HEaaN.MLIR: An Optimizing Compiler for Fast Ring-Based Homomorphic Encryption.
Proc. ACM Program. Lang., 2023
HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption.
Proceedings of the International Conference on Machine Learning, 2023
Automated Extraction and Presentation of Data Practices in Privacy Policies.
Proc. Priv. Enhancing Technol., 2021
Consistency Analysis of Data-Usage Purposes in Mobile Apps.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Lattice-Based Secure Biometric Authentication for Hamming Distance.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Learning New Words from Keystroke Data with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2020
Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography.
Sci. China Inf. Sci., 2020
Collecting and Analyzing Multidimensional Data with Local Differential Privacy.
CoRR, 2019
Collecting and Analyzing Multidimensional Data with Local Differential Privacy.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018
Instant Privacy-Preserving Biometric Authentication for Hamming Distance.
IACR Cryptol. ePrint Arch., 2018
New Communication Technologies in Poster Design through the Religion Conflict in Global Social Issues.
Proceedings of the 22nd International Conference Information Visualisation, 2018
PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016
Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy.
CoRR, 2016
Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
New Paradigm of Social Poster Embedding Unexpected Graphic Pattern for the Ongoing Issue, Radiation Contamination in Fukushima.
Proceedings of the 20th International Conference Information Visualisation, 2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
A Privacy Protection Method for Social Network Data against Content/Degree Attacks.
IEICE Trans. Inf. Syst., 2012
Bauer-Berson-Feiertag attack revisited.
IACR Cryptol. ePrint Arch., 2002
New DSA-Verifiable Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 2002
A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998