Hong, Yuan

Yuan Hong

Associate Professor, School of Computing

Email yuan.hong@uconn.edu
Phone (860) 486-4818
Mailing Address University of Connecticut 371 Fairfield Way, Unit 4155 Storrs, CT 06269-4155
Link Affiliation Website
Google Scholar Link

Brief Bio

Dr. Yuan Hong is an Associate Professor in the School of Computing at University of Connecticut (UConn) and affiliated with the Connecticut Advanced Computing Center (CACC). Prior to joining UConn in 2022, he was an Assistant Professor in Computer Science and Cybersecurity Program Director at Illinois Institute of Technology. He received his Ph.D degree from Rutgers University, M.Sc degree from Concordia University, Montreal, Canada, and B.Sc degree from Beijing Institute of Technology, respectively. He is a recipient of the NSF CAREER Award (2021), Cisco Research Award (2022, 2023), and the finalist of the Meta Research Award (2021). He also received a National Physics Olympiad Prize in China.

He is broadly interested in fundamental research in Security and Privacy (e.g., Differential Privacy, Secure Computation, Applied Cryptography, Adversarial Attacks, Provable Defenses) while intersecting with Cyber-Physical Systems, Machine Learning, Computer Vision, NLP, and Theory. His research works are published in top conferences in Security (S&P, CCS, USENIX Security, NDSS), and Data Science (e.g., SIGMOD, VLDB, CVPR, ECCV, EMNLP, KDD, AAAI), as well as top (interdisciplinary) journals (e.g., multiple IEEE/ACM Trans, T-ITS, TR_C). He is a Senior Member of the ACM and IEEE.

  • Principles of Databases: Fall 25
  • Cybersecurity Lab: Fall 23, Spring 24, Fall 24
  • Computer Security: Spring 23, Spring 25
  • CSE Design Project: 2022-2023, 2025-2026
  • Cryptography: Spring 21, Spring 20
  • Data Privacy and Security: Fall 21, Fall 20, Spring 19, Spring 18
  • Database Organization: Spring 22, Fall 19, Fall 18, Fall 17
  • Doctoral Seminar: Spring 18
  • Earlier Teaching: Cybercrime, Forensics, Computer Network
Differentially private naive bayes classification
J Vaidya, B Shafiq, A Basu, Y Hong
2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI …
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518
Secure transformation for multiparty linear programming
Y Hong, J Vaidya
Security challenges in smart grid implementation
S Goel, Y Hong, V Papakonstantinou, D Kloza
Smart grid security, 1-39
Dynamic pricing for electric vehicle extreme fast charging
C Fang, H Lu, Y Hong, S Liu, J Chang
IEEE Transactions on Intelligent Transportation Systems 22 (1), 531-541
Releasing correlated trajectories: Towards high utility and optimal differential privacy
L Ou, Z Qin, S Liao, Y Hong, X Jia
IEEE Transactions on Dependable and Secure Computing 17 (5), 1109-1123
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669
On the robust and stable flowshop scheduling under stochastic and dynamic disruptions
F Liu, S Wang, Y Hong, X Yue
IEEE Transactions on Engineering Management 64 (4), 539-553
Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status
Y Hong, WM Liu, L Wang
IEEE Transactions on Information Forensics and Security 12 (9), 2227-2241
Effective anonymization of query logs
Y Hong, X He, J Vaidya, N Adam, V Atluri
Proceedings of the 18th ACM conference on Information and knowledge …
Wider face and pedestrian challenge 2018: Methods and results
CC Loy, D Lin, W Ouyang, Y Xiong, S Yang, Q Huang, D Zhou, W Xia, ...
arXiv preprint arXiv:1902.06854
L-srr: Local differential privacy for location-based services with staircase randomized response
H Wang, H Hong, L Xiong, Z Qin, Y Hong
Proceedings of the 2022 ACM SIGSAC Conference on computer and communications …
Preserving both privacy and utility in network trace anonymization
M Mohammady, L Wang, Y Hong, H Louafi, M Pourzandi, M Debbabi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …
An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids
Y Hong, S Goel, WM Liu
International Journal of Energy Research 40 (3), 313–331
Smart grid security
S Goel, Y Hong, V Papakonstantinou, D Kloza
Springer
Secure and efficient distributed linear programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634
Videodp: A flexible platform for video analytics with differential privacy
H Wang, S Xie, Y Hong
Proceedings on Privacy Enhancing Technologies
Privacyasst: Safeguarding user privacy in tool-using large language model agents
X Zhang, H Xu, Z Ba, Z Wang, Y Hong, J Liu, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing 21 (6), 5242-5258
A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications
Y Hong, J Vaidya, S Wang
Journal of Information Systems 28 (1), 243-268
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …