


default search action
Wei Dong 0007
Person information
- affiliation: Nanyang Technological University, College of Computing and Data Science, Singapore
- affiliation: Hong Kong University of Science and Technology, Hong Kong, SAR, China
Other persons with the same name
- Wei Dong — disambiguation page
- Wei Dong 0001
— Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China (and 1 more) - Wei Dong 0002 — Texas Instruments Inc., Dallas, TX, USA (and 1 more)
- Wei Dong 0003
— Ann Arbor, MI, USA (and 1 more) - Wei Dong 0004
— Harbin Institute of Technology, State Key laboratory of Robotics and System, China - Wei Dong 0005
— Chinese PLA General Hospital, Beijing, China - Wei Dong 0006
— National University of Defense Technology, School of Computer, Changsha, China - Wei Dong 0008
— Shanghai Jiao Tong University, State Key Laboratory of Mechanical System and Vibration, School of Mechanical Engineering, China - Wei Dong 0009
— Beijing Institute of Technology, Key Laboratory of Dynamics and Control of Flight Vehicle within Ministry of Education, School of Aerospace Engineering, China - Wei Dong 0010
— Xi'an University of Architecture and Technology, China (and 1 more) - Wei Dong 0011
— McMaster University, Hamilton, ON, Canada - Wei Dong 0012
— Tsinghua University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j12]Wei Dong, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. Commun. ACM 68(3): 93-101 (2025)
[j11]Qiyao Luo
, Jianzhe Yu
, Wei Dong
, Quanqing Xu
, Chuanhui Yang
, Ke Yi
:
RM2: Answer Counting Queries Efficiently under Shuffle Differential Privacy. Proc. ACM Manag. Data 3(3): 210:1-210:24 (2025)
[j10]Xinghe Chen
, Dajun Sun
, Quanqing Xu
, Wei Dong
:
A General Framework for Per-record Differential Privacy. Proc. ACM Manag. Data 3(6): 1-27 (2025)
[j9]Yihua Hu
, Hao Ding
, Wei Dong
:
N2E: A General Framework to Reduce Node-Differential Privacy to Edge-Differential Privacy for Graph Analytics. Proc. ACM Manag. Data 3(6): 1-26 (2025)
[c11]Feiran Liu
, Yuzhe Zhang
, Xinyi Huang
, Yinan Peng
, Xinfeng Li
, Lixu Wang
, Yutong Shen
, Ranjie Duan
, Simeng Qin
, Xiaojun Jia
, Qingsong Wen
, Wei Dong
:
The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework. ACM Multimedia 2025: 4875-4883
[c10]Yu He, Boheng Li, Liu Liu, Zhongjie Ba, Wei Dong, Yiming Li, Zhan Qin, Kui Ren, Chun Chen:
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models. USENIX Security Symposium 2025: 1609-1628
[i15]Lingzhi Yuan, Xinfeng Li, Chejian Xu, Guanhong Tao, Xiaojun Jia, Yihao Huang, Wei Dong, Yang Liu, XiaoFeng Wang, Bo Li:
PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models. CoRR abs/2501.03544 (2025)
[i14]Yu He, Boheng Li, Liu Liu, Zhongjie Ba, Wei Dong, Yiming Li, Zhan Qin
, Kui Ren, Chun Chen:
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models. CoRR abs/2502.18943 (2025)
[i13]Xiaojun Jia, Sensen Gao, Simeng Qin, Ke Ma, Xinfeng Li, Yihao Huang, Wei Dong, Yang Liu, Xiaochun Cao:
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models. CoRR abs/2503.12874 (2025)
[i12]Shiqian Zhao, Jiayang Liu, Yiming Li, Runyi Hu, Xiaojun Jia, Wenshu Fan, Xinfeng Li, Jie Zhang, Wei Dong, Tianwei Zhang, Luu Anh Tuan:
Inception: Jailbreak the Memory Mechanism of Text-to-Image Generation Systems. CoRR abs/2504.20376 (2025)
[i11]Kai Li, Can Shen, Yile Liu, Jirui Han, Kelong Zheng, Xuechao Zou, Zhe Wang, Xingjian Du, Shun Zhang, Hanjun Luo, Yingbin Jin, Xinxin Xing, Ziyang Ma, Yue Liu, Xiaojun Jia, Yifan Zhang, Junfeng Fang, Kun Wang, Yibo Yan, Haoyang Li, Yiming Li, Xiaobin Zhuang, Yang Liu, Haibo Hu, Zhuo Chen, Zhizheng Wu, Xiaolin Hu, Eng-Siong Chng, XiaoFeng Wang, Wenyuan Xu, Wei Dong, Xinfeng Li:
AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models. CoRR abs/2505.16211 (2025)
[i10]Feiran Liu, Yuzhe Zhang, Xinyi Huang, Yinan Peng, Xinfeng Li, Lixu Wang, Yutong Shen, Ranjie Duan, Simeng Qin, Xiaojun Jia, Qingsong Wen, Wei Dong:
The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework. CoRR abs/2505.19139 (2025)
[i9]Ziting Wang, Shize Zhang, Haitao Yuan, Jinwei Zhu, Shifu Li, Wei Dong, Gao Cong:
FDABench: A Benchmark for Data Agents on Analytical Queries over Heterogeneous Data. CoRR abs/2509.02473 (2025)
[i8]Yihua Hu, Hao Ding, Wei Dong:
N2E: A General Framework to Reduce Node-Differential Privacy to Edge-Differential Privacy for Graph Analytics. CoRR abs/2511.20125 (2025)
[i7]Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong:
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations. CoRR abs/2512.01335 (2025)- 2024
[j8]Wei Dong
, Zijun Chen
, Qiyao Luo
, Elaine Shi
, Ke Yi
:
Continual Observation of Joins under Differential Privacy. Proc. ACM Manag. Data 2(3): 128 (2024)
[j7]Dajun Sun
, Wei Dong
, Yuan Qiu
, Ke Yi
:
Personalized Truncation for Personalized Privacy. Proc. ACM Manag. Data 2(6): 249:1-249:25 (2024)
[j6]Jianzhe Yu
, Wei Dong, Juanru Fang, Dajun Sun, Ke Yi:
DOP-SQL: A General-purpose, High-utility, and Extensible Private SQL System. Proc. VLDB Endow. 17(12): 4385-4388 (2024)
[j5]Wei Dong
, Juanru Fang
, Ke Yi
, Yuchao Tao
, Ashwin Machanavajjhala
:
Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. ACM Trans. Database Syst. 49(4): 13:1-13:40 (2024)
[c9]Wei Dong
, Qiyao Luo
, Giulia Fanti
, Elaine Shi
, Ke Yi
:
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CCS 2024: 1939-1953
[i6]Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CoRR abs/2403.10116 (2024)
[i5]Qiyao Luo, Yilei Wang, Wei Dong, Ke Yi:
Secure Query Processing with Linear Complexity. CoRR abs/2403.13492 (2024)
[i4]Ziting Wang, Haitao Yuan, Wei Dong, Gao Cong, Feifei Li:
CORAG: A Cost-Constrained Retrieval Optimization System for Retrieval-Augmented Generation. CoRR abs/2411.00744 (2024)- 2023
[j4]Wei Dong
, Dajun Sun
, Ke Yi
:
Better than Composition: How to Answer Multiple Relational Queries under Differential Privacy. Proc. ACM Manag. Data 1(2): 123:1-123:26 (2023)
[j3]Dajun Sun, Wei Dong, Ke Yi:
Confidence Intervals for Private Query Processing. Proc. VLDB Endow. 17(3): 373-385 (2023)
[j2]Wei Dong, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. SIGMOD Rec. 52(1): 115-123 (2023)
[j1]Wei Dong, Ke Yi:
Query Evaluation under Differential Privacy. SIGMOD Rec. 52(3): 6-17 (2023)
[c8]Wei Dong
, Ke Yi
:
Universal Private Estimators. PODS 2023: 195-206
[c7]Wei Dong
, Qiyao Luo
, Ke Yi:
Continual Observation under User-level Differential Privacy. SP 2023: 2190-2207- 2022
[c6]Juanru Fang, Wei Dong
, Ke Yi:
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. CCS 2022: 1009-1022
[c5]Yuan Qiu
, Wei Dong
, Ke Yi, Bin Wu, Feifei Li:
Releasing Private Data for Numerical Queries. KDD 2022: 1410-1419
[c4]Wei Dong, Yuting Liang, Ke Yi:
Differentially Private Covariance Revisited. NeurIPS 2022
[c3]Wei Dong
, Ke Yi:
A Nearly Instance-optimal Differentially Private Mechanism for Conjunctive Queries. PODS 2022: 213-225
[c2]Wei Dong
, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. SIGMOD Conference 2022: 759-772
[i3]Wei Dong, Yuting Liang, Ke Yi:
Differentially Private Covariance Revisited. CoRR abs/2205.14324 (2022)- 2021
[c1]Wei Dong
, Ke Yi:
Residual Sensitivity for Differentially Private Multi-Way Joins. SIGMOD Conference 2021: 432-444
[i2]Wei Dong, Ke Yi:
A Nearly Instance-optimal Differentially Private Mechanism for Conjunctive Queries. CoRR abs/2105.05443 (2021)
[i1]Wei Dong, Ke Yi:
Universal Private Estimators. CoRR abs/2111.02598 (2021)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-12 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







