Cheng Hong
Orcid: 0000-0002-5410-8573
According to our database1,
Cheng Hong
authored at least 49 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Comput. Methods Sci. Eng., 2024
IACR Cryptol. ePrint Arch., 2024
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over ℤ<sub>2<sup>k</sup></sub> without Ring Extensions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Joint extraction of biomedical overlapping triples through feature partition encoding.
Expert Syst. Appl., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference.
IACR Cryptol. ePrint Arch., 2023
Communication Efficient Secret Sharing with Dynamic Communication-Computation Conversion.
Proceedings of the IEEE INFOCOM 2023, 2023
CHAM: A Customized Homomorphic Encryption Accelerator for Fast Matrix-Vector Product.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022
Joint Extraction of Biomedical Entities and Relations based on Decomposition and Recombination Strategy.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
2021
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
2020
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication.
Secur. Commun. Networks, 2020
Proc. VLDB Endow., 2020
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
CoRR, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
HomoPAI: A Secure Collaborative Machine Learning Platform based on Homomorphic Encryption.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
2019
DPSAaS: Multi-Dimensional Data Sharing and Analytics as Services under Local Differential Privacy.
Proc. VLDB Endow., 2019
Comput. Chem. Eng., 2019
Proceedings of the 2019 International Conference on Management of Data, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
The joint effect of association-based corporate posting strategy and eWOM comment valence on social media.
Internet Res., 2017
"Liking" and being "liked": How are personality traits and demographics associated with giving and receiving "likes" on Facebook?
Comput. Hum. Behav., 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Proceedings of the Database Systems for Advanced Applications, 2017
2016
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
2015
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
2014
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
Proceedings of the Seventh International Conference on Image and Graphics, 2013
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
A novel modulation strategy based on two dimensional modulation for balancing DC-link capacitor voltages of cascaded H-Bridges Rectifier.
Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society, 2012
A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Proceedings of the Web-Age Information Management - 12th International Conference, 2011