Follow
Haomiao Yang
Haomiao Yang
University of Electronic Science and Technology of China
No verified email
Title
Cited by
Cited by
Year
Efficient and privacy-enhanced federated learning for industrial artificial intelligence
M Hao, H Li, X Luo, G Xu, H Yang, S Liu
IEEE Transactions on Industrial Informatics 16 (10), 6532-6542, 2019
5922019
Identity-based authentication for cloud computing
H Li, Y Dai, L Tian, H Yang
Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009
4272009
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
H Li, X Lin, H Yang, X Liang, R Lu, X Shen
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053-2064, 2013
3692013
Towards efficient and privacy-preserving federated deep learning
M Hao, H Li, G Xu, S Liu, H Yang
ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019
2342019
Chronos: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage
Y Zhang, C Xu, N Cheng, H Li, H Yang, X Shen
IEEE Transactions on Services Computing 13 (2), 216-229, 2019
1142019
A practical and compatible cryptographic solution to ADS-B security
H Yang, Q Zhou, M Yao, R Lu, H Li, X Zhang
IEEE Internet of Things Journal 6 (2), 3322-3334, 2018
1022018
Lightweight and confidential data discovery and dissemination for wireless body area networks
D He, S Chan, Y Zhang, H Yang
IEEE journal of biomedical and health informatics 18 (2), 440-448, 2013
672013
An efficient and privacy-preserving disease risk prediction scheme for e-healthcare
X Yang, R Lu, J Shao, X Tang, H Yang
IEEE Internet of Things Journal 6 (2), 3284-3297, 2018
512018
Secure and Efficient k NN Classification for Industrial Internet of Things
H Yang, S Liang, J Ni, H Li, XS Shen
IEEE Internet of Things Journal 7 (11), 10945-10954, 2020
482020
Efficient public key encryption with revocable keyword search
Y Yu, J Ni, H Yang, Y Mu, W Susilo
Security and Communication Networks 7 (2), 466-472, 2014
442014
Using highly compressed gradients in federated learning for data reconstruction attacks
H Yang, M Ge, K Xiang, J Li
IEEE Transactions on Information Forensics and Security 18, 818-830, 2022
422022
Secure and distributed data discovery and dissemination in wireless sensor networks
D He, S Chan, M Guizani, H Yang, B Zhou
IEEE Transactions on Parallel and Distributed Systems 26 (4), 1129-1139, 2014
412014
AMA: Anonymous mutual authentication with traceability in carpooling systems
J Ni, K Zhang, X Lin, H Yang, XS Shen
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
402016
Secure and verifiable inference in deep neural networks
G Xu, H Li, H Ren, J Sun, S Xu, J Ning, H Yang, K Yang, RH Deng
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
382020
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data
Y Zheng, R Lu, B Li, J Shao, H Yang, KKR Choo
Information Sciences 498, 91-105, 2019
372019
A comprehensive overview of backdoor attacks in large language models within communication networks
H Yang, K Xiang, M Ge, H Li, R Lu, S Yu
IEEE Network, 2024
362024
Gradient leakage attacks in federated learning: Research frontiers, taxonomy and future directions
H Yang, M Ge, D Xue, K Xiang, H Li, R Lu
IEEE Network, 2023
362023
A new somewhat homomorphic encryption scheme over integers
HM Yang, Q Xia, X Wang, D Tang
2012 International Conference on Computer Distributed Control and …, 2012
352012
LHCSAS: A lightweight and highly-compatible solution for ADS-B security
H Yang, M Yao, Z Xu, B Liu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
342017
Achieving multi-authority access control with efficient attribute revocation in smart grid
D Liu, H Li, Y Yang, H Yang
2014 IEEE International Conference on Communications (ICC), 634-639, 2014
342014
The system can't perform the operation now. Try again later.
Articles 1–20