Huayi Duan

Orcid: 0000-0002-1162-2337

According to our database1, Huayi Duan authored at least 29 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024

CAMP: Compositional Amplification Attacks against DNS.
Proceedings of the 33rd USENIX Security Symposium, 2024

DNS Congestion Control in Adversarial Settings.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024

2023
Optimizing Secure Decision Tree Inference Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Practical Auditing of Dynamic Data in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2023

${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services.
IEEE Trans. Dependable Secur. Comput., 2023

A Formal Framework for End-to-End DNS Resolution.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

RHINE: Robust and High-performance Internet Naming with E2E Authenticity.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Securely and Efficiently Outsourcing Decision Tree Inference.
IEEE Trans. Dependable Secur. Comput., 2022

Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2020

Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

pRide: private ride request for online ride hailing service with secure hardware enclave.
Proceedings of the International Symposium on Quality of Service, 2019

Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

SPEED: Accelerating Enclave Applications Via Secure Deduplication.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Towards Secure and Efficient Outsourcing of Machine Learning Classification.
Proceedings of the Computer Security - ESORICS 2019, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Assuring String Pattern Matching in Outsourced Middleboxes.
IEEE/ACM Trans. Netw., 2018

Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Inf. Forensics Secur., 2018

Tutorial: Building Secure and Trustworthy Blockchain Applications.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

2017
LightBox: SGX-assisted Secure Network Functions at Near-native Speed.
CoRR, 2017

2016
Towards verifiable outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Bringing execution assurances of pattern matching in outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016


  Loading...