Recent Publications (full list)
(Student Advisee, * Equal Contribution)
2025 |
|
NDSS'25 |
Delay-allowed Differentially Private Data Stream Release Xiaochen Li, Zhan Qin, Kui Ren, Chen Gong, Shuya Feng, Yuan Hong and Tianhao Wang In Proceedings of the 2025 Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 23-28, 2025. [Acceptance Rate: TBD, PDF, Code] |
2024 |
|
NeurIPS'24 |
FedGMark: Certifiably Robust Watermarking for Federated Graph Learning Yuxin Yang, Qiang Li, Yuan Hong and Binghui Wang In Proceedings of the 38th Annual Conference on Neural Information Processing Systems (NeurIPS), Vancouver, BC, Canada, December 9-15, 2024. [Acceptance Rate: 25.8%, PDF, Code] |
CCS'24 |
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba and Yuan Hong In Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS), Salt Lake City, Utah, USA, October 14-18, 2024. [Acceptance Rate: 331/1964=16.9%, PDF, Code] |
CCS'24 |
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong and Binghui Wang In Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS), Salt Lake City, Utah, USA, October 14-18, 2024. [Distinguished Paper Award, Acceptance Rate: 331/1964=16.9%, PDF, Code] |
USENIX Security'24 |
An LLM-Assisted Easy-to-Trigger Poisoning Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim and Yuan Hong In Proceedings of the 33rd USENIX Security Symposium (USENIX Security), Philadelphia, PA, USA, August 14-16, 2024. [Acceptance Rate: 417/2276= 18.3%, PDF, Code] |
USENIX Security'24 |
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong and Binghui Wang In Proceedings of the 33rd USENIX Security Symposium (USENIX Security), Philadelphia, PA, USA, August 14-16, 2024. [Acceptance Rate: 417/2276= 18.3%, PDF, Code] |
S&P'24 |
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming Shuya Feng*, Meisam Mohammady*, Han Wang, Xiaochen Li, Zhan Qin and Yuan Hong In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P/Oakland), San Francisco, California, USA, May 22-25, 2024. [* Equal Contribution, Acceptance Rate: 202/1389=17.8%, PDF, Code] |
S&P'24 |
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks Xinyu Zhang, Hanbin Hong, Yuan Hong#, Peng Huang, Binghui Wang, Zhongjie Ba# and Kui Ren In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P/Oakland), San Francisco, California, USA, May 22-25, 2024. [# Corresponding Author(s), Acceptance Rate: 202/1389=17.8%, PDF, Code] |
CIKM'24 |
Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework
Yuxin Yang, Qiang Li, Chenfei Nie, Yuan Hong and Binghui Wang In Proceedings of the 33rd ACM International Conference on Information and Knowledge Management (CIKM), Boise, Idaho, USA, October 21-25, 2024. [Acceptance Rate: 347/1531=23%, PDF, Code] |
CVPR'24 |
On the Faithfulness of Vision Transformer Explanations Junyi Wu, Weitai Kang, Hao Tang, Yuan Hong and Yan Yan In Proceedings of the 41st IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR), Seattle, WA, USA, June 17-21, 2024. [Acceptance Rate: 2719/11532=23.6% , PDF, Code] |
SIGMOD'24 |
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin and Kui Ren In Proceedings of the 2024 ACM SIGMOD International Conference on Management of Data (SIGMOD), Santiago, Chile, June 9-15, 2024. [Acceptance Rate: 213/768=27.7%, PDF, Code] |
AAAI'24 |
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning Against Attribute Inference Attacks Caridad Arroyo Arevalo, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong and Binghui Wang In Proceedings of the 38th Annual AAAI Conference on Artificial Intelligence (AAAI), Vancouver, Canada, February 20-27, 2024. [Acceptance Rate: 2342/9862=23.75%, PDF, Code] |
CODASPY'24 |
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response Matta Varun, Shuya Feng, Han Wang, Shamik Sural and Yuan Hong In Proceedings of the 14th ACM Conference on Data and Application Security and Privacy (CODASPY), Porto, Portugal, June 19-21, 2024. [Acceptance Rate: 34/160=21.25%, PDF, Code] |
TR_C'24 |
Data Poisoning Attacks on Traffic State Estimation and Prediction
Feilong Wang, Xin Wang, Yuan Hong, Terry Rockafellar and Xuegang (Jeff) Ban Transportation Research Part C (TR_C), Accepted, 2024. [Impact Factor: 8.3] |
TIFS'24 |
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu and Kui Ren IEEE Transactions on Information Forensics and Security (TIFS), Accepted, 2024. [Impact Factor: 7.178, Code] |
TDSC'24 |
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents Xinyu Zhang, Huiyu Xu, Zhongjie Ba, Zhibo Wang, Yuan Hong, Jian Liu, Zhan Qin and Kui Ren IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted, 2024. [Impact Factor: 7.329, Code] |
Crypto ePrint |
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage Shuaishuai Li*, Weiran Liu*, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin and Yuan Hong Cryptology ePrint Archive. [* Equal Contribution, PDF, Code] |
TDSC'24 |
UniAP: Protecting Speech Privacy with Non-targeted Universal Adversarial Perturbations Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu and Kui Ren IEEE Transactions on Dependable and Secure Computing (TDSC), Vol 21(1), pages 31-46, 2024. [Impact Factor: 7.329, Demo] |
2023 |
|
ECML/PKDD'23 |
Interpretation Attacks on Interpretable Models with Electronic Health Records
Fereshteh Razmi, Jian Lou, Yuan Hong and Li Xiong In Proceedings of the 2023 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD), Turin, Italy, September 18-22, 2023. [Acceptance Rate: 199/830=24%, Code] |
VLDB'23 |
OpBoost: A Vertical Federated Tree Boosting Framework Based
on Order-Preserving Desensitization
Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren and Zhan Qin In Proceedings of the 49th International Conference on Very Large Data Bases (VLDB), Vancouver, CA, August 28-September 1, 2023. [Acceptance Rate: 266/1074=24.8%, PDF, Code] |
T-ITS'23 |
Infrastructure-enabled GPS Spoofing Detection and Correction Feilong Wang, Yuan Hong, and Xuegang (Jeff) Ban IEEE Transactions on Intelligent Transportation Systems (T-ITS), Vol 24(12), pp. 13878-13892, 2023. [Impact Factor: 9.551] |
TDSC'23 |
Stealthy 3D Poisoning Attack on Video Recognition Models Shangyu Xie, Yan Yan and Yuan Hong IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 20(2), pp. 1730-1743, 2023. [Impact Factor: 7.329] |
TKDE'23 |
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya and Yuan Hong IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 35(1), pp. 1-15, 2023. [Impact Factor: 6.977] |
2022 |
|
CCS'22 |
L-SRR: Local Differential Privacy for Location-Based
Services with Staircase Randomized Response
Han Wang, Hanbin Hong, Li Xiong, Zhan Qin and Yuan Hong In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, November 7-11, 2022. [Acceptance Rate: 218/972=22.4%, Direct Accept: 76/972=7.81%, PDF, Code] |
CCS-P'22 |
Poster: Cryptographic Inferences for Video Deep Neural Networks
Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding and Yuan Hong In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, November 7-11, 2022. [Poster, PDF] |
S&P'22 |
Universal 3-Dimensional Perturbations for Blackbox Attacks on Video Recognition Systems Shangyu Xie, Han Wang, Yu Kong and Yuan Hong In Proceedings of the 43rd IEEE Symposium on Security and Privacy (S&P/Oakland), San Francisco, California, USA, May 22-26, 2022. [Acceptance Rate: 147/1012=14.5%, PDF, Code] |
ECCV'22 |
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing
Hanbin Hong, Binghui Wang and Yuan Hong In Proceedings of the 17th European Conference on Computer Vision (ECCV), Tel Aviv, October 24-28, 2022. [Acceptance Rate: 1650/5803=28%, PDF, Code] |
KDD'22 |
A Model-Agnostic Approach to Differentially Private Topic Mining
Han Wang*, Jayashree Sharma*, Shuya Feng, Kai Shu and Yuan Hong In Proceedings of the 28th SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Washington D.C., August 14-18, 2022. [* Equal Contribution, Acceptance Rate: 254/1695=14.99%, PDF, Code] |
NAACL-W'22 |
Differentially Private Instance Encoding against Privacy Attacks Shangyu Xie and Yuan Hong In Proceedings of the 2022 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL) Student Research Workshop (SRW), Seattle, Washington, July 10-15, 2022. |
ICDE'22 |
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya and Yuan Hong In Proceedings of the 38th IEEE International Conference on Data Engineering (ICDE), (Virtual) Kuala Lumpur, Malaysia, May 9-12, 2022. [Poster] |
2021 |
|
EMNLP'21 |
Reconstruction Attack on Instance Encoding for Language Understanding Shangyu Xie and Yuan Hong In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP), Hybrid, November 7-11, 2021. [PDF] |
ICDCS'21 |
Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System Bingyu Liu, Yuanzhou Yang, Rujia Wang and Yuan Hong In Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS), Virtual, 2021. [Poster] |
ICASSP'21 |
Privacy-Preserving Cloud-based DNN Inference Shangyu Xie, Bingyu Liu and Yuan Hong In Proceedings of the 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, Canada, 2021. |
T-ITS'21 |
Dynamic Pricing for Electric Vehicle Extreme Fast Charging Cheng Fang, Haibing Lu, Yuan Hong, Shan Liu and Aichih (Jasmine) Chang IEEE Transactions on Intelligent Transportation Systems (T-ITS), Vol. 22(1), pp. 531-541, 2021. [Impact Factor: 9.551] |
TDSC'21 |
VTDP: Privately Sanitizing Fine-grained Vehicle Trajectory Data with Boosted Utility Bingyu Liu, Shangyu Xie, Han Wang, Yuan Hong, Xuegang Ban and Meisam Mohammady IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 18(6), pp. 2643-2657, 2021. [Impact Factor: 7.329] |
CYSE'21 |
Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System Bingyu Liu, Yuanzhou Yang, Rujia Wang and Yuan Hong Cybersecurity, 2021. [Impact Factor: 5.41] |
TOPS'21 |
A Multi-view Approach to Preserve Both Privacy and Utility in Network Trace Anonymization Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi ACM Transactions on Privacy and Security (TOPS), Vol. 24(3), pp. 1-36, 2021. |
2020 |
|
CCS'20 |
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS), Orlando, FL, November 9-13, 2020. [Acceptance Rate: 121/715=16.9%, PDF] |
CIKM'20 |
LogBug: Generating Adversarial System Logs in Real Time Jingyu Sun, Bingyu Liu and Yuan Hong In Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM), Galway, Ireland, October 19-23, 2020. [Acceptance Rate: 25.9%] |
PETS'20 |
VideoDP: A Flexible Platform for Video Analytics with Differential Privacy Han Wang, Shangyu Xie and Yuan Hong In Proceedings of the 20th Privacy Enhancing Technologies Symposium (PETS), Montreal, Canada, July 14-18, 2020. [Acceptance Rate: 78/338=23%, PDF] |
ICDCS'20 |
Privacy Preserving Distributed Energy Trading Shangyu Xie, Han Wang, Yuan Hong and My Thai In Proceedings of the 40th International Conference on Distributed Computing Systems (ICDCS), Singapore, July 8-10, 2020. [Acceptance Rate: 105/584=18%, PDF] |
AAMAS'20 |
Privacy-Aware Double Auction for Divisible Resources without a Mediator Bingyu Liu, Shangyu Xie and Yuan Hong In Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Auckland, New Zealand, May 9-13, 2020. |
EDBT'20 |
Publishing Video Data with Indistinguishable Objects Han Wang, Yuan Hong, Yu Kong and Jaideep Vaidya In Proceedings of the 23rd International Conference on Extending Database Technology (EDBT), Copenhagen, Denmark, March 30-April 2, 2020, pp. 323-334. [Acceptance Rate: 31/151=20.5%, PDF] |
ICPR'20 |
Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification Hanbin Hong, Wentao Bao, Yuan Hong and Yu Kong In Proceedings of the 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, January 14-18, 2021. |
TMIS'20 |
Algorithms and Applications to Weighted Rank-One Binary Matrix Factorization Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijay Atluri, Yuan Hong and Wei Huang ACM Transactions on Management Information Systems (TMIS), Vol. 11(2), Article No. 7, 2020. |
TIFS'20 |
PAIRING: Privately Balancing Multiparty Real-time Supply and Demand on the Power Grid Shangyu Xie, Yuan Hong and Peng-Jun Wan IEEE Transactions on Information Forensics and Security (TIFS), Vol. 15, pages 1114-1127, 2020. [Impact Factor: 7.178]. |
TDSC'20 |
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong and Xiaohua Jia IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 17(5), pages 1109-1123, 2020. [DOI, Impact Factor: 7.329] |
Oper. Res. |
A Distance Matrix Based Algorithm for Solving the Traveling Salesman Problem Weizhen Rao, Shengbin Wang and Yuan Hong Operational Research, 2020, Vol 20(3), pages 1505-1542, 2020. [DOI, Accepted in 2018] |
Tutorial |
Security, Privacy and Trust for Responsible Innovations and Governance Vijay Atluri, Yuan Hong and Soon Ae Chun In Proceedings of the 21st International Conference on Digital Government Research (DGO), Virtual, June 15-19, 2020. |
2018/19 |
|
ICCD'19 |
Imbalance-aware Scheduler for Fast and Secure Ring ORAM Data Retrieval Yuezhi Che, Yuan Hong and Rujia Wang In Proceedings of the 37th IEEE International Conference on Computer Design (ICCD), Abu Dhabi, UAE, Nov. 17-20, 2019, pp. 604-612. [Acceptance Rate: 23.8%] |
AAMAS'19 |
A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid Shangyu Xie, Yuan Hong and Peng-Jun Wan In Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Montreal, Canada, May 13-17, 2019. |
TIFS'19 |
LiveForen: Ensuring Live Forensic Integrity in the Cloud Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu and Yingjiu Li IEEE Transactions on Information Forensics and Security (TIFS), Vol. 14(10), pp. 2749-2764, 2019. [Impact Factor: 7.178] |
CCS'18 |
Preserving Both Privacy and Utility in Network Trace Anonymization Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, Oct 15-19, 2018, pages 459-474. [Acceptance Rate: 134/809=16.6%, PDF] |