Selected Publications (full list)

(Student Advisee)


Oakland'22            

Universal 3-Dimensional Perturbations for Blackbox Attacks on Video Recognition Systems
Shangyu Xie, Han Wang, Yu Kong and Yuan Hong
In Proceedings of the 43rd IEEE Symposium on Security and Privacy (Oakland), San Francisco, California, USA, May 22-26, 2022. [Acceptance Rate: 37/245=15.1% in the first review cycle]  


EMNLP'21          

Reconstruction Attack on Instance Encoding for Language Understanding
Shangyu Xie and Yuan Hong
In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP), Hybrid, November 7-11, 2021.

ICDCS'21          

Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System
Bingyu Liu, Yuanzhou Yang, Rujia Wang and Yuan Hong
In Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS), Virtual, 2021. [Poster]

ICASSP'21          

Privacy-Preserving Cloud-based DNN Inference
Shangyu Xie, Bingyu Liu and Yuan Hong
In Proceedings of the 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, Canada, 2021.  

TKDE'21          

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing
Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya and Yuan Hong
IEEE Transactions on Knowledge and Data Engineering (TKDE), 2021. [Impact Factor: 6.977]

T-ITS'21          

Dynamic Pricing for Electric Vehicle Extreme Fast Charging
Cheng Fang, Haibing Lu, Yuan Hong, Shan Liu and Aichih (Jasmine) Chang
IEEE Transactions on Intelligent Transportation Systems (T-ITS), Vol. 22(1), pp. 531-541, 2021. [Impact Factor: 6.492]

TDSC'21          

VTDP: Privately Sanitizing Fine-grained Vehicle Trajectory Data with Boosted Utility
Bingyu Liu, Shangyu Xie, Han Wang, Yuan Hong, Xuegang Ban and Meisam Mohammady
IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 18(6), pp. 2643-2657, 2021. [Impact Factor: 7.329]

CYSE'21          

Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System
Bingyu Liu, Yuanzhou Yang, Rujia Wang and Yuan Hong
Cybersecurity, 2021. [Impact Factor: 5.41]

TOPS'21          

A Multi-view Approach to Preserve Both Privacy and Utility in Network Trace Anonymization
Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi
ACM Transactions on Privacy and Security (TOPS), Vol. 24(3), pp. 1-36, 2021.


CCS'20          

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions
Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi
In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS), Orlando, FL, November 9-13, 2020. [Acceptance Rate: 121/715=16.9%]

CIKM'20          

LogBug: Generating Adversarial System Logs in Real Time
Jingyu Sun, Bingyu Liu and Yuan Hong
In Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM), Galway, Ireland, October 19-23, 2020. [Acceptance Rate: 25.9%]

PETS'20          

VideoDP: A Flexible Platform for Video Analytics with Differential Privacy
Han Wang, Shangyu Xie and Yuan Hong
In Proceedings of the 20th Privacy Enhancing Technologies Symposium (PETS), Montreal, Canada, July 14-18, 2020. [Acceptance Rate: 78/338=23%]

ICDCS'20          

Privacy Preserving Distributed Energy Trading
Shangyu Xie, Han Wang, Yuan Hong and My Thai
In Proceedings of the 40th International Conference on Distributed Computing Systems (ICDCS), Singapore, July 8-10, 2020. [Acceptance Rate: 105/584=18%]

AAMAS'20          

Privacy-Aware Double Auction for Divisible Resources without a Mediator
Bingyu Liu, Shangyu Xie and Yuan Hong
In Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Auckland, New Zealand, May 9-13, 2020.

EDBT'20          

Publishing Video Data with Indistinguishable Objects
Han Wang, Yuan Hong, Yu Kong and Jaideep Vaidya
In Proceedings of the 23rd International Conference on Extending Database Technology (EDBT), Copenhagen, Denmark, March 30-April 2, 2020, pp. 323-334. [Acceptance Rate: 31/151=20.5%]

ICPR'20          

Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification
Hanbin Hong, Wentao Bao, Yuan Hong and Yu Kong
In Proceedings of the 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, January 14-18, 2021. 

TMIS'20          

Algorithms and Applications to Weighted Rank-One Binary Matrix Factorization
Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijay Atluri, Yuan Hong and Wei Huang
ACM Transactions on Management Information Systems (TMIS), Vol. 11(2), Article No. 7, 2020.

TIFS'20          

PAIRING: Privately Balancing Multiparty Real-time Supply and Demand on the Power Grid
Shangyu Xie, Yuan Hong and Peng-Jun Wan
IEEE Transactions on Information Forensics and Security (TIFS), Vol. 15, pages 1114-1127, 2020. [Impact Factor: 7.178].

TDSC'20          

Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong and Xiaohua Jia
IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 17(5), pages 1109-1123, 2020. [DOI, Impact Factor: 7.329]

Oper. Res.               

A Distance Matrix Based Algorithm for Solving the Traveling Salesman Problem
Weizhen Rao, Shengbin Wang and Yuan Hong
Operational Research, 2020, Vol 20(3), pages 1505-1542, 2020. [DOI, Accepted in 2018]

Tutorial          

Security, Privacy and Trust for Responsible Innovations and Governance
Vijay Atluri, Yuan Hong and Soon Ae Chun
In Proceedings of the 21st International Conference on Digital Government Research (DGO), Virtual, June 15-19, 2020.


ICCD'19          

Imbalance-aware Scheduler for Fast and Secure Ring ORAM Data Retrieval
Yuezhi Che, Yuan Hong and Rujia Wang
In Proceedings of the 37th IEEE International Conference on Computer Design (ICCD), Abu Dhabi, UAE, Nov. 17-20, 2019, pp. 604-612. [Acceptance Rate: 23.8%]

AAMAS'19          

A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid
Shangyu Xie, Yuan Hong and Peng-Jun Wan
In Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Montreal, Canada, May 13-17, 2019. 

TIFS'19          

LiveForen: Ensuring Live Forensic Integrity in the Cloud
Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu and Yingjiu Li
IEEE Transactions on Information Forensics and Security (TIFS), Vol. 14(10), pp. 2749-2764, 2019. [Impact Factor: 7.178]


CCS'18          

Preserving Both Privacy and Utility in Network Trace Anonymization
Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi
In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, Oct 15-19, 2018, pages 459-474. [Acceptance Rate: 134/809=16.6%]

ICASSP'18          

Privacy Preserving and Collusion Resistant Energy Sharing
Yuan Hong, Han Wang, Shangyu Xie, Bingyu Liu
In Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'18), Calgary, Alberta, Canada, April 15-20, 2018, pages 6941-6945.


TIFS'17          

Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status
Yuan Hong, Wen Ming Liu and Lingyu Wang
IEEE Transactions on Information Forensics and Security (TIFS), Vol. 12(9), pp. 2227-2241, 2017. [Impact Factor: 7.178]

TEM'17          

On the Robust and Stable Flowshop Scheduling under Stochastic and Dynamic Disruptions
Feng Liu, Shengbin Wang, Yuan Hong and Xiaohang Yue
IEEE Transactions on Engineering Management (TEM), Vol. 64(4), pp. 539-553, 2017.

IJER'16          

An Efficient and Privacy Preserving Scheme for P2P Energy Exchange among Smart Microgrids
Yuan Hong, Sanjay Goel and Wen Ming Liu
International Journal of Energy Research (IJER), Vol. 40(3), pp. 313-331, 2016. [Impact Factor: 3.741]

WI'16          

Accurate and Efficient Query Clustering via Top Ranked Search Results
Yuan Hong, Jaideep Vaidya, Haibing Lu, Wen Ming Liu
Web Intelligence (WI), Vol. 14(2), pp. 119-138, 2016.

TDSC'15              

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras and Sanjay Goel
IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 12(5), pp. 504-518, 2015. [PDF, Impact Factor: 7.329]

JCS'15          

Towards User-Oriented RBAC Model
Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar
Journal of Computer Security (JCS), Vol. 23(1), pp. 107-129, 2015, IOS Press. [PDF]

OPTL'14          

An Inference-proof Approach to Privacy-preserving Horizontally Partitioned Linear Programs
Yuan Hong and Jaideep Vaidya
Optimization Letters (OPTL), Vol. 8(1), pp. 267-277, 2014, Springer-Verlag. [PDF]

WI'13          

Differentially Private Naive Bayes Classification
Jaideep Vaidya, Anirban Basu, Basit Shafiq and Yuan Hong
In Proceedings of the 12th IEEE/WIC/ACM International Conference on Web Intelligence (WI), Nov. 17-20, 2013, Atlanta, GA, USA. [PDF, Page 571-576, IEEE]

EDBT'12          

Differentially Private Search Log Sanitization with Optimal Output Utility
Yuan Hong, Jaideep Vaidya, Haibing Lu and Mingrui Wu
In Proceedings of the 15th International Conference on Extending Database Technology (EDBT), March 26-30, 2012, Berlin, Germany. [Acceptance Rate: 22.5%, PDF, Page 50-61, ACM]

TDSC'12          

Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri and Yuan Hong
IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Data & Application Security, Vol. 9(5), pp. 655-669, 2012, IEEE Computer Society. [PDF, Impact Factor: 7.329]

JCS'12          

Secure and Efficient Distributed Linear Programming
Yuan Hong, Jaideep Vaidya and Haibing Lu
Journal of Computer Security (JCS), Vol. 20(5), pp. 583-634, 2012, IOS Press. [PDF]

WI'11          

Search Engine Query Clustering using Top-k Search Results
Yuan Hong, Jaideep Vaidya and Haibing Lu
In Proceedings of the 10th IEEE/WIC/ACM International Conference on Web Intelligence (WI), August 22-27, 2011, Lyon, France. [Acceptance Rate: 20.5%]

CIKM'09          

Effective Anonymization of Query Logs
Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil Adam and Vijayalakshmi Atluri
In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), November 2-6, 2009, Hong Kong, China. [Acceptance Rate: 20.2%]

ICDM'09          

Extended Boolean Matrix Decomposition
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri and Yuan Hong
In Proceedings of the 2009 International Conference on Data Mining (ICDM), December 6-9, 2009, Miami, Florida, USA. [Acceptance Rate: 8.9%]