Privacy-preserving decision trees evaluation via linear functions RKH Tai, JPK Ma, Y Zhao, SSM Chow Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 119 | 2017 |
Updatable block-level message-locked encryption Y Zhao, SSM Chow IEEE Transactions on Dependable and Secure Computing, 2019 | 44 | 2019 |
Goten: Gpu-outsourcing trusted execution of neural network training LKL Ng, SSM Chow, APY Woo, DPH Wong, Y Zhao Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 14876 …, 2021 | 42 | 2021 |
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI Y Zhao, SSM Chow Workshop on Privacy in the Electronic Society (WPES), 2018 | 39* | 2018 |
Position paper on blockchain technology: Smart contract and applications W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018 | 36 | 2018 |
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou IACR International Workshop on Public Key Cryptography, 221-251, 2019 | 34 | 2019 |
Are you the one to share? Secret transfer with access structure Y Zhao, SSM Chow Proceedings on Privacy Enhancing Technologies, 2017 | 34 | 2017 |
Sharding blockchain SSM Chow, Z Lai, C Liu, E Lo, Y Zhao 2018 IEEE international conference on internet of things (iThings) and IEEE …, 2018 | 32 | 2018 |
Let’s stride blindfolded in a forest: Sublinear multi-client decision trees evaluation JPK Ma, RKH Tai, Y Zhao, SSM Chow | 21 | 2021 |
Privacy preserving collaborative filtering from asymmetric randomized encoding Y Zhao, SSM Chow International Conference on Financial Cryptography and Data Security, 459-477, 2015 | 16 | 2015 |
Volume-hiding dynamic searchable symmetric encryption with forward and backward privacy Y Zhao, H Wang, KY Lam Cryptology ePrint Archive, 2021 | 15 | 2021 |
ZkRep: A privacy-preserving scheme for reputation-based blockchain system C Huang, Y Zhao, H Chen, X Wang, Q Zhang, Y Chen, H Wang, KY Lam IEEE Internet of Things Journal 9 (6), 4330-4342, 2021 | 14 | 2021 |
Towards proofs of ownership beyond bounded leakage Y Zhao, SSM Chow International Conference on Provable Security, 340-350, 2016 | 11 | 2016 |
Cryptography-inspired federated learning for generative adversarial networks and meta learning Y Zheng, W Song, M Du, S SM Chow, Q Lou, Y Zhao, X Wang International Conference on Advanced Data Mining and Applications, 393-407, 2023 | 7 | 2023 |
Sipster: settling iou privately and quickly with smart meters SSM Chow, M Li, Y Zhao, W Jin Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 3 | 2021 |
Privacy Preserving Credit Systems SSM Chow, RWF Lai, X Wang, Y Zhao Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016 | 2 | 2016 |
Protecting membership and data in a secure multi-party computation and/or communication J Du, H Qian, Y Zhao, B Jiang, YAN Qiang US Patent 11,886,617, 2024 | 1 | 2024 |
Protecting membership in a secure multi-party computation and/or communication J Du, Y Zhao, H Qian, B Jiang, YAN Qiang US Patent 11,989,325, 2024 | | 2024 |
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing J Hu, Y Zhao, BHM Tan, KMM Aung, H Wang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Secure multi-party computation and communication J Du, H Qian, Y Zhao, B Jiang, C Chen, YAN Qiang US Patent 11,983,285, 2024 | | 2024 |