Publications
2024
2023
2022
-
IJIS -
ESORICSGAME: Generative-Based Adaptive Model Extraction AttackIn 27th European Symposium on Research in Computer Security Computer Security (ESORICS 2022), 2022
-
SOUPSNew Differential Privacy Communication Pipeline and Design Framework (Poster)In 18th Symposium on Usable Privacy and Security (SOUPS 2022), 2022
-
FCMulti-party Updatable Delegated Private Set IntersectionIn 26th International Conference on Financial Cryptography and Data Security, 2022
2021
-
Sci. China Inf. Sci. Cetus: an efficient symmetric searchable encryption against file-injection attack with SGXSci. China Inf. Sci., 2021 -
ICDMDifferentially Private String Sanitization for Frequency-Based Mining TasksIn IEEE International Conference on Data Mining, 2021
2020
2019
2018
2017
-
CCSBetrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud ComputingIn ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
-
ICCInformation Flow Control with Minimal Tag DisclosureIn International Conference on Internet of Things and Cloud Computing, 2016
2015
2014
2013
-
CCSWhen private set intersection meets big data: an efficient and scalable protocolIn ACM SIGSAC Conference on Computer and Communications Security, 2013
2011
2010
2009
2008
-
Capturing Patient Consent in Pervasive Healthcare ApplicationsIn Mobile Health Solutions for Biomedical Applications, 2008
2007
-
AHM