Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Dr Changyu Dong.

Newcastle AuthorsTitleYearFull text
Dr Changyu Dong
Defending against Membership Inference Attacks with High Utility by GAN2023
Xu Ma
Dr Changyu Dong
Differentially Private Byzantine-robust Federated Learning2022
Dr Changyu Dong
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption2022
Dr Changyu Dong
Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection2022
Chongzhi Gao
Dr Changyu Dong
MAS-Encryption and Its Applications in Privacy-Preserving Classifiers2022
Dr Changyu Dong
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX2021
Dr Changyu Dong
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format2021
Dr Changhui Hu
Dr Changyu Dong
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free2021
Guangjun Liu
Dr Changyu Dong
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [适用于再生编码分布式存储的轻量型隐私保护审计方案]2021
Dr Changyu Dong
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency2020
Dr Changyu Dong
VERIFL: Communication-efficient and Fast Verifiable Aggregation for Federated Learning2020
Roberto Metere
Dr Changyu Dong
Efficient Delegated Private Set Intersection on Outsourced Private Datasets2019
Dr Changyu Dong
Searchable Symmetric Encryption with Forward Search Privacy2019
Professor Feng Hao
Roberto Metere
Dr Changyu Dong
Analysing and Patching SPEKE in ISO/IEC2018
Dr Changyu Dong
Special issue on security in cloud computing2018
Dr Changyu Dong
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity2017
Roberto Metere
Dr Changyu Dong
Automated Cryptographic Analysis of the Pedersen Commitment Scheme2017
Roberto Metere
Dr Changyu Dong
Automated Cryptographic Analysis of the Pedersen Commitment Scheme2017
Dr Changyu Dong
Dr Yilei Wang
Amjad Aldweesh
Patrick Mccorry
Professor Aad van Moorsel
et al.
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing2017
Dr Changyu Dong
Information Flow Control with Minimal Tag Disclosure2016
Dr Changyu Dong
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets2016
Dr Changyu Dong
Efficient Data Intensive Secure Computation: Fictional or Real2015
Dr Changyu Dong
O-PSI: delegated private set intersection on outsourced datasets2015
Dr Changyu Dong
Secure Set-based Policy Checking and Its Application to Password Registration2015
Dr Changyu Dong
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining2014
Dr Changyu Dong
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost2014
Dr Changyu Dong
Efficient protocols for private record linkage2014