default search action
Yi Zhao 0011
Person information
- affiliation: Tsinghua University, Department of Computer Science and Technology, China
Other persons with the same name
- Yi Zhao — disambiguation page
- Yi Zhao 0001 — University of Southampton, UK
- Yi Zhao 0002 — Shenzhen University, College of Mathematics and Statistics, China (and 1 more)
- Yi Zhao 0003 — Marvell Semiconductor, Santa Clara, CA, USA (and 1 more)
- Yi Zhao 0004 — Ohio State University, Columbus, OH, USA (and 1 more)
- Yi Zhao 0005 — Georgia State University, Department of Mathematics and Statistics, Atlanta, GA, USA
- Yi Zhao 0006 — University of Tokyo, Department of Electrical Engineering and Information Systems, Japan
- Yi Zhao 0007 — Harbin Institute of Technology, Shenzhen Graduate School, College of Science, China (and 1 more)
- Yi Zhao 0008 — Xiamen University, Department of Chemistry, China
- Yi Zhao 0009 — Hohai University, Department of Geomatics Engineering, Nanjing, China
- Yi Zhao 0010 — Beijing University of Chemical Technology, Beijing Key Laboratory for Health Monitoring and Self-Recovery of High End Mechanical Equipment, China
- Yi Zhao 0012 — University of Bonn, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Hang Liu, Yang Ming, Chenhao Wang, Yi Zhao, Songnian Zhang, Rongxing Lu:
Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things. Future Gener. Comput. Syst. 153: 97-112 (2024) - [j29]Yang Ming, Hang Liu, Chenhao Wang, Yi Zhao:
Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage. IEEE Trans. Cloud Comput. 12(2): 405-418 (2024) - [j28]Hang Liu, Yang Ming, Chenhao Wang, Yi Zhao:
Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs. IEEE Trans. Inf. Forensics Secur. 19: 9582-9597 (2024) - [j27]Guangmeng Zhou, Qi Li, Yang Liu, Yi Zhao, Qi Tan, Su Yao, Ke Xu:
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning. IEEE/ACM Trans. Netw. 32(3): 1873-1887 (2024) - [c14]Jiazhi Guan, Yi Zhao, Zhuoer Xu, Changhua Meng, Ke Xu, Youjian Zhao:
Adversarial Robust Safeguard for Evading Deep Facial Manipulation. AAAI 2024: 118-126 - [c13]Yi Zhao, Liang Lv, Yusen Li, Meng Shen, Liehuang Zhu, Ke Xu:
Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers. IWQoS 2024: 1-10 - [c12]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. USENIX Security Symposium 2024 - [i5]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. CoRR abs/2403.01268 (2024) - [i4]Ke Wang, Tianyu Xia, Zhangxuan Gu, Yi Zhao, Shuheng Shen, Changhua Meng, Weiqiang Wang, Ke Xu:
E-ANT: A Large-Scale Dataset for Efficient Automatic GUI NavigaTion. CoRR abs/2406.14250 (2024) - 2023
- [j26]Haibin Li, Yi Zhao, Wenbing Yao, Ke Xu, Qi Li:
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction. Sci. China Inf. Sci. 66(5) (2023) - [j25]Huihong Wei, Yi Zhao, Ke Xu:
G-Routing: Graph Neural Networks-Based Flexible Online Routing. IEEE Netw. 37(4): 90-96 (2023) - [j24]Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j23]Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j22]Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, Ke Xu:
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems. IEEE Trans. Inf. Forensics Secur. 18: 4561-4576 (2023) - [j21]Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu:
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework. IEEE/ACM Trans. Netw. 31(2): 542-557 (2023) - [c11]Hang Liu, Yang Ming, Chenhao Wang, Yi Zhao:
Identity-Based Proxy Re-encryption Based on SM9. Inscrypt (1) 2023: 320-339 - [c10]Yi Zhao, Ningping Mou, Yunjie Ge, Qian Wang:
Improving Adversarial Transferability with Ghost Samples. ECAI 2023: 3107-3114 - 2022
- [j20]Yi Zhao, Ke Xu, Qi Li, Haiyang Wang, Dan Wang, Min Zhu:
Intelligent networking in adversarial environment: challenges and opportunities. Sci. China Inf. Sci. 65(7): 1-11 (2022) - [j19]Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:
Practical algorithm substitution attack on extractable signatures. Des. Codes Cryptogr. 90(4): 921-937 (2022) - [j18]Yang Ming, Chenhao Wang, Hang Liu, Yi Zhao, Jie Feng, Ning Zhang, Weisong Shi:
Blockchain-Enabled Efficient Dynamic Cross-Domain Deduplication in Edge Computing. IEEE Internet Things J. 9(17): 15639-15656 (2022) - [j17]Yi Zhao, Ke Xu, Jiahui Chen, Qi Tan:
Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges. IEEE Netw. 36(5): 98-105 (2022) - [j16]Yang Ming, Yabin Li, Yi Zhao, Pengfei Yang:
Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid. Secur. Commun. Networks 2022: 5895176:1-5895176:18 (2022) - [c9]Yi Zhao, Qi Tan, Xiaohua Xu, Hui Su, Dan Wang, Ke Xu:
Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective. IWQoS 2022: 1-11 - [i3]Jiahui Chen, Yi Zhao, Qi Li, Ke Xu:
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage. CoRR abs/2210.04052 (2022) - 2021
- [j15]Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Meina Qiao, Haobin Shi:
MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities. IEEE Internet Things J. 8(23): 16933-16945 (2021) - [j14]Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Ruoxi Jia:
Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services. IEEE Netw. 35(1): 163-169 (2021) - [j13]Rui Zhang, Xuelong Li, Tong Wu, Yi Zhao:
Data Clustering via Uncorrelated Ridge Regression. IEEE Trans. Neural Networks Learn. Syst. 32(1): 450-456 (2021) - [c8]Yang Liu, Yi Zhao, Guangmeng Zhou, Ke Xu:
FedPrune: Personalized and Communication-Efficient Federated Learning on Non-IID Data. ICONIP (5) 2021: 430-437 - [i2]Guangmeng Zhou, Ke Xu, Qi Li, Yang Liu, Yi Zhao:
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning. CoRR abs/2106.14126 (2021) - 2020
- [j12]Yi Zhao, Ke Xu, Yifeng Zhong, Xiangyang Li, Ning Wang, Hui Su, Meng Shen, Ziwei Li:
Incentive mechanisms for mobile data offloading through operator-owned WiFi access points. Comput. Networks 174: 107226 (2020) - [j11]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j10]Meijuan Huang, Bo Yang, Yi Zhao, Xin Wang, Yanwei Zhou, Zhe Xia:
A generic construction of CCA-secure deterministic encryption. Inf. Process. Lett. 154 (2020) - [j9]Yi Zhao, Haiyang Wang, Hui Su, Liang Zhang, Rui Zhang, Dan Wang, Ke Xu:
Understand Love of Variety in Wireless Data Market Under Sponsored Data Plans. IEEE J. Sel. Areas Commun. 38(4): 766-781 (2020) - [j8]Qin Zou, Yanling Wang, Qian Wang, Yi Zhao, Qingquan Li:
Deep Learning-Based Gait Recognition Using Smartphones in the Wild. IEEE Trans. Inf. Forensics Secur. 15: 3197-3212 (2020) - [c7]Yi Zhao, Ke Xu, Feng Yan, Yuchao Zhang, Yao Fu, Haiyang Wang:
Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks. ICC 2020: 1-6 - [c6]Yi Zhao, Wei Bao, Dan Wang, Ke Xu, Liang Lv:
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems. INFOCOM Workshops 2020: 1302-1303 - [c5]Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu:
Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering. INFOCOM 2020: 2223-2232 - [c4]Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen:
I Know If the Journey Changes: Flexible Source and Path Validation. IWQoS 2020: 1-6
2010 – 2019
- 2019
- [j7]Yi Zhao, Yong Yu, Bo Yang:
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. Comput. J. 62(4): 631-640 (2019) - [j6]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Yi Zhao, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. IEEE Internet Things J. 6(3): 4702-4710 (2019) - [j5]Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme. J. Univers. Comput. Sci. 25(3): 245-269 (2019) - [j4]Ziwei Li, Ke Xu, Haiyang Wang, Yi Zhao, Xiaoliang Wang, Meng Shen:
Machine-Learning-Based Positioning: A Survey and Future Directions. IEEE Netw. 33(3): 96-101 (2019) - [j3]Yi Zhao, Kaitai Liang, Bo Yang, Liqun Chen:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [c3]Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu, Qi Tan:
TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information. INFOCOM 2019: 1981-1989 - [c2]Yi Zhao, Hui Su, Liang Zhang, Dan Wang, Ke Xu:
Variety matters: a new model for the wireless data market under sponsored data plans. IWQoS 2019: 23:1-23:10 - 2018
- [i1]Qin Zou, Yanling Wang, Yi Zhao, Qian Wang, Chao Shen, Qingquan Li:
Deep Learning Based Gait Recognition Using Smartphones in the Wild. CoRR abs/1811.00338 (2018) - 2017
- [j2]Yi Zhao, Bo Yang:
Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption. Sci. China Inf. Sci. 60(11): 119104:1-119104:3 (2017) - 2015
- [j1]Yi Zhao, Qiliang Yang, Bo Yang:
Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue. Int. J. Netw. Secur. 17(2): 217-223 (2015) - [c1]Yi Zhao, Haobin Shi, Xuanwen Chen, Xuesi Li, Cong Wang:
An overview of object detection and tracking. ICIA 2015: 280-286
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint