Dr Changyu Dong
| Defending against Membership Inference Attacks with High Utility by GAN | 2023 |
|
Xu Ma Dr Changyu Dong
| Differentially Private Byzantine-robust Federated Learning | 2022 |
|
Dr Changyu Dong
| EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption | 2022 |
|
Dr Changyu Dong
| Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection | 2022 |
|
Chongzhi Gao Dr Changyu Dong
| MAS-Encryption and Its Applications in Privacy-Preserving Classifiers | 2022 |
|
Dr Changyu Dong
| Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX | 2021 |
|
Dr Changyu Dong
| Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format | 2021 |
|
Dr Changhui Hu Dr Changyu Dong
| How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free | 2021 |
|
Guangjun Liu Dr Changyu Dong
| Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [适用于再生编码分布式存储的轻量型隐私保护审计方案] | 2021 |
|
Dr Changyu Dong
| Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency | 2020 |
|
Dr Changyu Dong
| VERIFL: Communication-efficient and Fast Verifiable Aggregation for Federated Learning | 2020 |
|
Dr Aydin Abadi Roberto Metere Dr Changyu Dong
| Efficient Delegated Private Set Intersection on Outsourced Private Datasets | 2019 |
|
Dr Changyu Dong
| Searchable Symmetric Encryption with Forward Search Privacy | 2019 |
|
Professor Feng Hao Roberto Metere Dr Changyu Dong
| Analysing and Patching SPEKE in ISO/IEC | 2018 |
|
Dr Changyu Dong
| Special issue on security in cloud computing | 2018 |
|
Dr Changyu Dong
| Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity | 2017 |
|
Roberto Metere Dr Changyu Dong
| Automated Cryptographic Analysis of the Pedersen Commitment Scheme | 2017 |
|
Roberto Metere Dr Changyu Dong
| Automated Cryptographic Analysis of the Pedersen Commitment Scheme | 2017 |
|
Dr Changyu Dong Dr Yilei Wang Amjad Aldweesh Patrick Mccorry Professor Aad van Moorsel et al. | Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing | 2017 |
|
Dr Changyu Dong
| Information Flow Control with Minimal Tag Disclosure | 2016 |
|
Dr Aydin Abadi Dr Changyu Dong
| VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets | 2016 |
|
Dr Changyu Dong
| Efficient Data Intensive Secure Computation: Fictional or Real | 2015 |
|
Dr Aydin Abadi Dr Changyu Dong
| O-PSI: delegated private set intersection on outsourced datasets | 2015 |
|
Dr Changyu Dong
| Secure Set-based Policy Checking and Its Application to Password Registration | 2015 |
|
Dr Changyu Dong
| A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining | 2014 |
|
Dr Changyu Dong
| A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost | 2014 |
|
Dr Changyu Dong
| Efficient protocols for private record linkage | 2014 |
|