Web Analytics

Address: 371 Fairfield Way
Unit 4155, Storrs, CT 06269

Office: ITE-265
Email: yuan.hong AT uconn.edu

Short Bio

Dr. Yuan Hong is an Associate Professor in the Department of Computer Science & Engineering at University of Connecticut (UConn) and affiliated with the Connecticut Advanced Computing Center (CACC). Prior to joining UConn in 2022, he was an Assistant Professor in Computer Science and Cybersecurity Program Director at Illinois Institute of Technology. He received his Ph.D degree from Rutgers University, M.Sc degree from Concordia University, Montreal, Canada, and B.Sc degree from Beijing Institute of Technology, respectively. He is a recipient of the NSF CAREER Award, Cisco Research Award, and the finalist of the Meta Research Award. He also received a National Physics Olympiad Prize in China. His research focuses on Differential Privacy (both theory and applications), Secure Multiparty Computation (applied cryptography), Machine Learning Security and Privacy (both attacks and defenses), and Cyber-Physical Systems Security and Privacy (IoT and V2X). His research works are published in top CS venues, such as S&P/Oakland, CCS, PETS, KDD, ECCV, EMNLP, VLDB, ICDE, EDBT, AAMAS, CIKM, ICDCS, TDSC, TIFS, TOPS and TKDE.

We are always looking for postdocs, Ph.D. students, visiting scholars/students, and undergraduate researchers. Please email your application materials to Dr. Yuan Hong if you are interested in our research.

UConn@CSRankings: Security & Crypto (32nd), Overall (65th)


  • [Major Security and AI/ML Conference TPC/SPC in 2023] CCS'23, USENIX Security'23, PETS'23, AsiaCCS'23, RAID'23, AAAI'23, AAMAS'23, Web'23 (Security Track), CVPR'23, etc.
  • [01/2023] Our work on IoT speech privacy with non-targeted universal adversarial perturbations is accepted to TDSC. Congrats!
  • [10/2022] Congrats to Hanbin on receiving the Synchrony Fellowship (very grateful to Synchrony and CACC for the generous support)
  • [10/2022] Congrats to Dr. Shangyu Xie on successfully defending his Ph.D. dissertation on Trustworthy Multi-Agent and Machine Learning Systems. He will join Amazon as a Research Scientist!
  • [10/2022] Yuan will teach CSE 4400/5400 Computer Security in Spring 2023
  • [10/2022] Congrats to Han, Hanbin and Bingyu on receiving the CCS'22 Student Travel Award (very grateful to CCS'22 for the generous support)
  • [09/2022] Our work on order-preserving desensitization for vertical federated tree boosting is accepted to VLDB'23 (Acceptance Rate: TBD). Congrats!
  • [09/2022] Our work on cryptographic systems for video inference (Crypto3D) is accepted to the poster track of CCS'22. Congrats, Bingyu!
  • [08/2022] Yuan will be advising the CSE Senior Design in the Academic Year 2022-2023
  • [07/2022] Our paper on the new staircase randomized response mechanism (ensuring LDP for Location-Based Services) is accepted to CCS'22 (Acceptance Rate: 22.4%, Direct Accept: 7.81%). Congrats, Han and Hanbin!
  • [07/2022] Our paper on universal certified robustness against any p-norm perturbations is accepted to ECCV'22. Congrats, Hanbin!
  • [06/2022] After working at Illinois Tech for five wonderful years (and commuting between Chicago and New England), Yuan and DataSec Lab will move to the CSE Department at the University of Connecticut. Thanks everyone at Illinois Tech!
  • [05/2022] A model-agnostic approach to differentially private topic mining is accepted to KDD'22 (Acceptance Rate: 14.99%). Congrats, Han, Jayashree and Shuya
  • [05/2022] The preliminary result of differentially private instance encoding is accepted to NAACL-SRW'22. Congrats, Shangyu
  • [04/2022] Kai and Yuan received the Cisco Research Award on Explainable AI with Fairness and Privacy (very grateful to Cisco for the generous support)
  • [03/2022] A paper on video data poisoning attack is accepted to TDSC. Congrats, Shangyu
  • [03/2022] Meisam will join the Department of Computer Science at Iowa State University as a Tenure-Track Assistant Professor. Congrats!

Research Areas and Recent/Selected Publications (source codes will be available on the publications page)

  • Differential Privacy
    • Local Differential Privacy: Staircase Randomized Response [CCS'22], Distance-based LDP for Vertifical Federated Tree Boosting [VLDB'23]
    • Optimal DP Mechanism Design (DP Theory): R2DP [CCS'20]
    • DP for Unstructured Data: Videos (VideoDP [PETS'20], Indistinguishable Objects [EDBT'20]), Query Log/Textual Data (Optimal Sampling [EDBT'12], Collaborative Sampling [TDSC'15], Topic Mining with DP [KDD'22]), Correlated Trajectories [TDSC'20]
    • DP for DM/ML: DP-NBC [WI'13]
  • Secure Multiparty Computation (MPC) and Cryptosystems
    • CryptoDNN: Crypto3D [CCS'22-P]
    • Property-Preserving Encryption: Multi-view Network Traces [CCS'18, TOPS'21], Inference-Proof Data Outsourcing [ICDE'22, TKDE'21]
    • Cloud Privacy and Integrity: PROUD [ICASSP'21], LiveForen [TIFS'19]
    • MPC Acceleration: Scheduling for Ring ORAM [ICCD'19]
  • Trustworthy Machine Learning: Security/Robustness, Privacy and Fairness
    • ML Security Attacks: U3D on Video DNN [S&P'22], Data Poisoning on Video DNN [TDSC'22], LogBug [CIKM'20]
    • ML Privacy Attacks: Attacking Instance Encoding for NLP [EMNLP'21]
    • ML Security Defenses (Empirical Methods): against Gradient-based Attacks [preprint]
    • ML Certified Robustness: Universal Certified Robustness [ECCV'22], Anisotropic Certified Robustness [preprint]
    • ML Privacy Defenses: see Differential Privacy and Secure Multiparty Computation
    • ML for Privacy: Privacy Attribute Identification [ICPR'20]
  • Cyber-Physical Systems Security and Privacy
    • IoT Speech Privacy [TDSC'23]
    • ITS and V2X: Vehicle Trajectory Data Sanitization [TDSC'21], Dynamic Pricing for Electric Vehicles [T-ITS'21], GPS Spoofing Detection and Correction [Online]
    • MPC for Multi-Agent Systems in the Smart Grid: Private Double Auction for Energy (TEE-Blockchain) [ICDCS'21], Distributed Energy Trading [ICDCS'20], Private Double Auction for Energy (MPC) [AAMAS'20], Distributed Load Balancing (Privacy and Integrity) [AAMAS'19, TIFS'20], Private Energy Exchanging [ICASSP'18]
    • Private Smart Meter Streaming against Inference Attacks [TIFS'17]
  • Optimization


  • Computer Security: Spring 23
  • CSE Design Project: 2022-2023
  • Cryptography: Spring 21, Spring 20
  • Data Privacy and Security: Fall 21, Fall 20, Spring 19, Spring 18
  • Database Organization: Spring 22, Fall 19, Fall 18, Fall 17
  • Doctoral Seminar: Spring 18
  • Earlier Teaching: Cybercrime Investigation, E-Discovery Forensics, Computer Network