


default search action
Xiaoyi Pang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[i6]Zhibo Wang, Zuoyuan Zhang, Xiaoyi Pang, Qile Zhang, Xuanyi Hao, Shuguo Zhuo, Peng Sun:
TAP-ViTs: Task-Adaptive Pruning for On-Device Deployment of Vision Transformers. CoRR abs/2601.02437 (2026)- 2025
[j18]Yahong Chen
, Xiaoyi Pang
, Xiaoguang Li
, Hanyi Wang
, Ben Niu
, Shengnan Hu
:
U-DPAP: Utility-aware Efficient Range Counting on Privacy-preserving Spatial Data Federation. Proc. ACM Manag. Data 3(1): 83a:1-83a:25 (2025)
[j17]Xiaoyi Pang
, Zhibo Wang
, Defang Liu, Jiahui Hu, Peng Sun
, Meng Luo
, Kui Ren
:
Poisoning Attacks to Knowledge Distillation-Based Federated Learning Under Robust Aggregation Rules. IEEE Trans. Inf. Forensics Secur. 20: 7061-7076 (2025)
[j16]Liantao Wu
, Peng Sun
, Zhibo Wang
, Xiaoyi Pang
, Jiahui Hu
, Honglong Chen
, Yang Yang
:
An Incentive Framework for Task Offloading in Edge Computing Marketplaces Under Price Competition. IEEE Trans. Mob. Comput. 24(9): 8492-8505 (2025)
[j15]Jiahui Hu, Dan Wang, Zhibo Wang, Xiaoyi Pang, Huiyu Xu, Ju Ren, Kui Ren:
Federated Large Language Model: Solutions, Challenges and Future Directions. IEEE Wirel. Commun. 32(4): 82-89 (2025)
[c9]Xiujie Song, Xiaoyi Pang, Haifeng Tang, Mengyue Wu, Kenny Q. Zhu:
Is Your Image a Good Storyteller? AAAI 2025: 25165-25173
[c8]Jiacheng Du, Zhibo Wang, Jie Zhang, Xiaoyi Pang, Jiahui Hu, Kui Ren:
Textual Unlearning Gives a False Sense of Unlearning. ICML 2025
[c7]Xiaoyi Pang, Chenxu Zhao, Zhibo Wang, Jiahui Hu, Yinggui Wang, Lei Wang, Tao Wei, Kui Ren, Chun Chen:
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning. USENIX Security Symposium 2025: 6461-6479
[i5]Xiujie Song, Xiaoyi Pang, Haifeng Tang, Mengyue Wu, Kenny Q. Zhu:
Is Your Image a Good Storyteller? CoRR abs/2501.01982 (2025)
[i4]Shuaifan Jin, Xiaoyi Pang, Zhibo Wang, He Wang, Jiacheng Du, Jiahui Hu, Kui Ren:
Safeguarding LLM Embeddings in End-Cloud Collaboration via Entropy-Driven Perturbation. CoRR abs/2503.12896 (2025)
[i3]Yajie Zhou, Xiaoyi Pang, Zhibo Wang:
AFLoRA: Adaptive Federated Fine-Tuning of Large Language Models with Resource-Aware Low-Rank Adaption. CoRR abs/2505.24773 (2025)
[i2]Xiujie Song, Qi Jia, Shota Watanabe, Xiaoyi Pang, Ruijie Chen, Mengyue Wu, Kenny Q. Zhu:
Generating Storytelling Images with Rich Chains-of-Reasoning. CoRR abs/2512.07198 (2025)- 2024
[j14]Weifan Shi
, Qingyong Deng
, Zhetao Li
, Saiqin Long
, Haolin Liu
, Xiaoyi Pang
:
Location and Bid Privacy Preserving-Based Quality-Aware Worker Recruitment Scheme in MCS. IEEE Internet Things J. 11(12): 21841-21856 (2024)
[j13]Zhibo Wang
, Yunan Sun
, Defang Liu, Jiahui Hu
, Xiaoyi Pang
, Yuke Hu
, Kui Ren
:
Location Privacy-Aware Task Offloading in Mobile Edge Computing. IEEE Trans. Mob. Comput. 23(3): 2269-2283 (2024)
[j12]Jiahui Hu
, Jiacheng Du, Zhibo Wang
, Xiaoyi Pang
, Yajie Zhou, Peng Sun
, Kui Ren
:
Does Differential Privacy Really Protect Federated Learning From Gradient Leakage Attacks? IEEE Trans. Mob. Comput. 23(12): 12635-12649 (2024)
[j11]Jiahui Hu
, Zhibo Wang
, Yongsheng Shen, Bohan Lin, Peng Sun
, Xiaoyi Pang
, Jian Liu
, Kui Ren
:
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning. IEEE/ACM Trans. Netw. 32(2): 1407-1422 (2024)
[j10]Xiaoyi Pang, Jiahui Hu, Peng Sun, Ju Ren, Zhibo Wang:
When Federated Learning Meets Knowledge Distillation. IEEE Wirel. Commun. 31(5): 208-214 (2024)
[c6]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. INFOCOM 2024: 151-160
[c5]Yajie Zhou, Xiaoyi Pang, Zhibo Wang, Jiahui Hu, Peng Sun, Kui Ren:
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments. INFOCOM 2024: 2448-2457
[i1]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. CoRR abs/2406.15731 (2024)- 2023
[j9]Xiaoyi Pang
, Zhibo Wang
, Zeqing He, Peng Sun
, Meng Luo
, Ju Ren
, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. IEEE Trans. Dependable Secur. Comput. 20(3): 2421-2432 (2023)
[c4]Defang Liu, Zhibo Wang, Xiaoyi Pang, Yunan Sun, Jiahui Hu, Peng Sun, Yuke Hu:
Towards Efficient Edge Learning for Large Models in Heterogeneous Resource-limited Environments. BIGCOM 2023: 223-230
[c3]Lei Zhang, Zhibo Wang, Xiaowei Dong, Yunhe Feng, Xiaoyi Pang, Zhifei Zhang, Kui Ren:
Towards Fairness-aware Adversarial Network Pruning. ICCV 2023: 5145-5154- 2022
[j8]Xuyang Ding, Ruizhao Lv, Xiaoyi Pang
, Jiahui Hu
, Zhibo Wang, Xu Yang, Xiong Li
:
Privacy-preserving task allocation for edge computing-based mobile crowdsensing. Comput. Electr. Eng. 97: 107528 (2022)
[j7]Zhibo Wang
, Defang Liu, Yunan Sun
, Xiaoyi Pang
, Peng Sun
, Feng Lin
, John C. S. Lui
, Kui Ren
:
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses. IEEE Commun. Surv. Tutorials 24(4): 2292-2328 (2022)
[j6]Peng Sun
, Zhibo Wang
, Liantao Wu
, Yunhe Feng
, Xiaoyi Pang
, Hairong Qi
, Zhi Wang
:
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems. IEEE Trans. Mob. Comput. 21(1): 352-365 (2022)
[j5]Dan Wang
, Ju Ren
, Zhibo Wang
, Xiaoyi Pang
, Yaoxue Zhang
, Xuemin Shen
:
Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy. IEEE Trans. Mob. Comput. 21(10): 3757-3772 (2022)
[j4]Xiaoyi Pang
, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. IEEE/ACM Trans. Netw. 30(1): 327-340 (2022)
[c2]Xiaoyi Pang, Zhibo Wang, Jingxin Li, Ruiting Zhou, Ju Ren, Zhetao Li:
Towards Online Privacy-preserving Computation Offloading in Mobile Edge Computing. INFOCOM 2022: 1179-1188- 2020
[j3]Xiaoyi Pang, Dengfeng Guo, Zhibo Wang, Peng Sun, Liqiang Zhang:
Towards fair and efficient task allocation in blockchain-based crowdsourcing. CCF Trans. Netw. 3(3-4): 193-204 (2020)
[c1]Zhibo Wang, Wenxin Liu, Xiaoyi Pang, Ju Ren, Zhe Liu, Yongle Chen:
Towards Pattern-aware Privacy-preserving Real-time Data Collection. INFOCOM 2020: 109-118
2010 – 2019
- 2019
[j2]Zhibo Wang, Xiaoyi Pang, Jiahui Hu
, Wenxin Liu, Qian Wang
, Yanjun Li, Honglong Chen:
When Mobile Crowdsensing Meets Privacy. IEEE Commun. Mag. 57(9): 72-78 (2019)
[j1]Zhibo Wang
, Xiaoyi Pang, Yahong Chen, Huajie Shao, Qian Wang
, Libing Wu
, Honglong Chen
, Hairong Qi:
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server. IEEE Trans. Mob. Comput. 18(6): 1356-1367 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-13 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







