default search action
Haomiao Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang, Haomiao Yang:
Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions. Int. J. Netw. Manag. 35(1) (2025) - 2024
- [j32]Tao Chen, Xiaofen Wang, Hong-Ning Dai, Haomiao Yang:
A Dropout-Tolerated Privacy-Preserving Method for Decentralized Crowdsourced Federated Learning. IEEE Internet Things J. 11(2): 1788-1799 (2024) - [j31]Haomiao Yang, Mengyu Ge, Dongyun Xue, Kunlan Xiang, Hongwei Li, Rongxing Lu:
Gradient Leakage Attacks in Federated Learning: Research Frontiers, Taxonomy, and Future Directions. IEEE Netw. 38(2): 247-254 (2024) - [j30]Haomiao Yang, Kunlan Xiang, Mengyu Ge, Hongwei Li, Rongxing Lu, Shui Yu:
A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks. IEEE Netw. 38(6): 211-218 (2024) - [j29]Yilong Huang, Fan Fan, Chaofeng Huang, Haomiao Yang, Min Gu:
MA-DG: Learning Features of Sequences in Different Dimensions for Min-Entropy Evaluation via 2D-CNN and Multi-Head Self-Attention. IEEE Trans. Inf. Forensics Secur. 19: 7879-7894 (2024) - [j28]Yanzhi Ren, Siyi Li, Chen Chen, Hongbo Liu, Jiadi Yu, Yingying Chen, Haomiao Yang, Hongwei Li:
Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors. IEEE Trans. Mob. Comput. 23(5): 5310-5326 (2024) - [c30]Limin Liu, Hongbo Liu, Yicong Du, Ziyu Shao, Haomiao Yang, Yanzhi Ren:
Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination. ICDCS 2024: 1272-1282 - [c29]Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang:
Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning. USENIX Security Symposium 2024 - [i3]Wenbo Jiang, Rui Zhang, Hongwei Li, Xiaoyuan Liu, Haomiao Yang, Shui Yu:
DDFAD: Dataset Distillation Framework for Audio Data. CoRR abs/2407.10446 (2024) - 2023
- [j27]Xiaopeng Yu, Jie Feng, Wei Zhao, Haomiao Yang, Dianhua Tang:
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator. Peer Peer Netw. Appl. 16(5): 2242-2255 (2023) - [j26]Haomiao Yang, Mengyu Ge, Kunlan Xiang, Xuejun Bai, Hongwei Li:
FedVAE: Communication-Efficient Federated Learning With Non-IID Private Data. IEEE Syst. J. 17(3): 4798-4808 (2023) - [j25]Haomiao Yang, Mengyu Ge, Kunlan Xiang, Jingwei Li:
Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks. IEEE Trans. Inf. Forensics Secur. 18: 818-830 (2023) - [c28]Dongyun Xue, Haomiao Yang, Mengyu Ge, Jingwei Li, Guowen Xu, Hongwei Li:
Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients. INFOCOM 2023: 1-10 - [i2]Haomiao Yang, Kunlan Xiang, Hongwei Li, Rongxing Lu:
A Comprehensive Overview of Backdoor Attacks in Large Language Models within Communication Networks. CoRR abs/2308.14367 (2023) - 2022
- [j24]Haomiao Yang, Shaopeng Liang, Xizhao Luo, Dianhua Tang, Hongwei Li, Xuemin Shen:
PIPC: Privacy- and Integrity-Preserving Clustering Analysis for Load Profiling in Smart Grids. IEEE Internet Things J. 9(13): 10851-10861 (2022) - [c27]Yu Wang, Haomiao Yang, Jiasheng Li, Mengyu Ge:
A Pragmatic Label-Specific Backdoor Attack. FCS 2022: 149-162 - [c26]Ruiheng Lu, Xiaofen Wang, Mengyu Ge, Jiasheng Li, Haomiao Yang:
Secure SVM Services with Multiple Service Providers and Subscribers in the Cloud. HPCC/DSS/SmartCity/DependSys 2022: 1473-1479 - [c25]Mengyu Ge, Haomiao Yang, Xian Ming, Kunlan Xiang:
A Predictive Model of COVID-19 mRNA Vaccine Reactivity based on Dual Attention for Federated Learning Scenarios. HPCC/DSS/SmartCity/DependSys 2022: 1480-1486 - [c24]Dongwen Chai, Xiaofen Wang, Xiaosong Zhang, Haomiao Yang, Tao Chen:
An intrusion detection system based on multiple interpretation methods. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1304-1309 - 2021
- [j23]Haomiao Yang, Shaopeng Liang, Yi Zhang, Xiong Li:
Cloud-based privacy- and integrity-protecting density peaks clustering. Future Gener. Comput. Syst. 125: 758-769 (2021) - [j22]Ziqing Wang, Dianhua Tang, Haomiao Yang, Fagen Li:
A public key encryption scheme based on a new variant of LWE with small cipher size. J. Syst. Archit. 117: 102165 (2021) - [j21]Haomiao Yang, Qixian Zhou, Dongxiao Liu, Hongwei Li, Xuemin Shen:
AEALV: Accurate and Efficient Aircraft Location Verification for ADS-B. IEEE Trans. Cogn. Commun. Netw. 7(4): 1399-1411 (2021) - [c23]Miao He, Xiangman Li, Jianbing Ni, Haomiao Yang:
Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks. PST 2021: 1-10 - 2020
- [j20]Haomiao Yang, Shaopeng Liang, Jianbing Ni, Hongwei Li, Xuemin Sherman Shen:
Secure and Efficient k NN Classification for Industrial Internet of Things. IEEE Internet Things J. 7(11): 10945-10954 (2020) - [j19]Meng Hao, Hongwei Li, Xizhao Luo, Guowen Xu, Haomiao Yang, Sen Liu:
Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence. IEEE Trans. Ind. Informatics 16(10): 6532-6542 (2020) - [j18]Yuan Zhang, Chunxiang Xu, Nan Cheng, Hongwei Li, Haomiao Yang, Xuemin Shen:
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage. IEEE Trans. Serv. Comput. 13(2): 216-229 (2020) - [j17]Haomiao Yang, Qixian Zhou, Jianbing Ni, Hongwei Li, Xuemin Shen:
Accurate Image-Based Pedestrian Detection With Privacy Preservation. IEEE Trans. Veh. Technol. 69(12): 14494-14509 (2020) - [c22]Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng:
Secure and Verifiable Inference in Deep Neural Networks. ACSAC 2020: 784-797 - [c21]Shaopeng Liang, Haomiao Yang, Qixian Zhou, Minglu Zhang:
Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm. FCS 2020: 538-552 - [c20]Haomiao Yang, Shaopeng Liang, Qixian Zhou, Hongwei Li:
Privacy-preserving HE-based clustering for load profiling over encrypted smart meter data. ICC 2020: 1-6 - [c19]Miao He, Jianbing Ni, Dongxiao Liu, Haomiao Yang, Xuemin Shen:
Private, Fair, and Verifiable Aggregate Statistics for Mobile Crowdsensing in Blockchain Era. ICCC 2020: 160-165 - [c18]Minglu Zhang, Qixian Zhou, Shaopeng Liang, Haomiao Yang:
Improving Communication Efficiency for Encrypted Distributed Training. SPDE 2020: 577-590 - [c17]Wenbo Jiang, Hongwei Li, Li Gong, Haomiao Yang, Rongxing Lu:
Accelerating Poisoning Attack Through Momentum and Adam Algorithms. VTC Fall 2020: 1-6 - [i1]Miao He, Jianbing Ni, Dongxiao Liu, Haomiao Yang, Xuemin Shen:
Private, Fair, and Verifiable Aggregate Statistics for Mobile Crowdsensing in Blockchain Era. CoRR abs/2007.09698 (2020)
2010 – 2019
- 2019
- [j16]Seunghan Lee, Saurabh Jain, Yifei Yuan, Yinwei Zhang, Haomiao Yang, Jian Liu, Young-Jun Son:
Design and development of a DDDAMS-based border surveillance system via UVs and hybrid simulations. Expert Syst. Appl. 128: 109-123 (2019) - [j15]Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Haomiao Yang:
An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare. IEEE Internet Things J. 6(2): 3284-3297 (2019) - [j14]Haomiao Yang, Qixian Zhou, Mingxuan Yao, Rongxing Lu, Hongwei Li, Xiaosong Zhang:
A Practical and Compatible Cryptographic Solution to ADS-B Security. IEEE Internet Things J. 6(2): 3322-3334 (2019) - [j13]Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo:
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498: 91-105 (2019) - [j12]Haomiao Yang, Xiaofen Wang, Chun Yang, Xin Cong, You Zhang:
Securing content-centric networks with content-based encryption. J. Netw. Comput. Appl. 128: 21-32 (2019) - [j11]Yong Yu, Huilin Li, Ruonan Chen, Yanqi Zhao, Haomiao Yang, Xiaojiang Du:
Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning. IEEE Netw. 33(3): 82-87 (2019) - [c16]Meng Hao, Hongwei Li, Guowen Xu, Sen Liu, Haomiao Yang:
Towards Efficient and Privacy-Preserving Federated Deep Learning. ICC 2019: 1-6 - [c15]Yuan Zhang, Chunxiang Xu, Hongwei Li, Haomiao Yang, Xuemin Sherman Shen:
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain. ICC 2019: 1-6 - 2018
- [c14]Haomiao Yang, Weichao He, Qixian Zhou, Hongwei Li:
Efficient and Secure Outsourced Linear Regression. ICA3PP (3) 2018: 89-102 - [c13]Haomiao Yang, Weichao He, Jie Li, Hongwei Li:
Efficient and Secure kNN Classification over Encrypted Data Using Vector Homomorphic Encryption. ICC 2018: 1-7 - [c12]Guowen Xu, Hongwei Li, Wenlei Wang, Yue Chen, Haomiao Yang, Yanzhi Ren:
Towards practical personalized recommendation with multi-level differential privacy controls. INFOCOM Workshops 2018: 796-801 - [c11]Xiaoxia Zheng, Haomiao Yang, Bin Tang:
An Improved Characters Recognition Approach Using Fast Determinant Recursion. MASS 2018: 491-494 - 2017
- [c10]Haomiao Yang, Mingxuan Yao, Zili Xu, Baoshu Liu:
LHCSAS: A Lightweight and Highly-Compatible Solution for ADS-B Security. GLOBECOM 2017: 1-7 - [c9]Yunfan Huang, Haomiao Yang, Mengxi Nie, Honggang Wu:
Image Feature Extraction with Homomorphic Encryption on Integer Vector. ICMLSC 2017: 111-116 - [c8]Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang:
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. ISPEC 2017: 102-117 - 2016
- [j10]Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang, Xiaosong Zhang:
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds. Concurr. Comput. Pract. Exp. 28(10): 2877-2888 (2016) - [j9]Hongwei Li, Kun Jia, Haomiao Yang, Dongxiao Liu, Liang Zhou:
Practical blacklist-based anonymous authentication scheme for mobile crowd sensing. Peer-to-Peer Netw. Appl. 9(4): 762-773 (2016) - [c7]Jianbing Ni, Kuan Zhang, Xiaodong Lin, Haomiao Yang, Xuemin Sherman Shen:
AMA: Anonymous mutual authentication with traceability in carpooling systems. ICC 2016: 1-6 - 2015
- [j8]Hongwei Li, Yi Yang, Haomiao Yang, Mi Wen:
Achieving efficient and privacy-preserving multi-feature search for mobile sensing. Comput. Commun. 65: 35-42 (2015) - [j7]Haomiao Yang, Hyunsung Kim, Kambombo Mtonga:
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw. Appl. 8(6): 1059-1069 (2015) - [j6]Daojing He, Sammy Chan, Mohsen Guizani, Haomiao Yang, Boyang Zhou:
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 1129-1139 (2015) - [c6]Haomiao Yang, Mingyang Li, Jiali Han, Heping Chen, Biao Zhang, Jian Liu:
Statistical modeling of heterogeneous robotic assembly time with Weibull regression. ROBIO 2015: 710-714 - 2014
- [j5]Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo:
Efficient public key encryption with revocable keyword search. Secur. Commun. Networks 7(2): 466-472 (2014) - [j4]Daojing He, Sammy Chan, Yan Zhang, Haomiao Yang:
Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks. IEEE J. Biomed. Health Informatics 18(2): 440-448 (2014) - [j3]Hongwei Li, Xiaodong Lin, Haomiao Yang, Xiaohui Liang, Rongxing Lu, Xuemin Shen:
EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Trans. Parallel Distributed Syst. 25(8): 2053-2064 (2014) - [c5]Dongxiao Liu, Hongwei Li, Yi Yang, Haomiao Yang:
Achieving Multi-Authority Access Control with Efficient Attribute Revocation in smart grid. ICC 2014: 634-639 - 2013
- [j2]Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Somewhat HE scheme over Integers and Its Variation. KSII Trans. Internet Inf. Syst. 7(10): 2497-2513 (2013) - [j1]Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages. KSII Trans. Internet Inf. Syst. 7(10): 2544-2560 (2013) - [c4]Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang:
ADS-B Data Authentication Based on AH Protocol. DASC 2013: 21-24 - [c3]Kambombo Mtonga, Haomiao Yang, Eunjun Yoon, Hyunsung Kim:
Identity-Based Privacy Preservation Framework over u-Healthcare System. MUE 2013: 203-210 - [c2]Haomiao Yang, Hyunsung Kim, Dianhua Tang:
Attack on Recent Homomorphic Encryption Scheme over Integers. MUE 2013: 269-275
2000 – 2009
- 2009
- [c1]Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang:
Identity-Based Authentication for Cloud Computing. CloudCom 2009: 157-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint