default search action
Ke Cheng 0001
Person information
- affiliation: Xidian University, Xi'an, China
Other persons with the same name
- Ke Cheng — disambiguation page
- Ke Cheng 0002 — Institute of Automation, Chinese Academy of Sciences, Beijing, China
- Ke Cheng 0003 — Beihang University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Anxiao Song, Haoshuo Li, Ke Cheng, Tao Zhang, Aijing Sun, Yulong Shen:
Guard-FL: An UMAP-Assisted Robust Aggregation for Federated Learning. IEEE Internet Things J. 11(16): 27557-27570 (2024) - [j14]Xutong Mu, Ke Cheng, Yulong Shen, Xiaoxiao Li, Zhao Chang, Tao Zhang, Xindi Ma:
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients. IEEE Trans. Dependable Secur. Comput. 21(6): 5259-5274 (2024) - [j13]Jiaxuan Fu, Ke Cheng, Zhao Chang, Yulong Shen:
PPA-DBSCAN: Privacy-Preserving $\rho$ρ-Approximate Density-Based Clustering. IEEE Trans. Dependable Secur. Comput. 21(6): 5324-5340 (2024) - [j12]Jiaxuan Fu, Ke Cheng, Anxiao Song, Yuheng Xia, Zhao Chang, Yulong Shen:
FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing. IEEE Trans. Inf. Forensics Secur. 19: 7759-7773 (2024) - [j11]Xutong Mu, Ke Cheng, Teng Liu, Tao Zhang, Xueli Geng, Yulong Shen:
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9100-9114 (2024) - [c10]Jiaxuan Fu, Ke Cheng, Yuheng Xia, Anxiao Song, Qianxing Li, Yulong Shen:
Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing. ESORICS (2) 2024: 310-330 - [c9]Xin Liu, Ning Xi, Ke Cheng, Jiaxuan Fu, Xinghui Zhu, Yulong Shen, Jianfeng Ma:
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction. ICASSP 2024: 4530-4534 - 2023
- [j10]Xutong Mu, Yulong Shen, Ke Cheng, Xueli Geng, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical contrastive federated learning on non-IID data. Future Gener. Comput. Syst. 143: 93-104 (2023) - [j9]Ke Cheng, Jiaxuan Fu, Yulong Shen, Haichang Gao, Ning Xi, Zhiwei Zhang, Xinghui Zhu:
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT. IEEE Internet Things J. 10(16): 14856-14872 (2023) - [j8]Ke Cheng, Ning Xi, Ximeng Liu, Xinghui Zhu, Haichang Gao, Zhiwei Zhang, Yulong Shen:
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization. IEEE Trans. Computers 72(12): 3519-3531 (2023) - [j7]Ke Cheng, Yantian Hou, Liangmin Wang:
Secure Similar Sequence Query over Multi-source Genomic Data on Cloud. IEEE Trans. Cloud Comput. 11(3): 2803-2819 (2023) - [j6]Tao Jiang, Xu Yuan, Yuan Chen, Ke Cheng, Liangmin Wang, Xiaofeng Chen, Jianfeng Ma:
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(3): 2466-2483 (2023) - 2022
- [j5]Haiqin Wu, Liangmin Wang, Ke Cheng, Dejun Yang, Jian Tang, Guoliang Xue:
Privacy-Enhanced and Practical Truth Discovery in Two-Server Mobile Crowdsensing. IEEE Trans. Netw. Sci. Eng. 9(3): 1740-1755 (2022) - 2021
- [j4]Ke Cheng, Wei Tong, Lele Zheng, Jiaxuan Fu, Xutong Mu, Yulong Shen:
A Secure and Fair Double Auction Framework for Cloud Virtual Machines. IEEE Access 9: 87982-87994 (2021) - [j3]Guoying Qiu, Yulong Shen, Ke Cheng, Lingtong Liu, Shuiguang Zeng:
Mobility-Aware Privacy-Preserving Mobile Crowdsourcing. Sensors 21(7): 2474 (2021) - [j2]Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [i1]Xutong Mu, Yulong Shen, Ke Cheng, Xueli Geng, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical Contrastive Federated Learning on Non-IID data. CoRR abs/2109.12273 (2021) - 2020
- [c8]Ke Cheng, Liangmin Wang, Yulong Shen, Yangyang Liu, Yongzhi Wang, Lele Zheng:
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees. INFOCOM 2020: 1708-1717
2010 – 2019
- 2019
- [c7]Qing-Qing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher, Liangmin Wang, Shucheng Yu:
Flexibly and Securely Shape Your Data Disclosed to Others. AsiaCCS 2019: 160-167 - [c6]Ke Cheng, Yulong Slien, Yuzhen Zhang, Xinghui Zhu, Liangmin Wang, Hong Zhong:
Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets. ICC 2019: 1-6 - [c5]Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. INFOCOM 2019: 541-549 - [c4]Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM 2019: 2494-2502 - 2018
- [c3]Ke Cheng, Yantian Hou, Liangmin Wang:
Secure Similar Sequence Query on Outsourced Genomic Data. AsiaCCS 2018: 237-251 - [c2]Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree:
Obfuscating program control flow with Intel SGX. ICSE (Companion Volume) 2018: 321-322 - 2017
- [c1]Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:
Improving Database Storage Usability with the Cloud-Based Architecture. DSC 2017: 494-499 - 2016
- [j1]Ke Cheng, Liangmin Wang, Hong Zhong:
Secure Nearest Neighbor Query on Crowd-Sensing Data. Sensors 16(10): 1545 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 20:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint