Ning Ding
Affiliations:- Shanghai Jiao Tong University, Shanghai, China
According to our database1,
Ning Ding
authored at least 36 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Multi-source domain generalization for degradation monitoring of journal bearings under unseen conditions.
Reliab. Eng. Syst. Saf., 2023
2022
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022
Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries.
Inf. Comput., 2021
Privacy-Preserving Support Vector Machines with Flexible Deployment and Error Correction.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019
2018
Proceedings of the Network and System Security - 12th International Conference, 2018
2017
Proceedings of the Theory and Applications of Models of Computation, 2017
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the International Conference on Algorithmic Learning Theory, 2017
2016
Sci. China Inf. Sci., 2016
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the Theory and Applications of Models of Computation, 2015
On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
2014
Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security - 17th International Conference, 2014
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
2011
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011
Proceedings of the Information Security Practice and Experience, 2011
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
2007
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007