当前位置: X-MOL首页全球导师 国内导师 › 郑宜峰

个人简介

郑宜峰,哈尔滨工业大学(深圳)计算机科学与技术学院助理教授,硕导,深圳市海外高层次人才。主要从事云计算安全、物联网安全、数据隐私保护等领域的研究。于香港城市大学获得计算机科学博士学位,毕业后曾于澳大利亚联邦科学与工业研究组织、香港城市大学从事博士后研究。已发表IEEE Transactions系列期刊论文35+篇,CCF-A类期刊/会议论文30+篇,研究成果主要发表于TIFS, TDSC, TKDE, TPDS, TCAD, TSC, TMM, TCSVT, TCC等国际一流期刊,以及ESORICS, ASIACCS, DSN, PERCOM, MM, ICDCS, INFOCOM等国际一流会议。

研究领域

网络与信息安全

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Journal Articles Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, and Zhongyun Hua, "Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables'', IEEE Transactions on Services Computing (TSC), accepted, 2023. (CCF A) Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, and Xiaohua Jia, "FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing'', IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted, 2023. (CCF A) Songlei Wang, Yifeng Zheng*, Xiaohua Jia, Qian Wang, and Cong Wang, "MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs'', IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2023. (CCF A; *Corresponding author) Songlei Wang, Yifeng Zheng*, Xiaohua Jia, Hejiao Huang, and Cong Wang, "PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service", IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, 2023. (CCF A; *Corresponding author) Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, and Cong Wang, "SecDR: Enabling Secure, Efficient and Accurate Data Recovery for Mobile Crowdsensing'', IEEE Transactions on Dependable and Secue Computing (TDSC), accepted, 2023. (CCF A) Songlei Wang, Yifeng Zheng*, and Xiaohua Jia, "SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service'', IEEE Transactions on Services Computing (TSC), accepted, 2023. (CCF A; *Corresponding author) Songlei Wang, Yifeng Zheng*, Xiaohua Jia, Hejiao Huang, and Cong Wang, "OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service'', IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2022. (CCF A; *Corresponding author) Songlei Wang, Yifeng Zheng*, Xiaohua Jia, and Xun Yi, “PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2022. (CCF A; *Corresponding author) Songlei Wang, Yifeng Zheng*, Xiaohua Jia, and Xun Yi, “Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition", IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, 2022. (CCF A; *Corresponding author) Mingyang Song, Zhongyun Hua, Yifeng Zheng, Hejiao Huang, and Xiaohua Jia, “Blockchain-Based Deduplication and Integrity Auditing over Encrypted Cloud Storage", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022. (CCF A) Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, and Cong Wang, "SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases'', IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, 2022. (CCF A) Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, and Surya Nepal, "Optimizing Secure Decision Tree Inference Outsourcing", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022. (CCF A) Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, and Cong Wang, “Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022. (CCF A) Xiaoning Liu, Yifeng Zheng*, Xingliang Yuan, and Xun Yi, “Securely Outsourcing Neural Network Inference to the Cloud with Lightweight Techniques", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022. (CCF A; *Corresponding author) Yifeng Zheng, Huayi Duan, Cong Wang, and Surya Nepal, “Securely and Efficiently Outsourcing Decision Tree Inference", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 3, pp. 1841-1855, 2022. (CCF A) Yifeng Zheng, Huayi Duan, Xingliang Yuan, and Cong Wang, "Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery", IEEE Transactions on Dependable and Secure Computing (TDSC), vol.17, no.1, pp. 121-133, January/ February, 2020. (CCF A) Yifeng Zheng, Huayi Duan, Xiaoting Tang, Cong Wang, and Jiantao Zhou, "Denoising in the Dark: Privacy-Preserving Deep Neural Network Based Image Denoising", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2019. (CCF A) Yifeng Zheng, Huayi Duan, and Cong Wang, "Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing", IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 10, pp. 2475-2489, October, 2018. (CCF A) Yifeng Zheng, Helei Cui, Cong Wang, and Jiantao Zhou, "Privacy-Preserving Image Denoising From External Cloud Databases", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 6, pp. 1285-1298, June, 2017. (CCF A) Conference/Workshop Papers Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, and Hai Jin, "BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label'", Proc. of ACM International Conference on Multimedia (MM), accepted, 2022. (CCF A; Acceptance ratio: 690/2473=27.9%) Xiaoning Liu, Yifeng Zheng*, Xingliang Yuan and Xun Yi, "MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service", Proc. of European Symposium on Research in Computer Security (ESORICS), accepted, 2021. (Best Paper Award; Acceptance ratio: 71/351=20.2%; *Corresponding author) Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, and Hyoungshick Kim, “Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN”, Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), accepted, 2021. (Acceptance ratio: 48/295= 16.3%) Yifeng Zheng, Huayi Duan, and Cong Wang, "Towards Secure and Efficient Outsourcing of Machine Learning Classification'', Proc. of European Symposium on Research in Computer Security (ESORICS), pp. 22-40, Luxembourg, September 23-27, 2019. (Acceptance ratio: 67/344= 19.5%) Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxing Zhou, Cong Wang, and Man Ho Au, "Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization'', Proc. of IEEE Pervasive Computing and Communications (PerCom), pp. 1-10, Kyoto, Japan, March 11-15, 2019. (Acceptance ratio: 30/181= 16.6%) Chengjun Cai, Yifeng Zheng, and Cong Wang, "Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization'", Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 589-599, Vienna, Austria, July 2-6, 2018. (Acceptance ratio: 78/378= 20%) Yifeng Zheng, Cong Wang, and Jiantao Zhou, "Toward Secure and Practical Image Denoising: A Machine Learning based Realization'', Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 6936-6940, Calgary, Alberta, Canada, April 15-20, 2018. Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage'', Proc. of IEEE International Conference on Computer Communications (INFOCOM), pp. 1-9, San Francisco, USA, April 10-15, 2015. (CCF A; Acceptance rate: 300/1644= 18.25%) Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaoling Gui, "Enabling Encrypted Cloud Media Center with Secure Deduplication'', Proc. of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), pp. 63-72, Singapore, April 14-17, 2015. (Acceptance rate: 48/256= 17.8%)

推荐链接
down
wechat
bug