What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Minghong Fang
Google Scholar
ORCID:
0000-0002-1365-3911
7
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Do We Really Need to Design New Byzantine-robust Aggregation Rules?
Minghong Fang
Seyedsina Nabavirazavi
Zhuqing Liu
Wei Sun
Sundaraja Sitharama Iyengar
Haibo Yang
2025
conf/asiaccs
Toward Malicious Clients Detection in Federated Learning.
Zhihao Dou
Jiaqi Wang
Wei Sun
Zhuqing Liu
Minghong Fang
2024
conf/ccs
Byzantine-Robust Decentralized Federated Learning.
Minghong Fang
Zifan Zhang
Hairi
Prashant Khanduri
Jia Liu
Songtao Lu
Yuchen Liu
Neil Gong
2022
conf/acsac
AFLGuard: Byzantine-robust Asynchronous Federated Learning.
Minghong Fang
Jia Liu
Neil Zhenqiang Gong
Elizabeth S. Bentley
2021
conf/ndss
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping.
Xiaoyu Cao
Minghong Fang
Jia Liu
Neil Zhenqiang Gong
2020
conf/uss
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
Minghong Fang
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2018
conf/acsac
Poisoning Attacks to Graph-Based Recommender Systems.
Minghong Fang
Guolei Yang
Neil Zhenqiang Gong
Jia Liu
Coauthors
Elizabeth S. Bentley
(1)
Guolei Yang
(1)
Haibo Yang
(1)
Hairi
(1)
Jia Liu
(4)
Jiaqi Wang
(1)
Jinyuan Jia
(1)
Minghong Fang
(7)
Neil Gong
(1)
Neil Zhenqiang Gong
(4)
Prashant Khanduri
(1)
Seyedsina Nabavirazavi
(1)
Songtao Lu
(1)
Sundaraja Sitharama Iyengar
(1)
Wei Sun
(1)
Wei Sun
(1)
Xiaoyu Cao
(2)
Yuchen Liu
(1)
Zhihao Dou
(1)
Zhuqing Liu
(2)
Zifan Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to