Publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2023
- SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge CloudJournal of Information Security and Applications (JISA) 2023
2022
- IEEE TDSCPractical Encrypted Network Traffic Pattern Matching for Secure MiddleboxesIEEE Transactions on Dependable and Secure Computing (TDSC) 2022
- IEEE TDSCAggregation Service for Federated Learning: An Efficient, Secure, and More Resilient RealizationIEEE Transactions on Dependable and Secure Computing (TDSC) 2022
- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration ControlIn The 25th Information Security Conference (ISC) 2022
- IEEE TDSCPrivacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic EncryptionIEEE Transactions on Dependable and Secure Computing (TDSC) 2022
- PrivGenDB: Efficient and Privacy-Preserving Query Executions over Encrypted SNP-Phenotype DatabaseInformatics in Medicine Unlocked 2022
- Range Search on Encrypted Spatial Data with Dynamic UpdatesJournal of Computer Security 2022
2021
- NDSSOblivSketch: Oblivious Network Measurement as a Cloud ServiceIn The 2021 Network and Distributed System Security Symposium (NDSS) 2021
- Towards Efficient and Strong Backward Private Searchable Encryption with Secure EnclavesIn The 19th International Conference on Applied Cryptography and Network Security (ACNS) 2021
- Accelerating TEE-based DNN Inference Using Mean Shift Network PruningIn The 17th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine) 2021
- NDSSPractical Non-Interactive Searchable Encryption with Forward and Backward PrivacyIn The 2021 Network and Distributed System Security Symposium (NDSS) 2021
- IEEE TDSCMulti-client Cloud-based Symmetric Searchable EncryptionIEEE Transactions on Dependable and Secure Computing (TDSC) 2021
- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic DataIn The 24th Information Security Conference (ISC) 2021
2020
- Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental DatasetsIEEE Internet of Things Journal 2020
- Accelerating Forward and Backward Private Searchable Encryption Using Trusted ExecutionIn The 18th International Conference on Applied Cryptography and Network Security (ACNS) 2020
2019
- ACM ASIACCSGraphSE2: An Encrypted Graph Database for Privacy-Preserving Social SearchIn The 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS) 2019
2018
- ACM CCSResult Pattern Hiding Searchable Encryption for Conjunctive QueriesIn The 25th ACM Conference on Computer and Communications Security (CCS) 2018
- An Encrypted Database Framework with Enforced Access Control and Blockchain ValidationIn The 14th International Conference on Information Security and Cryptology (INSCRYPT) 2018
2017
- IEEE ICDCSVirtualized Network Coding Functions on The InternetIn The 37th IEEE International Conference on Distributed Computing Systems (ICDCS) 2017
2015
- Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSNIn The 17th International Conference on Information and Communications Security (ICICS) 2015
- Hybrid Superpixel SegmentationIn The 30th IEEE International Conference on Image and Vision Computing New Zealand (IVCNZ) 2015
- A New Speculative Execution Algorithm Based on C4. 5 Decision Tree for HadoopIn The International Conference of Young Computer Scientists, Engineers and Educators (ICYCSEE) 2015