Haining Lu

According to our database1, Haining Lu authored at least 15 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison.
IACR Cryptol. ePrint Arch., 2024

2023
Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy.
J. Comput. Sci. Technol., September, 2023

RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks.
Proceedings of the IEEE International Conference on Software Analysis, 2023

2021
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2019
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

2017
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Privacy-preserving data sharing scheme over cloud for social applications.
J. Netw. Comput. Appl., 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
Sci. China Inf. Sci., 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2012
Phrase Search over Encrypted Data with Symmetric Encryption Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Reducing extra storage in searchable symmetric encryption scheme.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

On Improving the Performance of Public Key Encryption with Keyword Search.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
An improved dynamic provable data possession model.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

1999
Modulation transfer spectroscopy of <sup>127</sup>I<sub>2</sub> hyperfine structure near 532 nm using a self-made diode-pumped Nd: YVO <sub>4</sub>-KTP laser.
IEEE Trans. Instrum. Meas., 1999


  Loading...