![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Jue Hong
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Yu Lin, Qizhi Zhang, Quanwei Cai, Jue Hong, Wu Ye, Huiqi Liu, Bing Duan:
An Inversion Attack Against Obfuscated Embedding Matrix in Language Model Inference. EMNLP 2024: 2100-2104 - 2023
- [c16]Yunlong Mao
, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong:
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. ESORICS (4) 2023: 23-43 - [i4]Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong:
Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. CoRR abs/2304.09515 (2023) - [i3]Xicong Shen, Yang Liu, Huiqi Liu, Jue Hong, Bing Duan, Zirui Huang, Yunlong Mao, Ye Wu, Di Wu:
A Split-and-Privatize Framework for Large Language Model Fine-Tuning. CoRR abs/2312.15603 (2023) - 2021
- [c15]Congming Wei, Chenhao Wu, Ximing Fu
, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. ICISC 2021: 195-216 - [i2]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2021: 732 (2021)
2010 – 2019
- 2019
- [c14]Kai He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Zhuxun Liang:
PrivC - A Framework for Efficient Secure Two-Party Computation. SecureComm (2) 2019: 394-407 - 2013
- [j4]Jue Hong
, Zhuo Li, Dianjie Lu, Sanglu Lu:
Sleeping Schedule-Aware Local Broadcast in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Yingpei Zeng, Jiannong Cao
, Jue Hong, Shigeng Zhang, Li Xie:
Secure localization and location verification in wireless sensor networks: a survey. J. Supercomput. 64(3): 685-701 (2013) - [c13]Jue Hong, Pavan Balaji, Gaojin Wen
, Bibo Tu, Junming Yan, Cheng-Zhong Xu
, Shengzhong Feng:
Container-Based Job Management for Fair Resource Sharing. ISC 2013: 290-301 - 2012
- [c12]Shucai Xiao, Pavan Balaji, James Dinan, Qian Zhu, Rajeev Thakur
, Susan Coghlan, Heshan Lin, Gaojin Wen
, Jue Hong, Wu-chun Feng:
Transparent Accelerator Migration in a Virtualized GPU Environment. CCGRID 2012: 124-131 - [c11]Nikos Tziritas, Samee Ullah Khan
, Cheng-Zhong Xu
, Jue Hong:
An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications. ICPADS 2012: 61-68 - [i1]Nikos Tziritas, Samee Ullah Khan, Cheng-Zhong Xu, Jue Hong:
An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications. CoRR abs/1206.6207 (2012) - 2011
- [c10]Gaojin Wen
, Jue Hong, Cheng-Zhong Xu
, Pavan Balaji, Shengzhong Feng, Pingchuang Jiang:
Energy-aware hierarchical scheduling of applications in large scale data centers. CDC 2011: 158-165 - [c9]Bin Tang, Baoliu Ye, Jue Hong, Kun You, Sanglu Lu:
Distributed Low Redundancy Broadcast for Uncoordinated Duty-Cycled WANETs. GLOBECOM 2011: 1-5 - [c8]Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, Sanglu Lu:
ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems. IMIS 2011: 100-105 - 2010
- [j2]Jue Hong, Jiannong Cao
, Wenzhong Li, Sanglu Lu, Daoxu Chen:
Minimum-Transmission Broadcast in Uncoordinated Duty-Cycled Wireless Ad Hoc Networks. IEEE Trans. Veh. Technol. 59(1): 307-318 (2010) - [c7]Yanchao Zhao, Wenzhong Li, Jue Hong, Zhuo Li, Sanglu Lu, Daoxu Chen:
On Handoff Minimization in Wireless Networks: From a Navigation Perspective. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c6]Jue Hong, Jiannong Cao
, Wenzhong Li, Sanglu Lu, Daoxu Chen:
Sleeping Schedule-Aware Minimum Latency Broadcast in Wireless Ad Hoc Networks. ICC 2009: 1-5 - [c5]Jue Hong, Jiannong Cao, Yingpei Zeng, Sanglu Lu, Daoxu Chen, Zhuo Li:
A Location-free Prediction-based Sleep Scheduling Protocol for Object Tracking in Sensor Networks. ICNP 2009: 63-72 - [c4]Yingpei Zeng, Jiannong Cao
, Jue Hong, Li Xie:
Secure localization and location verification in wireless sensor networks. MASS 2009: 864-869 - [c3]Yingpei Zeng, Jiannong Cao
, Jue Hong, Shigeng Zhang, Li Xie:
SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks. MASS 2009: 1054-1059 - 2008
- [j1]Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong Cao
:
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks. J. Comput. Sci. Technol. 23(6): 944-956 (2008) - [c2]Jue Hong, Sanglu Lu, Daoxu Chen, Jiannong Cao:
Towards Bio-Inspired Self-Organization in Sensor Networks: Applying the Ant Colony Algorithm. AINA 2008: 1054-1061 - [c1]Jue Hong, Wenzhong Li, Sanglu Lu, Jiannong Cao
, Daoxu Chen:
Sleeping Schedule Aware Minimum Transmission Broadcast in Wireless Ad Hoc Networks. ICPADS 2008: 399-406
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint