Publications

2024

  1. NDSS
    Secret-Shared Shuffle with Malicious Security
    Xiangfu Song, Dong Yin, Jianli Bai,  Changyu Dong, and Ee-Chien Chang
    In 31st Annual Network and Distributed System Security Symposium (NDSS 2024), 2024
  2. TOPS
    Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
    Liqun Chen,  Changyu Dong, Christopher J. P. Newton, and Yalan Wang
    ACM Trans. Priv. Secur., 2024
  3. TIFS
    Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study
    Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu,  Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, and Shaowei Wang
    IEEE Trans. Inf. Forensics Secur., 2024
  4. TIFS
    Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers
    Boyu Zhu,  Changyu Dong, Yuan Zhang, Yunlong Mao, and Sheng Zhong
    IEEE Trans. Inf. Forensics Secur., 2024
  5. CSUR
    Defenses to Membership Inference Attacks: A Survey
    Li Hu, Anli Yan, Hongyang Yan, Jin Li, Teng Huang, Yingying Zhang,  Changyu Dong, and Chunsheng Yang
    ACM Comput. Surv., 2024

2023

  1. PQCrypto
    Hash-Based Direct Anonymous Attestation
    Liqun Chen,  Changyu Dong, Nada El Kassem, Christopher J. P. Newton, and Yalan Wang
    In 14th International Symposium on Post-Quantum Cryptography (PQCrypto 2023), 2023
  2. AsiaCCS
    Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
    Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li,  Changyu Dong, Zheli Liu, and Willy Susilo
    In 2023 ACM Asia Conference on Computer and Communications Security (AsiaCCS 2023), 2023
  3. Inf. Sci.
    The influence of explanation designs on user understanding differential privacy and making data-sharing decision
    Zikai Alex Wen, Jingyu Jia, Hongyang Yan, Yaxing Yao, Zheli Liu, and Changyu Dong
    Information Sciences, 2023
  4. Inf. Sci.
    Explanation leaks: Explanation-guided model extraction attacks
    Anli Yan, Teng Huang, Lishan Ke, Xiaozhang Liu, Qi Chen, and Changyu Dong
    Information Sciences, 2023
  5. Inf. Sci.
    Total variation distance privacy: Accurately measuring inference attacks and improving utility
    Jingyu Jia, Chang Tan, Zhewei Liu, Xinhao Li, Zheli Liu, Siyi Lv, and Changyu Dong
    Information Sciences, 2023
  6. ACNS
    Predicate Private Set Intersection with Linear Complexity
    Yaxi Yang, Jian Weng, Yufeng Yi,  Changyu Dong, Leo Yu Zhang, and Jianying Zhou
    In 21st International Conference on Applied Cryptography and Network Security (ACNS 2023), 2023
  7. AINA
    Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption
    Emanuele Scala,  Changyu Dong, Flavio Corradini, and Leonardo Mostarda
    In 37th International Conference on Advanced Information Networking and Applications (AINA-2023), 2023

2022

  1. IJIS
    Understanding adaptive gradient clipping in DP-SGD, empirically
    Guanbiao Lin, Hongyang Yan, Guang Kou, Teng Huang, Shiyu Peng, Yingying Zhang, and Changyu Dong
    Int. J. Intell. Syst., 2022
  2. ESORICS
    GAME: Generative-Based Adaptive Model Extraction Attack
    Yi Xie, Mengdie Huang, Xiaoyu Zhang,  Changyu Dong, Willy Susilo, and Xiaofeng Chen
    In 27th European Symposium on Research in Computer Security Computer Security (ESORICS 2022), 2022
  3. SOUPS
    New Differential Privacy Communication Pipeline and Design Framework (Poster)
    Jingyu Jia, Zikai Wen, Zheli Liu, and Changyu Dong
    In 18th Symposium on Usable Privacy and Security (SOUPS 2022), 2022
  4. TDSC
    Defending against Membership Inference Attacks with High Utility by GAN
    Li Hu, Jin Li, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yingying Zhang, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2022
  5. TPDS
    Differentially Private Byzantine-robust Federated Learning
    Xu Ma, Xiaoqian Sun, Yuduo Wu, Zheli Liu, Xiaofeng Chen, and Changyu Dong
    IEEE Trans. Parallel Distributed Syst., 2022
  6. FC
    Multi-party Updatable Delegated Private Set Intersection
    Aydin Abadi,  Changyu Dong, Steven Murdoch, and Sotirios Terzis
    In 26th International Conference on Financial Cryptography and Data Security, 2022

2021

  1. Sci. China Inf. Sci.
    Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, and Changyu Dong
    Sci. China Inf. Sci., 2021
  2. ICDM
    Differentially Private String Sanitization for Frequency-Based Mining Tasks
    Huiping Chen,  Changyu Dong, Liyue Fan, Grigorios Loukides, Solon P. Pissis, and Leen Stougie
    In IEEE International Conference on Data Mining, 2021
  3. USENIX
    How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free
    Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, and Changyu Dong
    In 30th USENIX Security Symposium, 2021
  4. TIFS
    VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning
    Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou,  Changyu Dong, and Thar Baker
    IEEE Trans. Inf. Forensics Secur., 2021
  5. TDSC
    Searchable Symmetric Encryption with Forward Search Privacy
    Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu,  Changyu Dong, and Wenjing Lou
    IEEE Trans. Dependable Secur. Comput., 2021
  6. TSC
    Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format
    Peng Jiang, Jianting Ning, Kaitai Liang,  Changyu Dong, Jiageng Chen, and Zhenfu Cao
    IEEE Trans. Serv. Comput., 2021

2020

  1. TDSC
    Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection
    Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  2. Blockchain
    Context-based consensus for appendable-block blockchains
    Roben Castagna Lunardi, Maher Alharby, Henry C. Nunes, Avelino F. Zorzo,  Changyu Dong, and Aad Moorsel
    In IEEE International Conference on Blockchain, 2020
  3. TDSC
    EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption
    Zheli Liu, Jin Li, Siyi Lv, Yanyu Huang, Liang Guo, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  4. TKDE
    MAS-Encryption and Its Applications in Privacy-Preserving Classifiers
    Chongzhi Gao, Jin Li, Shibing Xia, Kim-Kwang Raymond Choo, Wenjing Lou, and Changyu Dong
    IEEE Trans. Knowl. Data Eng., 2020
  5. TDSC
    Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
    Xiangfu Song,  Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao
    IEEE Trans. Dependable Secur. Comput., 2020

2019

  1. TDSC
    Efficient Delegated Private Set Intersection on Outsourced Private Datasets
    Aydin Abadi, Sotirios Terzis, Roberto Metere, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2019
  2. Blockchain
    Toward a Decentralized, Trust-Less Marketplace for Brokered IoT Data Trading Using Blockchain
    Shaimaa Bajoudah,  Changyu Dong, and Paolo Missier
    In IEEE International Conference on Blockchain, 2019

2018

  1. TIFS
    Analyzing and Patching SPEKE in ISO/IEC
    Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong
    IEEE Trans. Inf. Forensics Secur., 2018

2017

  1. TIFS
    Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity
    Changyu Dong, and Grigorios Loukides
    IEEE Trans. Inf. Forensics Secur., 2017
  2. CCS
    Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
    Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, and Aad Moorsel
    In ACM SIGSAC Conference on Computer and Communications Security, 2017
  3. MMM-ACNS
    Automated Cryptographic Analysis of the Pedersen Commitment Scheme
    Roberto Metere, and Changyu Dong
    In 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2017

2016

  1. FC
    VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
    Aydin Abadi, Sotirios Terzis, and Changyu Dong
    In 20th International Conference on Financial Cryptography and Data Security, 2016
  2. ICC
    Information Flow Control with Minimal Tag Disclosure
    Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier,  Changyu Dong, David M. Eyers, and Jean Bacon
    In International Conference on Internet of Things and Cloud Computing, 2016

2015

  1. CANS
    Secure Set-Based Policy Checking and Its Application to Password Registration
    Changyu Dong, and Franziskus Kiefer
    In 14th International Conference on Cryptology and Network Security, 2015
  2. SEC
    O-PSI: Delegated Private Set Intersection on Outsourced Datasets
    Aydin Abadi, Sotirios Terzis, and Changyu Dong
    In 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, 2015
  3. SPW
    Efficient Data Intensive Secure Computation: Fictional or Real?
    Changyu Dong
    In 23rd International Workshop on Security Protocols, 2015

2014

  1. ESORICS
    A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost
    Changyu Dong, and Liqun Chen
    In 19th European Symposium on Research in Computer Security, 2014
  2. PAKDD
    A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining
    Changyu Dong, and Liqun Chen
    In Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2014
  3. SAC
    Efficient protocols for private record linkage
    Zikai Wen, and Changyu Dong
    In ACM Symposium on Applied Computing, 2014

2013

  1. CCS
    When private set intersection meets big data: an efficient and scalable protocol
    Changyu Dong, Liqun Chen, and Zikai Wen
    In ACM SIGSAC Conference on Computer and Communications Security, 2013
  2. DBSec
    Fair Private Set Intersection with a Semi-trusted Arbiter
    Changyu Dong, Liqun Chen, Jan Camenisch, and Giovanni Russello
    In 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, 2013

2011

  1. JCS
    Shared and searchable encrypted data for untrusted servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    J. Comput. Secur., 2011
  2. IFIPTM
    Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications
    Changyu Dong, and Naranker Dulay
    In 5th IFIP WG 11.11 International Conference on Trust Management, 2011
  3. HomeNets
    Argumentation-based fault diagnosis for home networks
    Changyu Dong, and Naranker Dulay
    In 2nd ACM SIGCOMM workshop on Home networks, 2011

2010

  1. PUC
    Context-based authentication and transport of cultural assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    Pers. Ubiquitous Comput., 2010
  2. SCP
    Providing data confidentiality against malicious hosts in Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    Sci. Comput. Program., 2010
  3. IFIPTM
    Shinren: Non-monotonic Trust Management for Distributed Systems
    Changyu Dong, and Naranker Dulay
    In 4th IFIP WG 11.11 International Conference on Trust Management, 2010

2009

  1. POLICY
    Policies for Self Tuning Home Networks
    Dimosthenis Pediaditakis, Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    In IEEE International Symposium on Policies for Distributed Systems and Networks, 2009

2008

  1. Capturing Patient Consent in Pervasive Healthcare Applications
    Giovanni Russello,  Changyu Dong, and Naranker Dulay
    In Mobile Health Solutions for Biomedical Applications, 2008
  2. FINA
    A Workflow-Based Access Control Framework for e-Health Applications
    Giovanni Russello,  Changyu Dong, and Naranker Dulay
    In 4th International Symposium on Frontiers in Networking with Applications, 2008
  3. COORDINATION
    Encrypted Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    In 10th International Conference on Coordination Models and Languages, 2008
  4. DBSec
    Shared and Searchable Encrypted Data for Untrusted Servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008
  5. DSOM
    Flexible Resolution of Authorisation Conflicts in Distributed Systems
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2008
  6. IFIPTM
    Place and Time Authentication of Cultural Assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    In Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008
  7. PervasiveHealth
    Personalising situated workflow systems for pervasive healthcare applications
    Giovanni Russello,  Changyu Dong, and Naranker Dulay
    In 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
  8. POLICY
    Consent-Based Workflows for Healthcare Management
    Giovanni Russello,  Changyu Dong, and Naranker Dulay
    In 9th IEEE International Workshop on Policies for Distributed Systems and Networks, 2008

2007

  1. AHM
    A Policy-Based Framework for e-Health Applications
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Jatinder Singh, Jean Bacon, and Ken Moody
    In UK e-Science All Hands Meeting 2007, 2007
  2. MMM-ACNS
    Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, 2007
  3. SSNDS
    Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
    Giovanni Russello,  Changyu Dong, and Naranker Dulay
    In 3rd IEEE Symposium on Security Network and Distributed Systems, 2007
  4. IFIPTM
    Trust Transfer in Distributed Systems
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2007
  5. POLICY
    Authorisation and Conflict Resolution for Hierarchical Domains
    Giovanni Russello,  Changyu Dong, and Naranker Dulay
    In 8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007

2006

  1. PervasiveHealth
    Privacy Preserving Trust Negotiation for Pervasive Healthcare
    Changyu Dong, and Naranker Dulay
    In 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006