on Dependable and Secure Computing

Xinyu Zhang

Huiyu Xu

Zhongjie Ba

Zhibo Wang

Yuan Hong

...

2024/3/5

Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks

Sayedeh Leila Noorbakhsh

Binghui Zhang

Yuan Hong

Binghui Wang

2024/8

Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks

Caridad Arroyo Arevalo

Sayedeh Leila Noorbakhsh

Yun Dong

Yuan Hong

Binghui Wang

2024/2

DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming

Shuya Feng

Meisam Mohammady

Han Wang

Xiaochen Li

Zhan Qin

...

2024/5

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory

Xiaochen Li

Weiran Liu

Jian Lou

Yuan Hong

Lei Zhang

...

2024/2

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks

arXiv preprint arXiv:2307.16630

Xinyu Zhang

Hanbin Hong

Yuan Hong

Peng Huang

Binghui Wang

...

2023/7/31

Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response

Matta Varun

Shuya Feng

Han Wang

Shamik Sural

Yuan Hong

2024

Data poisoning attacks on traffic state estimation and prediction

Available at SSRN 4396123

Feilong Wang

Xin Wang

Yuan Hong

Xuegang Ban

2022/12/5

On the Faithfulness of Vision Transformer Explanations

arXiv preprint arXiv:2404.01415

Junyi Wu

Weitai Kang

Hao Tang

Yuan Hong

Yan Yan

2024/4/1

Fltracer: Accurate poisoning attack provenance in federated learning

arXiv preprint arXiv:2310.13424

Xinyu Zhang

Qingyu Liu

Zhongjie Ba

Yuan Hong

Tianhang Zheng

...

2023/10/20

Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records

Fereshteh Razmi

Jian Lou

Yuan Hong

Li Xiong

2023/9/17

Uniap: Protecting speech privacy with non-targeted universal adversarial perturbations

IEEE Transactions on Dependable and Secure Computing

Peng Cheng

Yuexin Wu

Yuan Hong

Zhongjie Ba

Feng Lin

...

2023/2/6

Dpod: differentially private outsourcing of anomaly detection

2023/8/31

Theoretically Understanding Data Reconstruction Leakage in Federated Learning

Zifan Wang

Binghui Zhang

Meng Pang

Yuan Hong

Binghui Wang

2023/10/13

Stealthy 3d poisoning attack on video recognition models

IEEE Transactions on Dependable and Secure Computing

Shangyu Xie

Yan Yan

Yuan Hong

2023

Infrastructure-Enabled Gps Spoofing Detection and Correction

IEEE Transactions on Intelligent Transportation Systems

Feilong Wang

Yuan Hong

Xuegang Ban

2023

Universally Amplifying Randomized Smoothing for Certified Robustness with Anisotropic Noise

Hanbin Hong

Ali Payani

Ashish Kundu

Binghui Wang

Yuan Hong

2023/10/13

OpBoost: a vertical federated tree boosting framework based on order-preserving desensitization

arXiv preprint arXiv:2210.01318

Xiaochen Li

Yuke Hu

Weiran Liu

Hanwen Feng

Li Peng

...

2022/10/4

A generalized framework for preserving both privacy and utility in data outsourcing

IEEE Transactions on Knowledge and Data Engineering

Shangyu Xie

Meisam Mohammady

Han Wang

Lingyu Wang

Jaideep Vaidya

...

2023

LMO-DP: Accurately Fine-Tuning Language Models with Stronger Differential Privacy

Qin Yang

Meisam Mohammady

Han Wang

Ali Payani

Ashish Kundu

...

2023/10/13

See List of Professors in Yuan Hong University(Illinois Institute of Technology)

Co-Authors

H-index: 52
Li Xiong

Li Xiong

Emory University

H-index: 48
Xuegang Ban

Xuegang Ban

University of Washington

H-index: 48
Jaideep Vaidya

Jaideep Vaidya

Rutgers, The State University of New Jersey

H-index: 46
Vijayalakshmi Atluri

Vijayalakshmi Atluri

Rutgers, The State University of New Jersey

H-index: 45
Lingyu Wang

Lingyu Wang

Concordia University

academic-engine