(Note: * denotes corresponding author.)

Book Chapters

  1. Yifeng Zheng and Cong Wang, "Private Truth Discovery in Cloud-Empowered Crowdsensing Systems," Encyclopedia of Wireless Networks, Editors: Sherman Shen, Xiaodong Lin, and Kuan Zhang, Springer, 2020.

Journal Articles

  1. [TIFS] Songlei Wang, Yifeng Zheng*, Xiaohua Jia, and Cong Wang, "eGrass: An Encrypted Attributed Subgraph Matching System with Malicious Security", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2024.
  2. [TSC] Rui Lian, Yifeng Zheng*, and Cong Wang, "PrivRo: Enabling Privacy-Preserving Crowdsourcing with Robust Quality Awareness", IEEE Transactions on Services Computing (TSC), accepted, 2024.
  3. [TDSC] Xiaoning Liu, Yifeng Zheng*, Xingliang Yuan, and Xun Yi, "GoCrowd: Obliviously Aggregating Crowd Wisdom with Quality Awareness in Crowdsourcing", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2024.
  4. [TIFS] Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, and Xiaohua Jia, "SimLESS: A Secure Deduplication System over Similar Data in Cloud Media Sharing", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2024.
  5. [TSC] Zhongyun Hua, Yufei Yao, Mingyang Song, Yifeng Zheng*, Yushu Zhang, and Cong Wang, "Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service", IEEE Transactions on Services Computing (TSC), accepted, 2024
  6. [TDSC] Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, and Xiaohua Jia, "Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud", IEEE Transactions on Dependable and Secue Computing (TDSC) , accepted, 2023.
  7. [TC] Mingyang Song, Zhongyun Hua, Yifeng Zheng, Hejiao Huang, and Xiaohua Jia, "LSDedup: Layered Secure Deduplication for Cloud Storage", IEEE Transactions on Computers (TC), accepted, 2023.
  8. [TIFS] Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, and Derek Abbott, "NTD: Non-Transferability enabled Deep Learning Backdoor Detection", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2023.
  9. [TPDS] Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, and Xiaohua Jia, "FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing", IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted, 2023.
  10. [TCSVT] Zhongyun Hua, Xingyu Liu, Yifeng Zheng, Shuang Yi, and Yushu Zhang, "Reversible Data Hiding over Encrypted Images via Preprocessing-Free Matrix Secret Sharing", IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), accepted, 2023.
  11. [TSC] Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, and Zhongyun Hua, "Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables", IEEE Transactions on Services Computing (TSC), accepted, 2023.
  12. [TIFS] Songlei Wang, Yifeng Zheng*, Xiaohua Jia, Qian Wang, and Cong Wang, "MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2023. (*Corresponding author)
  13. [TKDE] Songlei Wang, Yifeng Zheng*, Xiaohua Jia, Hejiao Huang, and Cong Wang, "PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service", IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, 2023. (*Corresponding author)
  14. [TSC] Songlei Wang, Yifeng Zheng*, and Xiaohua Jia, "SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service", IEEE Transactions on Services Computing (TSC), accepted, 2023. (*Corresponding author)
  15. [TDSC] Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, and Cong Wang, "SecDR: Enabling Secure, Efficient and Accurate Data Recovery for Mobile Crowdsensing", IEEE Transactions on Dependable and Secue Computing (TDSC), accepted, 2023.
  16. [TKDE] Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, and Cong Wang, "SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases", IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, 2022.
  17. [TDSC] Mingyang Song, Zhongyun Hua, Yifeng Zheng, Hejiao Huang, and Xiaohua Jia, "Blockchain-Based Deduplication and Integrity Auditing over Encrypted Cloud Storage", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022.
  18. [TIFS] Songlei Wang, Yifeng Zheng*, Xiaohua Jia, Hejiao Huang, and Cong Wang, "OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2022. (*Corresponding author)
  19. [TIFS] Songlei Wang, Yifeng Zheng*, Xiaohua Jia, and Xun Yi, "PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2022. (*Corresponding author)
  20. [TKDE] Songlei Wang, Yifeng Zheng*, Xiaohua Jia, and Xun Yi, "Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition", IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, 2022. (*Corresponding author)
  21. [TDSC] Zhongyun Hua, Yanxiang Wang, Shuang Yi,Yifeng Zheng, Xingyu Liu, Yongyong Chen, and Xinpeng Zhang, "Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022.
  22. [TCSVT] Zhongyun Hua, Ziyi Wang,Yifeng Zheng, Yongyong Chen, and Yuanman Li, "Enabling Large-Capacity Reversible Data Hiding over Encrypted JPEG Bitstreams", IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), accepted, 2022.
  23. [TCAD] Huming Qiu, Hua Ma, Zhi Zhang, Yansong Gao, Yifeng Zheng, Anmin Fu, Pan Zhou, Derek Abbott, and Said F. Al-Sarawi, "RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), accepted, 2022.
  24. [TDSC] Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, and Surya Nepal, "Optimizing Secure Decision Tree Inference Outsourcing", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022.
  25. [TDSC] Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, and Cong Wang, "Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022.
  26. [TDSC] Xiaoning Liu, Yifeng Zheng*, Xingliang Yuan, and Xun Yi, "Securely Outsourcing Neural Network Inference to the Cloud with Lightweight Techniques", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2022. (* corresponding author)
  27. [TDSC] Yifeng Zheng, Huayi Duan, Cong Wang, Ruochen Wang, and Surya Nepal, "Securely and Efficiently Outsourcing Decision Tree Inference", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 3, pp. 1841-1855, 2022.
  28. [TDSC] Xiaoning Liu, Yifeng Zheng*, Xun Yi, and Surya Nepal, "Privacy-Preserving Collaborative Analytics on Medical Time Series Data", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 3, pp. 1687-1702, 2022. (* corresponding author)
  29. [TDSC] Yifeng Zheng, Huayi Duan, Xingliang Yuan, and Cong Wang, "Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 17, no. 1, pp. 121-133, 2020.
  30. [TDSC] Chengjun Cai, Yifeng Zheng, Anxin Zhou, and Cong Wang, “Building a Secure Knowledge Marketplace over Crowdsensed Data Streams”, IEEE Transactions on Dependable and Secure Computing (TDSC) , accepted, 2019.
  31. [TDSC] Yifeng Zheng, Huayi Duan, Xiaoting Tang, Cong Wang, and Jiantao Zhou, "Denoising in the Dark: Privacy-Preserving Deep Neural Network Based Image Denoising," IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2019.
  32. [TDSC] Chengjun Cai, Yifeng Zheng, Yuefeng Du, Zhan Qin, and Cong Wang, “Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains”, IEEE Transactions on Dependable and Secure Computing (TDSC) , accepted, 2019.
  33. [TDSC] Leo Yu Zhang*, Yifeng Zheng*, Jian Weng, Cong Wang, Zihao Shan, and Kui Ren, "You Can Access But You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center," IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2018. (* equal contributions)
  34. [TSC] Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection," IEEE Transactions on Services Computing (TSC), accepted, 2018
  35. [TIFS] Yifeng Zheng, Huayi Duan, and Cong Wang, "Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing," IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 10, pp. 2475-2489, 2018.
  36. [TSC] Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, and Cong Wang, "A Practical System for Privacy-Aware Targeted Mobile Advertising Services," IEEE Transactions on Services Computing (TSC), accepted, 2017.
  37. [TIFS] Yifeng Zheng, Helei Cui, Cong Wang, and Jiantao Zhou, "Privacy-Preserving Image Denoising From External Cloud Databases," IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 6, pp. 1285-1298, 2017.
  38. [TMM] Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui, "Toward Encrypted Cloud Media Center With Secure Deduplication," IEEE Transactions on Multimedia (TMM), vol. 19, no. 2, pp. 251-265, 2017.

Conference and Workshop Papers

  1. [USENIX Security] Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, Guoai Xu, and Xingliang Yuan, "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting", Proc. of USENIX Security Symposium , accepted, 2025.
  2. [CCS] Shuangqing Xu, Yifeng Zheng*, and Zhongyun Hua, "Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy", Proc. of ACM Conference on Computer and Communications Security (CCS) , accepted, 2024.
  3. [USENIX Security] Songlei Wang, Yifeng Zheng*, and Xiaohua Jia, "GraphGuard: Privacy-Preserving Outsourcing of Time-Constrained Pattern Detection Over Streaming Graphs", Proc. of USENIX Security Symposium , accepted, 2024.
  4. [ESORICS] Rui Lian, Yulong Ming, Chengjun Cai, Yifeng Zheng, Cong Wang, and Xiaohua Jia, "Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting", Proc. of European Symposium on Research in Computer Security (ESORICS), accepted, 2024. (Acceptance ratio: 86/535=16%)
  5. [WISE] Yifeng Zheng, Tianchen Xiong, Huajie Ouyang, Songlei Wang, Zhongyun Hua, and Yansong Gao, "SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization", Proc. of International Web Information Systems Engineering Conference (WISE), accepted, 2024.
  6. [ICDCS] Yinbin Miao, Chao Xu, Yifeng Zheng, Ximeng Liu, Xiangdong Meng and Robert H. Deng, "Efficient and Secure Spatial Range Query over Large-scale Encrypted Data", Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), accepted, 2023. (Acceptance ratio: 83/439=18.9%)
  7. [MM] Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, and Hai Jin, "BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label", Proc. of ACM International Conference on Multimedia (MM), accepted, 2022. (Acceptance ratio: 690/2473=27.9%)
  8. [MSN] Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, and Yifeng Zheng, "Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints", Proc. of International Conference on Mobile Ad-hoc and Sensor Networks (MSN), accepted, 2022.
  9. [ESORICS] Xiaoning Liu, Yifeng Zheng*, Xingliang Yuan, and Xun Yi, "MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service", Proc. of European Symposium on Research in Computer Security (ESORICS), accepted, 2021. (Best Paper Award; Acceptance rate: 71/351=20.2%;*corresponding author)
  10. [QSHINE] Rui Lian, Anxin Zhou, Yifeng Zheng, and Cong Wang, "Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics", Proc. of EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE), accepted, 2021.
  11. [DSN] Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, and Hyoungshick Kim, "Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN", Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), accepted, 2021. (Acceptance ratio: 48/295=16.3%)
  12. [TPS] Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva Raj Pokhrel, Surya Nepal, and Helge Janicke, "Towards IoT Security Automation and Orchestration", Proc. of IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), accepted, 2020.
  13. [SECRYPT] Jing Yao, Yifeng Zheng, Cong Wang, and Surya Nepal, "Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness", Proc. of International Conference on Security and Cryptography (SECRYPT), accepted, 2020.
  14. [SBC] Jing Yao, Yifeng Zheng, Yu Guo, and Cong Wang, "SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search", Proc. of International Workshop on Security in Blockchain and Cloud Computing (SBC), in conjunction with ACM Asia Conference on Computer and Communications Security (AsiaCCS), accepted, 2020.
  15. [ESORICS] Yifeng Zheng, Huayi Duan, and Cong Wang, "Towards Secure and Efficient Outsourcing of Machine Learning Classification", Proc. of European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 23-27, 2019. (Acceptance ratio: 67/344= 19.5%)
  16. [PERCOM] Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxing Zhou, Cong Wang, and Man Ho Au, "Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization," Proc. of IEEE Pervasive Computing and Communications (PerCom), Kyoto, Japan, March 11-15, 2019. (Acceptance ratio: 30/181= 16.6%)
  17. [ICDCS] Chengjun Cai, Yifeng Zheng, and Cong Wang, "Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization," Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-6, 2018. (Acceptance ratio: 78/378= 20%)
  18. [ICASSP] Yifeng Zheng, Cong Wang, and Jiantao Zhou, "Toward Secure Image Denoising: A Machine Learning Based Realization," Proc. of IEEE International Conference on Accoustics, Speech, and Signal Processing (ICASSP), Calgary, Alberta, Canada, April 15-20, 2018.
  19. [INFOCOM] Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Enabling Secure and Effective Near-Duplicate Detection over Encrypted In-Network Storage," Proc. of IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, USA, Apr. 10-15, 2016 (Acceptance ratio: 300/1644= 18.25%).
  20. [AsiaCCS] Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaoling Gui, "Enabling Encrypted Cloud Media Center with Secure Deduplication," Proc. of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Singapore, Apr. 14-17, 2015 (Acceptance ratio: 48/256= 17.8%).
  21. [CSNDSP] Yifeng Zheng and Jianxiu Jin, "A Novel Image Scrambling Degree Blind Evaluation Scheme Based on Bhattacharyya Coefficient," Proc. of IEEE/IET International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Manchester, UK, July 23- 25, 2014.