浙大隐私计算团队精品论文集合

简介: 浙大隐私计算团队精品论文集合来啦!

MPC

Correlated Randomness Teleportation via Semi-trusted Hardware – Enabling Silent Multi-party computation
Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zou, Weiran Liu, Lei Zhang, Kui Ren
Proceedings of the 26th European Symposium on Research in Computer Security(ESORICS 2021)

Encrypted databases

HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services (Best Paper Award) [Paper ]
Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao, Feifei Li
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems (ICDCS 2020)

Cryptanalysis of An Encrypted Database In SIGMOD '14. Xinle Cao, Jian Liu, Hao Lu, Kui Ren VLDB '21

Zero-knowledge proof

Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
F Baldimtsi, A Kiayias, T Zacharias, B Zhang
International Conference on the Theory and Application of Cryptology and …
Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
F Baldimtsi, A Kiayias, T Zacharias, B Zhang
International Conference on the Theory and Application of Cryptology and …

Succinct Scriptable NIZK via Trusted Hardware [Paper]
Bingshen Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou*, Phuc Thai, Hong-Sheng Zhou, Kui Ren
Proceedings of the 26th European Symposium on Research in Computer Security(ESORICS 2021)

Private set intersection (PSI)

Private Set Intersection for Unequal Set Sizes with Mobile Applications.
Á Kiss, J Liu, T Schneider, N Asokan, B Pinkas
Proc. Priv. Enhancing Technol. 2017 (4), 177-197
The circle game: Scalable private membership test using trusted hardware
S Tamrakar, J Liu, A Paverd, JE Ekberg, B Pinkas, N Asokan
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications

Privacy-preserving machine learning

Oblivious neural network predictions via minionn transformations
J Liu, M Juuti, Y Lu, N Asokan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
SoK: Modular and efficient private decision tree evaluation
Á Kiss, M Naderpour, J Liu, T Schneider, N Asokan
Proceedings on Privacy Enhancing Technologies
Federboost: Private federated learning for gbdt
Z Tian, R Zhang, X Hou, J Liu, K Ren
arXiv preprint arXiv:2011.02796

Cloud security

Privacy-preserving public auditing for data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
2010 IEEE INFOCOM, 1-9
Achieving secure, scalable, and fine-grained data access control in cloud computing
S Yu, C Wang, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-9
Privacy-preserving multi-keyword ranked search over encrypted cloud data
N Cao, C Wang, M Li, K Ren, W Lou
IEEE Transactions on parallel and distributed systems 25 (1), 222-233
Privacy-preserving public auditing for secure cloud storage
C Wang, S Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
Computer Security–ESORICS 2009, 355-370
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
M Li, S Yu, Y Zheng, K Ren, W Lou
IEEE transactions on parallel and distributed systems 24 (1), 131-143
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-5
Secure deduplication of encrypted data without additional independent servers
J Liu, N Asokan, B Pinkas
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …
Secure deduplication of encrypted data: Refined model and new constructions
J Liu, L Duan, Y Li, N Asokan
Cryptographers’ Track at the RSA Conference, 374-393

Differential privacy

Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications
Generating synthetic decentralized social graphs with local differential privacy
Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …
GANobfuscator: Mitigating information leakage under GAN via differential privacy
C Xu, J Ren, D Zhang, Y Zhang, Z Qin, K Ren
IEEE Transactions on Information Forensics and Security 14 (9), 2358-2371
DPPro: Differentially private high-dimensional data release via random projection
C Xu, J Ren, Y Zhang, Z Qin, K Ren
IEEE Transactions on Information Forensics and Security 12 (12), 3081-3093
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy
Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren
IEEE INFOCOM
Analyzing subgraph statistics from extended local views with decentralized differential privacy
H Sun, X Xiao, I Khalil, Y Yang, Z Qin, H Wang, T Yu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications

相关实践学习
部署Stable Diffusion玩转AI绘画(GPU云服务器)
本实验通过在ECS上从零开始部署Stable Diffusion来进行AI绘画创作,开启AIGC盲盒。
相关文章
|
机器学习/深度学习 人工智能 数据挖掘
数据上新 | AI Earth上线长时序土地覆盖数据集(来自武汉大学黄昕教授团队)
数据上新 | AI Earth上线长时序土地覆盖数据集(来自武汉大学黄昕教授团队)
数据上新 | AI Earth上线长时序土地覆盖数据集(来自武汉大学黄昕教授团队)
|
2月前
|
机器学习/深度学习 人工智能 数据库
克雷研究所100万美元奖金要归AI了,数学界规则大改,未来数学家如何应对海量猜想
【6月更文挑战第1天】AI在数学领域的突破正在改写数学研究规则。伦敦数学科学研究所的AI预测椭圆曲线秩,与克雷研究所的千禧年问题相关,显示AI在高风险数学问题上的潜力。AI还发现了纽结理论中的新关系,并能生成数学公式的猜想。尽管AI有助于发现模式和猜想,但它仍依赖于数学家的直觉来判断猜想的重要性。未来,AI将成为数学家的工具,加速研究进程,但人类的创造力和洞察力仍是关键。
58 7
|
2月前
技术心得记录:概率统计20——估计量的评选标准
技术心得记录:概率统计20——估计量的评选标准
14 0
|
3月前
|
机器学习/深度学习 编解码 自然语言处理
华为诺亚实验室提出CFT | 大模型打压下语义分割该何去何从?或许这就是答案!
华为诺亚实验室提出CFT | 大模型打压下语义分割该何去何从?或许这就是答案!
53 0
|
机器学习/深度学习 存储 缓存
遍览数年历史视频、挖掘用户隐藏兴趣,快手终身行为建模方案TWIN入选KDD 2023
遍览数年历史视频、挖掘用户隐藏兴趣,快手终身行为建模方案TWIN入选KDD 2023
644 0
|
安全 数据安全/隐私保护
隐私计算论文合集「联邦学习系列」第2期
隐私计算论文合集「联邦学习系列」第2期
187 0
|
机器学习/深度学习 数据采集 移动开发
覆盖四种场景、包含正负向反馈,腾讯、西湖大学等发布推荐系统公开数据集Tenrec(1)
覆盖四种场景、包含正负向反馈,腾讯、西湖大学等发布推荐系统公开数据集Tenrec
238 0
|
数据采集 机器学习/深度学习 搜索推荐
覆盖四种场景、包含正负向反馈,腾讯、西湖大学等发布推荐系统公开数据集Tenrec(2)
覆盖四种场景、包含正负向反馈,腾讯、西湖大学等发布推荐系统公开数据集Tenrec
175 0
|
自然语言处理 算法 数据挖掘
ACL2022 | 清华大学、DeepMind等指出现有小样本学习方法并不稳定有效,提出评价框架
ACL2022 | 清华大学、DeepMind等指出现有小样本学习方法并不稳定有效,提出评价框架
147 0
|
机器学习/深度学习 人工智能 算法
AI生成高数题,难出新高度:MIT提出首个可出题、做题、评分的算法模型
AI生成高数题,难出新高度:MIT提出首个可出题、做题、评分的算法模型
475 0