Changyu Dong
Orcid: 0000-0002-8625-0275
According to our database1,
Changyu Dong
authored at least 81 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes.
IEEE Trans. Inf. Forensics Secur., 2024
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain.
J. Inf. Secur. Appl., 2024
DPGazeSynth: Enhancing eye-tracking virtual reality privacy with differentially private data synthesis.
Inf. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Beyond Statistical Estimation: Differentially Private Individual Computation in the Shuffle Model.
CoRR, 2024
2023
Total variation distance privacy: Accurately measuring inference attacks and improving utility.
Inf. Sci., May, 2023
IEEE Trans. Dependable Secur. Comput., 2023
The influence of explanation designs on user understanding differential privacy and making data-sharing decision.
Inf. Sci., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Knowl. Data Eng., 2022
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Intell. Syst., 2022
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022
Proceedings of the Financial Cryptography and Data Security, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021
Proceedings of the IEEE International Conference on Data Mining, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl., 2020
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Toward a Decentralized, Trust-Less Marketplace for Brokered IoT Data Trading Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
IACR Cryptol. ePrint Arch., 2018
2017
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the Computer Network Security, 2017
2016
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.
Proceedings of the Financial Cryptography and Data Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
Proceedings of the Symposium on Applied Computing, 2014
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the 2nd ACM SIGCOMM workshop on Home networks, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
2010
Sci. Comput. Program., 2010
Pers. Ubiquitous Comput., 2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
2009
2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the Trust Management II, 2008
Proceedings of the Managing Large-Scale Service Deployment, 2008
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006