Searchable symmetric encryption with forward search privacy J Li, Y Huang, Y Wei, S Lv, Z Liu, C Dong, W Lou IEEE Transactions on Dependable and Secure Computing 18 (1), 460-474, 2019 | 180 | 2019 |
M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices C Gao, S Lv, Y Wei, Z Wang, Z Liu, X Cheng IEEE Access 6, 38860-38869, 2018 | 53 | 2018 |
FSSE: Forward secure searchable encryption with keyed-block chains Y Wei, S Lv, X Guo, Z Liu, Y Huang, B Li Information Sciences 500, 113-126, 2019 | 36 | 2019 |
How to make private distributed cardinality estimation practical, and get differential privacy for free C Hu, J Li, Z Liu, X Guo, Y Wei, X Guang, G Loukides, C Dong 30th USENIX security symposium (USENIX Security 21), 965-982, 2021 | 18 | 2021 |
FFSSE: flexible forward secure searchable encryption with efficient performance Z Liu, S Lv, Y Wei, J Li, JK Liu, Y Xiang Cryptology ePrint Archive, 2017 | 12 | 2017 |
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy X Guo, J Li, Z Liu, Y Wei, X Zhang, C Dong Science China Information Sciences 65, 1-14, 2022 | 9 | 2022 |
Forward secure searchable encryption using key-based blocks chain technique S Lv, Y Huang, B Li, Y Wei, Z Liu, JK Liu, DH Lee Algorithms and Architectures for Parallel Processing: 18th International …, 2018 | 5 | 2018 |
Eureka: a general framework for black-box differential privacy estimators Y Lu, M Magdon-Ismail, Y Wei, V Zikas Cryptology ePrint Archive, 2022 | 3 | 2022 |
Privacy-Utility Tradeoff of OLS with Random Projections Y Lu, M Magdon-Ismail, Y Wei, V Zikas arXiv preprint arXiv:2309.01243, 2023 | 1 | 2023 |
New Approach for Efficient Malicious Multiparty Private Set Intersection S Lv, Y Wei, J Jia, X Li, T Li, Z Liu, X Chen, L Guo Information Sciences, 120995, 2024 | | 2024 |
Distributed differential privacy via shuffling vs aggregation: A curious study Y Wei, J Jia, Y Wu, C Hu, C Dong, Z Liu, X Chen, Y Peng, S Wang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing J Singh, Y Wei, V Zikas Cryptology ePrint Archive, 2024 | | 2024 |
On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications W Choi, M Hhan, Y Wei, V Zikas Cryptology ePrint Archive, 2023 | | 2023 |