T.-H. Hubert Chan

Orcid: 0000-0002-8340-235X

Affiliations:
  • University of Hong Kong, Department of Computer Science, Hong Kong
  • Max Planck Institute for Informatics, Saarbrücken, Germany (former)
  • Carnegie Mellon University, Computer Science Department, Pittsburgh, PA, USA (former)


According to our database1, T.-H. Hubert Chan authored at least 123 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Finding Subgraphs with Maximum Total Density and Limited Overlap in Weighted Hypergraphs.
ACM Trans. Knowl. Discov. Data, May, 2024

Max-min greedy matching problem: Hardness for the adversary and fractional variant.
Theor. Comput. Sci., February, 2024

Fully Dynamic k-Center Clustering with Outliers.
Algorithmica, January, 2024

Symmetric Splendor: Unraveling Universally Closest Refinements and Fisher Market Equilibrium through Density-Friendly Decomposition.
CoRR, 2024

Mechanism Design for Automated Market Makers.
CoRR, 2024

Fully Dynamic Algorithms for Euclidean Steiner Tree.
Proceedings of the WALCOM: Algorithms and Computation, 2024

Explaining Cryptocurrency Price Trends: Statistical Analysis of Social Media Posts vs Market Prices.
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024

Privacy Amplification by Iteration for ADMM with (Strongly) Convex Objective Functions.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A feedforward unitary equivariant neural network.
Neural Networks, April, 2023

Communication complexity of byzantine agreement, revisited.
Distributed Comput., March, 2023

Advanced Composition Theorems for Differential Obliviousness.
IACR Cryptol. ePrint Arch., 2023

Clustering Social Media Data for Bitcoin Price Prediction with Transformer Model.
Proceedings of the 6th International Conference on Machine Learning and Natural Language Processing, 2023

Generalized Sorting with Predictions Revisited.
Proceedings of the Frontiers of Algorithmics - 17th International Joint Conference, 2023

Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Fully Dynamic $k$k-Center Clustering With Improved Memory Efficiency.
IEEE Trans. Knowl. Data Eng., 2022

Opinion Dynamics Optimization by Varying Susceptibility to Persuasion via Non-Convex Local Search.
ACM Trans. Knowl. Discov. Data, 2022

Efficient and DoS-resistant Consensus for Permissioned Blockchains.
Perform. Evaluation, 2022

Locality-Preserving Oblivious RAM.
J. Cryptol., 2022

Foundations of Differentially Oblivious Algorithms.
J. ACM, 2022

A Theory of Composition for Differential Obliviousness.
IACR Cryptol. ePrint Arch., 2022

Locally Differentially Private Sparse Vector Aggregation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Distributed approximate k-core decomposition and min-max edge orientation: Breaking the diameter barrier.
J. Parallel Distributed Comput., 2021

Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms.
IACR Cryptol. ePrint Arch., 2021

Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

On the Hardness of Opinion Dynamics Optimization with L<sub>1</sub>-Budget on Varying Susceptibility to Persuasion.
Proceedings of the Computing and Combinatorics - 27th International Conference, 2021

Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Re-Revisiting Learning on Hypergraphs: Confidence Interval, Subgradient Method, and Extension to Multiclass.
IEEE Trans. Knowl. Data Eng., 2020

Fully Dynamic Approximate k-Core Decomposition in Hypergraphs.
ACM Trans. Knowl. Discov. Data, 2020

Generalizing the hypergraph Laplacian via a diffusion process with mediators.
Theor. Comput. Sci., 2020

A Unified PTAS for Prize Collecting TSP and Steiner Tree Problem in Doubling Metrics.
ACM Trans. Algorithms, 2020

KClist++: A Simple Algorithm for Finding k-Clique Densest Subgraphs in Large Graphs.
Proc. VLDB Endow., 2020

Optimizing Social Welfare for Network Bargaining Games in the Face of Instability, Greed and Idealism.
Theory Comput. Syst., 2020

Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions.
IACR Cryptol. ePrint Arch., 2020

Perfectly Secure Oblivious Parallel RAM with O(log<sup>3</sup> N/ log log N) Overhead.
IACR Cryptol. ePrint Arch., 2020

Blockchain with Varying Number of Players.
IACR Cryptol. ePrint Arch., 2020

MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture.
IACR Cryptol. ePrint Arch., 2020

Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search.
CoRR, 2020

Maximizing the Expected Influence in Face of the Non-progressive Adversary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Bucket Oblivious Sort: An Extremely Simple Oblivious Sort.
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020

Sublinear-Round Byzantine Agreement Under Corrupt Majority.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Influence Maximization Under the Non-progressive Linear Threshold Model.
Proceedings of the Frontiers in Algorithmics - 14th International Workshop, 2020

2019
Diffusion operator and spectral analysis for directed hypergraph Laplacian.
Theor. Comput. Sci., 2019

Round Complexity of Byzantine Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2019

Consensus through Herding.
IACR Cryptol. ePrint Arch., 2019

Revisiting Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search.
Proceedings of the World Wide Web Conference, 2019

2018
Reducing Curse of Dimensionality: Improved PTAS for TSP (with Neighborhoods) in Doubling Metrics.
ACM Trans. Algorithms, 2018

Online Submodular Maximization with Free Disposal.
ACM Trans. Algorithms, 2018

Analyzing Node-Weighted Oblivious Matching Problem via Continuous LP with Jump Discontinuity.
ACM Trans. Algorithms, 2018

A PTAS for the Steiner Forest Problem in Doubling Metrics.
SIAM J. Comput., 2018

Ranking on Arbitrary Graphs: Rematch via Continuous Linear Programming.
SIAM J. Comput., 2018

Path ORAM: An Extremely Simple Oblivious RAM Protocol.
J. ACM, 2018

Spectral Properties of Hypergraph Laplacian and Approximation Algorithms.
J. ACM, 2018

PaLa: A Simple Partially Synchronous Blockchain.
IACR Cryptol. ePrint Arch., 2018

PiLi: An Extremely Simple Synchronous Blockchain.
IACR Cryptol. ePrint Arch., 2018

Perfectly Secure Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2018

More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting.
IACR Cryptol. ePrint Arch., 2018

Communication-Efficient Byzantine Agreement without Erasures.
CoRR, 2018

An SDP Primal-Dual Approximation Algorithm for Directed Hypergraph Expansion and Sparsest Cut with Product Demands.
CoRR, 2018

On (1,ϵ)-Restricted Max-Min Fair Allocation Problem.
Algorithmica, 2018

Fully Dynamic <i>k</i>-Center Clustering.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

SDP Primal-Dual Approximation Algorithms for Directed Hypergraph Expansion and Sparsest Cut with Product Demands.
Proceedings of the Computing and Combinatorics - 24th International Conference, 2018

2017
Distributed Private Data Analysis: Lower Bounds and Practical Constructions.
ACM Trans. Algorithms, 2017

Finding k most influential edges on flow graphs.
Inf. Syst., 2017

Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM.
IACR Cryptol. ePrint Arch., 2017

Cache-Oblivious and Data-Oblivious Sorting and Applications.
IACR Cryptol. ePrint Arch., 2017

On the Depth of Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2017

Oblivious Computation with Data Locality.
IACR Cryptol. ePrint Arch., 2017

Large Scale Density-friendly Graph Decomposition via Convex Programming.
Proceedings of the 26th International Conference on World Wide Web, 2017

Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Online Submodular Maximization with Free Disposal: Randomization Beats ¼ for Partition Matroids.
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017

Re-revisiting Learning on Hypergraphs: Confidence Interval and Subgradient Method.
Proceedings of the 34th International Conference on Machine Learning, 2017

Online Submodular Maximization Problem with Vector Packing Constraint.
Proceedings of the 25th Annual European Symposium on Algorithms, 2017

Double Auction for Resource Allocation in Cloud Computing.
Proceedings of the CLOSER 2017, 2017

Maintaining Densest Subsets Efficiently in Evolving Hypergraphs.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
On Hierarchical Routing in Doubling Metrics.
ACM Trans. Algorithms, 2016

Circuit OPRAM: A (Somewhat) Tight Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2016

Online Submodular Maximization with Free Disposal: Randomization Beats 0.25 for Partition Matroids.
CoRR, 2016

On (1, epsilon)-Restricted Max-Min Fair Allocation Problem.
Proceedings of the 27th International Symposium on Algorithms and Computation, 2016

Online Algorithms for Covering and Packing Problems with Convex Objectives.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

Beating Ratio 0.5 for Weighted Oblivious Matching Problems.
Proceedings of the 24th Annual European Symposium on Algorithms, 2016

2015
New Doubling Spanners: Better and Simpler.
SIAM J. Comput., 2015

How to Vote Privately Using Bitcoin.
IACR Cryptol. ePrint Arch., 2015

How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Spectral Properties of Laplacian and Stochastic Diffusion Process for Edge Expansion in Hypergraphs.
CoRR, 2015

Influence Maximization under The Non-progressive Linear Threshold Model.
CoRR, 2015

Online Convex Covering and Packing Problems.
CoRR, 2015

Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree.
Algorithmica, 2015

Finding Subgraphs with Maximum Total Density and Limited Overlap.
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, 2015

Revealing Optimal Thresholds for Generalized Secretary Problem via Continuous LP: Impacts on Online <i>K</i>-Item Auction and Bipartite <i>K</i>-Matching with Random Arrival Order.
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 2015

Dynamic Tree Shortcut with Constant Degree.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

Cheeger Inequalities for General Edge-Weighted Directed Graphs.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

On the Complexity of the Minimum Independent Set Partition Problem.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

2014
Fast Convergence for Consensus in Dynamic Networks.
ACM Trans. Algorithms, 2014

SCORAM: Oblivious RAM for Secure Computation.
IACR Cryptol. ePrint Arch., 2014

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
IACR Cryptol. ePrint Arch., 2014

An SDP Primal-Dual Algorithm for Approximating the Lovász-Theta Function.
Algorithmica, 2014

Ranking on Arbitrary Graphs: Rematch via Continuous LP with Monotone and Boundary Condition Constraints.
Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, 2014

An incentive protocol for distributed dynamic P2P video-on-demand streaming.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Oblivious Data Structures.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Primal-Dual Continuous LP Method on the Multi-choice Multi-best Secretary Problem.
CoRR, 2013

2012
Approximating TSP on Metrics with Bounded Global Growth.
SIAM J. Comput., 2012

Optimal Lower Bound for Differentially Private Multi-Party Aggregation.
IACR Cryptol. ePrint Arch., 2012

Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams.
IACR Cryptol. ePrint Arch., 2012

Incubators vs Zombies: Fault-Tolerant, Short, Thin and Lanky Spanners for Doubling Metrics
CoRR, 2012

Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite.
Proceedings of the Algorithms - ESA 2012, 2012

2011
Capturing continuous data and answering aggregate queries in probabilistic XML.
ACM Trans. Database Syst., 2011

Private and Continual Release of Statistics.
ACM Trans. Inf. Syst. Secur., 2011

Oblivious RAM with O((log N)<sup>3</sup>) Worst-Case Cost.
IACR Cryptol. ePrint Arch., 2011

Privacy-Preserving Stream Aggregation with Fault Tolerance.
IACR Cryptol. ePrint Arch., 2011

A QPTAS for TSP with Fat Weakly Disjoint Neighborhoods in Doubling Metrics.
Discret. Comput. Geom., 2011

Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Network and Distributed System Security Symposium, 2011

Oblivious RAM with O((logN)3) Worst-Case Cost.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Ultra-low-dimensional embeddings for doubling metrics.
J. ACM, 2010

Aggregate queries for discrete and continuous probabilistic XML.
Proceedings of the Database Theory, 2010

2009
Metric Embeddings with Relaxed Guarantees.
SIAM J. Comput., 2009

Small Hop-diameter Sparse Spanners for Doubling Metrics.
Discret. Comput. Geom., 2009

2007
A Theory of Loss-Leaders: Making Money by Pricing Below Cost.
Proceedings of the Internet and Network Economics, Third International Workshop, 2007

Multi-Dimensional Range Query over Encrypted Data.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Spanners with Slack.
Proceedings of the Algorithms, 2006

A Tight Lower Bound for the Steiner Point Removal Problem on Trees.
Proceedings of the Approximation, 2006

A Random-Surfer Web-Graph Model.
Proceedings of the Third Workshop on Analytic Algorithmics and Combinatorics, 2006

2005
Metric Embeddings with Relaxed Guarantees.
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 2005


  Loading...