- [1]Shuqi Qin,Shengjie Ye,Xiaoxuan Fan,Minmin Cheng,Yuanyuan He,Xianjun Deng,Jong Hyuk Park.Shenghao Liu.A Partially Labeled Anomaly Data Detection Approach Based on Prioritized Deep Reinforcement Learning for Consumer Electronics Security.IEEE Transactions on Consumer Electronics,2024,(4):6452 - 6462
- [2]Jie Zhang,Miao Hu,Xinwei Yu,Tingting Guo,Xiangyu Gao,Jiaqi Ma.Yuanyuan He.AcVerifier: Cross-Domain Access Control Verification via Hybrid Static and Dynamic Analysis.IEEE International Symposium on Parallel and Distributed Processing with Applications,2025,736-742
- [3]Jiaqi Sun,Shenghao Liu,Xiaoxuan Fan,Yongling Huang,Yuanyuan He.Xianjun Deng.Contrastive Learning based Speech Spoofing Detection for Multimedia Security in Edge Intelligence.ACM Transactions on Multimedia Computing, Communications and Applications,2024,
- [4]Wei Wan,Shengshan Hu,Jianrong Lu,Leo Yu Zhang,Hai Jin.Yuanyuan He.Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection.International Joint Conference on Artificial Intelligence,2022,753–760
- [5]Shengshan Hu,Ziqi Zhou,Yechao Zhang,Leo Yu Zhang,Yifeng Zheng,Yuanyuan He,Hai Jin.BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.ACM International Conference on Multimedia,2022,678 - 686
- [6]Brennan Mosher,Xiangman Li,何媛媛,倪剑兵.Verifiable and privacy-preserving ad exchange for smart targeted advertising.IEEE International Conference on Privacy, Security and Trust,2023,
- [7]何媛媛,李佩芝,倪剑兵,邓贤君,张杰,杨天若.鲁宏伟.Rsam: Byzantine-robust and secure model aggregation in federated learning for internet of vehicles using private approximate median.IEEE Transactions on Vehicular Technology,2023,(5):6714-6726
- [8]Fayao Wang,Peizhi Li,Xinyu Wei.Yuanyuan He.Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy.IEEE International Conference on Trust, Security and Privacy in Computing and Communications,
- [9]Yuanyuan He,Xinyu Tan,Jianbing Ni,T. Yang.Xianjun Deng.Differentially Private Set Intersection for Asymmetrical ID Alignment.IEEE Transactions on Information Forensics and Security(TIFS),
- [10]Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection.IEEE ICC 2022,