Sitemap
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2 
publications
FLOD:Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Published in ESORICS 2021, 2021
(MPC) This paper is about the private inference for Federated Learning.
Recommended citation: Ye, Dong. (2023). "FLOD:Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority." ESORICS 2021.
Download Paper
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints
Published in CVPR2022, 2022
(Backdoor Attacks) This paper is about the backdoor attacks.
Recommended citation: Zhendong, Zhao. (2022). "DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints." CVPR2022.
Download Paper
Rethinking the Feature Iteration Process of Graph Convolution Networks
Published in IJCNN2022, 2022
(GNN) This paper is about graph neural networks.
Recommended citation: Bisheng, Tang. (2023). "Rethinking the Feature Iteration Process of Graph Convolution Networks." IJCNN2022.
Download Paper
KAFNN: A Knowledge Augmentation Framework to Graph Neural Networks
Published in IJCNN2022, 2022
(GNN) This paper is about Graph Neural Networks.
Recommended citation: Bisheng, Tang. (2022). "KAFNN: A Knowledge Augmentation Framework to Graph Neural Networks." IJCNN2022.
Download Paper
ACTSS: Input Detection Defense against Backdoor Attacks via Activation Subset Scanning
Published in IJCNN2022, 2022
(Backdoor Attacks) This paper is about defense methods against backdoor attacks.
Recommended citation: Yuexin, Xuan. (2022). "ACTSS: Input Detection Defense against Backdoor Attacks via Activation Subset Scanning." IJCNN2022.
Download Paper
FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width
Published in IEEE Transactions on Information Forensics and Security, 2023
(MPC) This paper is about the private binary Neural Network inference.
Recommended citation: Ye, Dong. (2023). "FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width." IEEE Transactions on Information Forensics and Security.
Download Paper
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs
Published in WWW2023, 2023
(MPC) This paper is about the Neural Network inference.
Recommended citation: Ye, Dong. (2023). "Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs." WWW2023.
Download Paper
PrUE: Distilling Knowledge from Sparse Teacher Networks
Published in ECML-PKDD2022, 2023
(Knowledge Distillation) This paper is about the Machine Learning and Knowledge Discovery in Databases.
Recommended citation: Shaopu, Wang. (2022). "PrUE: Distilling Knowledge from Sparse Teacher Networks." ECML-PKDD2022.
Download Paper
Generalized heterophily graph data augmentation for node classification
Published in Neural Networks, 2023
(GNN) This paper is about graph neural networks.
Recommended citation: Bisheng, Tang. (2023). "Generalized heterophily graph data augmentation for node classification." Neural Networks.
Download Paper
Practical and General Backdoor Attacks against Vertical Federated Learning
Published in ECML 2023, 2023
(Backdoor Attacks) This paper is about the backdoor attacks.
Recommended citation: Yuexin, Xuan. (2023). "Practical and General Backdoor Attacks against Vertical Federated Learning ." ECML 2023.
Download Paper
Unsupervised Graph Structure-Aided Personalized Federated Learning
Published in ECAI2023, 2023
(Federated Learning) This paper is about the graph personalized Federated Learning.
Recommended citation: Xiaoying, Li. (2023). "Unsupervised Graph Structure-Aided Personalized Federated Learning ." ECAI2023.
Download Paper
COMET: Communication-Efficient Batch Secure Three-Party Neural Network Inference with Client-Aiding
Published in ICC2024, 2024
(MPC) This paper is about the secure Neural Network inference.
Recommended citation: Tingyu, Fan. (2024). "COMET: Communication-Efficient Batch Secure Three-Party Neural Network Inference with Client-Aiding." ICC2024.
Download Paper
Roger: A Round Optimized GPU-Friendly Secure Inference Framework
Published in ICC2024, 2024
(MPC) This paper is about the secure inference.
Recommended citation: Xudong, Chen. (2024). "Roger: A Round Optimized GPU-Friendly Secure Inference Framework." ICC2024.
Download Paper
Graph Federated Learning with Center Moment Constraints for Node Classification
Published in ICPP2024, 2024
(Graph) This paper is about Graph Federated Learning.
Recommended citation: Bisheng, Tang. (2024). "Graph Federated Learning with Center Moment Constraints for Node Classification." ICPP2024.
Download Paper
CipherDM: Secure Three-Party Inference for Diffusion Model Sampling
Published in ECCV2024,Preprint, 2024
(AI Security) This paper is about secure inference for Diffusion Model sampling.
Recommended citation: Xin, Zhao. (2024). "CipherDM: Secure Three-Party Inference for Diffusion Model Sampling." ECCV2024.
Download Paper
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Teaching experience 2
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.
