


default search action
Peng Tang 0002
Person information
- affiliation (PhD 2022): Shanghai Jiao Tong University, School of Cyber Science and Engineering, China
Other persons with the same name
- Peng Tang — disambiguation page
- Peng Tang 0001
— PLA Army Engineering University, College of Communications Engineering, Nanjing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j29]Guowei Ling
, Peng Tang
, Shifeng Sun
, Weidong Qiu
:
Efficient Updatable PSI From Asymmetric PSI and PSU. IEEE Trans. Inf. Forensics Secur. 21: 2626-2640 (2026)
[c37]Ke Hu, Liyao Xiang, Peng Tang, Weidong Qiu:
FedTopo: Topology-Informed Representation Alignment in Federated Learning Under Non-I.I.D. Conditions. AAAI 2026: 21849-21857
[c36]Li Sun, Lanxu Yang, Jiayu Tian, Bowen Fang, Xiaoyan Yu, Junda Ye, Peng Tang, Hao Peng, Philip S. Yu:
Learning to Explore: Policy-Guided Outlier Synthesis for Graph Out-of-Distribution Detection. AAAI 2026: 25709-25717
[c35]Longzhu He, Chaozhuo Li, Peng Tang, Li Sun, Sen Su, Philip S. Yu:
Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning Protocols. KDD (1) 2026: 395-406
[c34]Longzhu He, Peng Tang, Li Sun
, Sen Su:
The Devil Within, The Cure Without: Securing Locally Private Graph Learning under Poisoning. WWW 2026: 4493-4504
[i16]Li Sun, Lanxu Yang, Jiayu Tian
, Bowen Fang, Xiaoyan Yu, Junda Ye, Peng Tang, Hao Peng, Philip S. Yu:
Learning to Explore: Policy-Guided Outlier Synthesis for Graph Out-of-Distribution Detection. CoRR abs/2603.00602 (2026)
[i15]Guowei Ling, Peng Tang, Jinyong Shan, Liyao Xiang, Weidong Qiu:
Faster Than Ever: A New Lightweight Private Set Intersection and Its Variants. IACR Cryptol. ePrint Arch. 2026: 24 (2026)- 2025
[j28]Qingqiang Qi, Xingye Yang, Chengyu Hu, Peng Tang, Zhiyuan Su, Shanqing Guo:
FLDS: differentially private federated learning with double shufflers. Comput. J. 68(4): 431-443 (2025)
[j27]Ning Wang, Jian Zhuang, Zhigang Wang, Zhiqiang Wei, Yu Gu, Peng Tang, Ge Yu
:
Multidimensional categorical data collection under shuffled differential privacy. Comput. Secur. 151: 104301 (2025)
[j26]Qingqiang Qi
, Chengyu Hu
, Tongyaqi Li
, Peng Tang
, Shanqing Guo
:
PFGRS: A Privacy-preserving Subgraph-level Federated Graph learning for Recommender System. Expert Syst. Appl. 282: 127615 (2025)
[j25]Longzhu He
, Peng Tang, Yuanhe Zhang, Pengpeng Zhou, Sen Su:
Mitigating privacy risks in Retrieval-Augmented Generation via locally private entity perturbation. Inf. Process. Manag. 62(5): 104150 (2025)
[j24]Yuqi Niu
, Weidong Qiu
, Peng Tang
, Lifan Wang
, Shuo Chen
, Shujun Li
, Nadin Kökciyan
, Ben Niu
:
Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. Proc. ACM Hum. Comput. Interact. 9(2): 1-38 (2025)
[j23]Peng Tang
, Xiaoyu Zhu
, Weidong Qiu
, Zheng Huang, Zhenyu Mu, Shujun Li
:
FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 22(4): 3993-4009 (2025)
[j22]Yangde Wang
, Weidong Qiu
, Peng Tang
, Hao Tian, Shujun Li
:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. IEEE Trans. Dependable Secur. Comput. 22(4): 4428-4441 (2025)
[j21]Guowei Ling
, Peng Tang
, Fei Tang
, Shifeng Sun
, Shouling Ji
, Weidong Qiu
:
Ultra-Fast Private Set Intersection From Efficient Oblivious Key-Value Stores. IEEE Trans. Dependable Secur. Comput. 22(5): 4998-5014 (2025)
[j20]Guowei Ling
, Peng Tang
, Fei Tang
, Shifeng Sun
, Jinyong Shan
, Liyao Xiang
, Weidong Qiu
:
Privacy-Preserving Authorized Set Matching via Dishonest Majority Multiparty Computation. IEEE Trans. Dependable Secur. Comput. 22(6): 7614-7631 (2025)
[j19]Guowei Ling
, Peng Tang
, Jinyong Shan
, Fei Tang
, Weidong Qiu
:
More Efficient, Privacy-Enhanced, and Powerful Privacy-Preserving Feature Retrieval Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 20: 4815-4827 (2025)
[j18]Yingkai Dong
, Li Wang
, Zheng Li
, Hao Li
, Peng Tang
, Chengyu Hu
, Shanqing Guo
:
Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module. ACM Trans. Priv. Secur. 28(2): 19:1-19:28 (2025)
[c33]Shuyi Lang, Peng Tang, Ning Wang, Yipeng Teng, Shanqing Guo:
PriTree: Accurate Range Queries via Hierarchical Prefix-Sum Under Local Differential Privacy. APWeb-WAIM (2) 2025: 249-264
[c32]Pei Zhan
, Peng Tang
, Yangzhuo Li
, Puwen Wei
, Shanqing Guo
:
Poisoning Attacks to Local Differential Privacy for Ranking Estimation. CCS 2025: 1215-1229
[c31]Xinglin Du, Peng Tang, Rui Chen, Ning Wang, Chengyu Hu, Shanqing Guo:
Query Rewriting-Based View Generation for Efficient Multi-Relation Multi-Query with Differential Privacy. EDBT 2025: 576-588
[c30]Yuqing Li, Jintao Liang, Peng Tang, Sen Su:
Collaborative Personalized Federated Learning via Exponential Moving Average Optimization. ICASSP 2025: 1-5
[c29]Longzhu He, Chaozhuo Li, Peng Tang, Sen Su:
Going Deeper into Locally Differentially Private Graph Neural Networks. ICML 2025
[c28]Yubin Zheng
, Pak-Hei Yeung
, Jing Xia
, Tianjie Ju
, Peng Tang
, Weidong Qiu
, Jagath C. Rajapakse
:
FedDEAP: Adaptive Dual-Prompt Tuning for Multi-Domain Federated Learning. ACM Multimedia 2025: 5375-5384
[c27]Yubin Zheng, Peng Tang, Xiheng Zhang, Yijie Hong, Weidong Qiu:
Fed-SHA: An Efficient Hyperparameter Optimization Approach for Federated Learning. SMC 2025: 4641-4646
[i14]Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li
, Nadin Kokciyan, Ben Niu:
Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. CoRR abs/2501.11756 (2025)
[i13]Yuxin Chen, Peng Tang, Weidong Qiu, Shujun Li
:
Using LLMs for Automated Privacy Policy Analysis: Prompt Engineering, Fine-Tuning and Explainability. CoRR abs/2503.16516 (2025)
[i12]Longzhu He, Chaozhuo Li, Peng Tang, Lichao Sun, Sen Su, Philip S. Yu:
Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning Protocols. CoRR abs/2506.09803 (2025)
[i11]Pei Zhan, Peng Tang, Yangzhuo Li, Puwen Wei, Shanqing Guo:
Poisoning Attacks to Local Differential Privacy for Ranking Estimation. CoRR abs/2506.24033 (2025)
[i10]Yubin Zheng, Pak-Hei Yeung, Jing Xia, Tianjie Ju, Peng Tang, Weidong Qiu, Jagath C. Rajapakse
:
FedDEAP: Adaptive Dual-Prompt Tuning for Multi-Domain Federated Learning. CoRR abs/2510.18837 (2025)
[i9]Ke Hu, Liyao Xiang, Peng Tang, Weidong Qiu:
FedTopo: Topology-Informed Representation Alignment in Federated Learning under Non-I.I.D. Conditions. CoRR abs/2511.12628 (2025)- 2024
[j17]Ning Wang, Yifei Liu, Zhigang Wang, Zhiqiang Wei, Ruichun Tang, Peng Tang, Ge Yu:
Locally differentially private frequency distribution estimation with relative error optimization. Frontiers Comput. Sci. 18(5): 185613 (2024)
[j16]Chaomeng Chen, Zhenhong Zhou, Peng Tang
, Longzhu He, Sen Su:
Enforcing group fairness in privacy-preserving Federated Learning. Future Gener. Comput. Syst. 160: 890-900 (2024)
[j15]Zhaoxing Han
, Chengyu Hu, Tongyaqi Li
, Qingqiang Qi, Peng Tang
, Shanqing Guo:
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning. Neural Networks 179: 106574 (2024)
[j14]Guowei Ling
, Fei Tang
, Chaochao Cai, Jinyong Shan
, Haiyang Xue
, Wulu Li, Peng Tang
, Xinyi Huang
, Weidong Qiu
:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 19: 2201-2216 (2024)
[c26]Haozhang Li, Yangde Wang
, Weidong Qiu
, Shujun Li
, Peng Tang
:
PassTSL: Modeling Human-Created Passwords Through Two-Stage Learning. ACISP (3) 2024: 404-423
[c25]Peng Tang, Lifan Wang, Weidong Qiu, Zheng Huang, Qiangmin Wang:
Fuzzy Clustered Federated Learning Under Mixed Data Distributions. AAMAS 2024: 2501-2503
[c24]Yubin Zheng, Peng Tang, Tianjie Ju, Hao Wang, Weidong Qiu, Jagath C. Rajapakse
:
Federated Semi-supervised Learning for Medical Image Segmentation with Intra-client and Inter-client Consistency. BIBM 2024: 4054-4059
[c23]Yukun Yan, Peng Tang, Rui Chen, Qilong Han, Ruochen Du:
DPC: Filtering Out Patch-Based Poisoned Samples with Differential Privacy. ESORICS (2) 2024: 289-309
[c22]Tongyaqi Li
, Qingqiang Qi
, Chengyu Hu
, Xuelei Li
, Peng Tang
, Shanqing Guo
:
PFDF: Privacy Preserving Federated Decision Forest for Classification. ICA3PP (1) 2024: 80-99
[c21]Chi Zhang
, Qilong Han, Rui Chen, Xiangyu Zhao
, Peng Tang, Hongtao Song:
SSDRec: Self-Augmented Sequence Denoising for Sequential Recommendation. ICDE 2024: 803-815
[c20]Ke Hu, Liyao Xiang, Peng Tang, Weidong Qiu:
Feature Norm Regularized Federated Learning: Utilizing Data Disparities for Model Performance Gains. IJCAI 2024: 4136-4146
[c19]Yubin Zheng, Peng Tang, Tianjie Ju, Weidong Qiu, Bo Yan:
Fine-Grained Contrastive Learning for Pulmonary Nodule Classification. IJCNN 2024: 1-8
[c18]Peng Tang, Xiaojie Xu, Xinpeng Li, Weidong Qiu, Zheng Huang:
FLKT: Improving the Fidelity and Robustness of Federated Learning Aggregation Rules via the Key-Data and Trap-Model. SecureComm (4) 2024: 226-248
[c17]Kunpeng Song, Mingzhang Sun, Kui Zhou, Peng Tang, Ning Wang, Shanqing Guo:
Multi-Dimensional Data Collection Under Personalized Local Differential Privacy. TrustCom 2024: 1438-1447
[c16]Liang Wang, Li Liu, Pei Zhan, Peng Tang, Puwen Wei, Shanqing Guo:
Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation. TrustCom 2024: 1448-1457
[i8]Chi Zhang, Qilong Han, Rui Chen, Xiangyu Zhao, Peng Tang, Hongtao Song:
SSDRec: Self-Augmented Sequence Denoising for Sequential Recommendation. CoRR abs/2403.04278 (2024)
[i7]Yubin Zheng, Peng Tang, Tianjie Ju, Weidong Qiu, Bo Yan:
Federated Semi-supervised Learning for Medical Image Segmentation with intra-client and inter-client Consistency. CoRR abs/2403.12695 (2024)
[i6]Yangde Wang, Haozhang Li, Weidong Qiu, Shujun Li
, Peng Tang:
PassTSL: Modeling Human-Created Passwords through Two-Stage Learning. CoRR abs/2407.14145 (2024)
[i5]Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li
:
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers. CoRR abs/2410.04754 (2024)
[i4]Guowei Ling, Peng Tang, Weidong Qiu:
Low-Communication Updatable PSI from Asymmetric PSI and PSU. IACR Cryptol. ePrint Arch. 2024: 1712 (2024)- 2023
[j13]Ijazul Haq
, Weidong Qiu, Jie Guo, Peng Tang:
Pashto offensive language detection: a benchmark dataset and monolingual Pashto BERT. PeerJ Comput. Sci. 9: e1617 (2023)
[j12]Ijazul Haq
, Weidong Qiu, Jie Guo, Peng Tang:
Correction of whitespace and word segmentation in noisy Pashto text using CRF. Speech Commun. 153: 102970 (2023)
[j11]Fei Tang
, Guowei Ling
, Chaochao Cai, Jinyong Shan
, Xuanqi Liu
, Peng Tang
, Weidong Qiu:
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications. IEEE Trans. Inf. Forensics Secur. 18: 3517-3530 (2023)
[j10]Peng Tang
, Rui Chen
, Sen Su
, Shanqing Guo
, Lei Ju
, Gaoyuan Liu:
Multi-Party Sequential Data Publishing Under Differential Privacy. IEEE Trans. Knowl. Data Eng. 35(9): 9562-9577 (2023)
[c15]Huina Li
, Guozhen Liu, Haochen Zhang, Peng Tang, Weidong Qiu:
Automatic Search of Linear Structure: Applications to Keccak and Ascon. Inscrypt (2) 2023: 172-192
[c14]Yubin Zheng, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo, Zheng Huang:
A Novel Deep Learning Framework for Interpretable Drug-Target Interaction Prediction with Attention and Multi-task Mechanism. DASFAA (4) 2023: 336-352
[c13]Gaoyuan Liu, Peng Tang, Chengyu Hu, Chongshi Jin, Shanqing Guo:
Multi-Dimensional Data Publishing With Local Differential Privacy. EDBT 2023: 183-194
[c12]Ning Wang, Yaohua Wang, Zhigang Wang, Jie Nie, Zhiqiang Wei, Peng Tang, Yu Gu, Ge Yu:
PrivNUD: Effective Range Query Processing under Local Differential Privacy. ICDE 2023: 2660-2672
[i3]Yunruo Zhang, Tianyu Du, Shouling Ji, Peng Tang, Shanqing Guo:
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks. CoRR abs/2304.07980 (2023)
[i2]Ke Hu, Weidong Qiu, Peng Tang:
Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights. CoRR abs/2312.06951 (2023)- 2022
[j9]Ning Wang, Wei Zheng, Zhigang Wang, Zhiqiang Wei, Yu Gu, Peng Tang, Ge Yu:
Collecting and analyzing key-value data under shuffled differential privacy. Frontiers Comput. Sci. 17(2): 172606 (2022)
[j8]Yangyang Bao
, Weidong Qiu, Peng Tang
, Xiaochun Cheng
:
Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System. IEEE J. Biomed. Health Informatics 26(5): 2041-2051 (2022)
[c11]Ge Han, Zheng Li, Peng Tang, Chengyu Hu, Shanqing Guo:
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks. HPCC/DSS/SmartCity/DependSys 2022: 1601-1608
[c10]Peng Tang, Rui Chen, Chongshi Jin, Gaoyuan Liu, Shanqing Guo:
Marginal Release Under Multi-party Personalized Differential Privacy. ECML/PKDD (4) 2022: 555-571
[i1]Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu:
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications. IACR Cryptol. ePrint Arch. 2022: 1573 (2022)- 2021
[j7]Peng Tang
, Xiang Cheng, Sen Su
, Rui Chen, Huaxi Shao:
Differentially Private Publication of Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 18(2): 780-795 (2021)
[c9]Peng Tang, Rui Chen, Sen Su, Shanqing Guo, Lei Ju, Gaoyuan Liu:
Differentially Private Publication of Multi-Party Sequential Data. ICDE 2021: 145-156
[c8]Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen:
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICS (1) 2021: 260-275- 2020
[j6]Huijuan Lian
, Weidong Qiu, Di Yan
, Jie Guo, Zhe Li, Peng Tang:
Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Comput. Secur. 96: 101845 (2020)
[j5]Peng Tang, Weidong Qiu, Zheng Huang, Shuang Chen, Min Yan, Huijuan Lian
, Zhe Li:
Anomaly detection in electronic invoice systems based on machine learning. Inf. Sci. 535: 172-186 (2020)
[j4]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
Detection of SQL injection based on artificial neural network. Knowl. Based Syst. 190: 105528 (2020)
[j3]Huijuan Lian, Weidong Qiu, Di Yan
, Zheng Huang, Peng Tang:
Efficient and secure k-nearest neighbor query on outsourced data. Peer-to-Peer Netw. Appl. 13(6): 2324-2333 (2020)
[j2]Xiang Cheng
, Peng Tang
, Sen Su
, Rui Chen, Zequn Wu, Binyuan Zhu:
Multi-Party High-Dimensional Data Publishing Under Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(8): 1557-1571 (2020)
[c7]Jingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo:
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning. SocialSec 2020: 203-214
2010 – 2019
- 2019
[c6]Huijuan Lian, Weidong Qiu, Di Yan
, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. DSC 2019: 84-91
[c5]Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. DSC 2019: 300-305
[c4]Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. DSC 2019: 306-311- 2018
[c3]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
SQL Injection Behavior Mining Based Deep Learning. ADMA 2018: 445-454- 2016
[c2]Sen Su, Peng Tang, Xiang Cheng, Rui Chen, Zequn Wu:
Differentially private multi-party high-dimensional data publishing. ICDE 2016: 205-216- 2015
[j1]Xiang Cheng, Sen Su, Shengzhi Xu, Peng Tang, Zhengyi Li:
Differentially private maximal frequent sequence mining. Comput. Secur. 55: 175-192 (2015)
[c1]Sen Su, Han Yan, Xiang Cheng, Peng Tang, Peng Xu, Jianliang Xu
:
Authentication of Top-k Spatial Keyword Queries in Outsourced Databases. DASFAA (1) 2015: 567-588
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-24 00:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







