Danfeng Zhang

Orcid: 0000-0003-1942-6872

According to our database1, Danfeng Zhang authored at least 68 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exact Privacy Analysis of the Gaussian Sparse Histogram Mechanism.
J. Priv. Confidentiality, 2024

Reconstruction Attacks on Aggressive Relaxations of Differential Privacy.
J. Priv. Confidentiality, 2024

CtChecker: A Precise, Sound and Efficient Static Analysis for Constant-Time Programming (Artifact).
Dagstuhl Artifacts Ser., 2024

AGORA: Open More and Trust Less in Binary Verification Service.
CoRR, 2024

Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy.
CoRR, 2024

Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols.
Proceedings of the 33rd USENIX Security Symposium, 2024

TALISMAN: Tamper Analysis for Reference Monitors.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Veiled Pathways: Investigating Covert and Side Channels Within GPU Uncore.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

{CtChecker}: A Precise, Sound and Efficient Static Analysis for Constant-Time Programming.
Proceedings of the 38th European Conference on Object-Oriented Programming, 2024

2023
Quantifying and Mitigating Cache Side Channel Leakage with Differential Set.
Proc. ACM Program. Lang., October, 2023

Free gap estimates from the exponential mechanism, sparse vector, noisy max and related algorithms.
VLDB J., January, 2023

PrecipGradeNet: A New Paradigm and Model for Precipitation Retrieval with Grading of Precipitation Intensity.
Remote. Sens., January, 2023

Answering Private Linear Queries Adaptively using the Common Mechanism.
Proc. VLDB Endow., 2023

Improving bowel preparation for colonoscopy with a smartphone application driven by artificial intelligence.
npj Digit. Medicine, 2023

A Floating-Point Secure Implementation of the Report Noisy Max with Gap Mechanism.
CoRR, 2023

An Optimal and Scalable Matrix Mechanism for Noisy Marginals under Convex Loss Functions.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Hardware Support for Constant-Time Programming.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

Learning Discrete Document Representations in Web Search.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System.
CoRR, 2022

Path following method for a snake robot based on virtual edge guidance strategy.
Proceedings of the 17th IEEE International Conference on Control & Automation, 2022

Towards a General-Purpose Dynamic Information Flow Policy.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Performant Binary Fuzzing without Source Code using Static Instrumentation.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Optimizing Fitness-For-Use of Differentially Private Linear Queries.
Proc. VLDB Endow., 2021

SpecSafe: detecting cache side channels in a speculative world.
Proc. ACM Program. Lang., 2021

Understanding TEE Containers, Easy to Use? Hard to Trust.
CoRR, 2021

The Permute-and-Flip Mechanism is Identical to Report-Noisy-Max with Exponential Noise.
CoRR, 2021

Fluid: a framework for approximate concurrency via controlled dependency relaxation.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Ghost Thread: Effective User-Space Cache Side Channel Protection.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

DPGen: Automated Program Synthesis for Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Guidelines for Implementing and Auditing Differentially Private Systems.
CoRR, 2020

Longitudinal associations among neuroticism, depression, and cyberbullying in early adolescents.
Comput. Hum. Behav., 2020

Integrating Co-Clustering and Interpretable Machine Learning for the Prediction of Intravenous Immunoglobulin Resistance in Kawasaki Disease.
IEEE Access, 2020

Application of Deep Learning for Online Handwritten Mathematical Expression Recognition: A Review.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2020

BCoal: Bucketing-Based Memory Coalescing for Efficient and Secure GPUs.
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2020

CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Free Gap Information from the Differentially Private Sparse Vector and Noisy Max Mechanisms.
Proc. VLDB Endow., 2019

Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Proceedings of the 28th USENIX Security Symposium, 2019

CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Proving differential privacy with shadow execution.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

Three Orthogonal Vanishing Points Estimation in Structured Scenes Using Convolutional Neural Networks.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
A derivation framework for dependent security label inference.
Proc. ACM Program. Lang., 2018

Toward Detecting Violations of Differential Privacy.
CoRR, 2018

Radial Lens Distortion Correction by Adding a Weight Layer with Inverted Foveal Models to Convolutional Neural Networks.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

RCoal: Mitigating GPU Timing Attack via Subwarp-Based Randomized Coalescing Techniques.
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2018

Detecting Violations of Differential Privacy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SHErrLoc: A Static Holistic Error Locator.
ACM Trans. Program. Lang. Syst., 2017

Towards a Flow- and Path-Sensitive Information Flow Analysis: Technical Report.
CoRR, 2017

PCPPI: a comprehensive database for the prediction of Penicillium-crop protein-protein interactions.
Database J. Biol. Databases Curation, 2017

CacheD: Identifying Cache-Based Timing Channels in Production Software.
Proceedings of the 26th USENIX Security Symposium, 2017

LightDP: towards automating differential privacy proofs.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017

Towards a Flow- and Path-Sensitive Information Flow Analysis.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
AutoPriv: Automating Differential Privacy Proofs.
CoRR, 2016

Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller.
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016

SecDCP: secure dynamic cache partitioning for efficient timing channel protection.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
Sound and Practical Methods for Full-System Timing Channel Control.
PhD thesis, 2015

Diagnosing type errors with class.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

A Hardware Design Language for Timing-Sensitive Information-Flow Security.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Toward general diagnosis of static errors.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Ironclad Apps: End-to-End Security via Automated Full-System Verification.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2012
Fully Automated Colon Segmentation for the Computation of Complete Colon Centerline in Virtual Colonoscopy.
IEEE Trans. Biomed. Eng., 2012

Language-based control and mitigation of timing channels.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

2011
Distribution rule of corrosion damage morphology parameters for aluminum alloy.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Predictive mitigation of timing channels in interactive systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Predictive black-box mitigation of timing channels.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
AspectC2C: a symmetric aspect extension to the C language.
ACM SIGPLAN Notices, 2008

Automated Aspect Recommendation through Clustering-Based Fan-in Analysis.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

2007
Toward Efficient Aspect Mining for Linux.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007


  Loading...