Changyu Dong

Orcid: 0000-0002-8625-0275

According to our database1, Changyu Dong authored at least 73 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Defenses to Membership Inference Attacks: A Survey.
ACM Comput. Surv., April, 2024

Sphinx-in-the-Head: Group Signatures from Symmetric Primitives.
ACM Trans. Priv. Secur., 2024

Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers.
IEEE Trans. Inf. Forensics Secur., 2024

Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Total variation distance privacy: Accurately measuring inference attacks and improving utility.
Inf. Sci., May, 2023

Defending Against Membership Inference Attacks With High Utility by GAN.
IEEE Trans. Dependable Secur. Comput., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

The influence of explanation designs on user understanding differential privacy and making data-sharing decision.
Inf. Sci., 2023

Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study.
IACR Cryptol. ePrint Arch., 2023

Secret-Shared Shuffle with Malicious Security.
IACR Cryptol. ePrint Arch., 2023

A Direct Lazy Sampling Proof Technique in Probabilistic Relational Hoare Logic.
CoRR, 2023

Hash-Based Direct Anonymous Attestation.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Personalized Differential Privacy in the Shuffle Model.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

A Survey of Privacy Preserving Subgraph Matching Methods.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption.
Proceedings of the Advanced Information Networking and Applications, 2023

Predicate Private Set Intersection with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Differentially Private Byzantine-Robust Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022

MAS-Encryption and its Applications in Privacy-Preserving Classifiers.
IEEE Trans. Knowl. Data Eng., 2022

EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding adaptive gradient clipping in DP-SGD, empirically.
Int. J. Intell. Syst., 2022

New Differential Privacy Communication Pipeline and Design Framework.
CoRR, 2022

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022

Multi-party Updatable Delegated Private Set Intersection.
Proceedings of the Financial Cryptography and Data Security, 2022

GAME: Generative-Based Adaptive Model Extraction Attack.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
IEEE Trans. Serv. Comput., 2021

VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021

Differentially Private String Sanitization for Frequency-Based Mining Tasks.
Proceedings of the IEEE International Conference on Data Mining, 2021

2020
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl., 2020

How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020

Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection.
IACR Cryptol. ePrint Arch., 2020

Context-based consensus for appendable-block blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Toward a Decentralized, Trust-Less Marketplace for Brokered IoT Data Trading Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Analyzing and Patching SPEKE in ISO/IEC.
IEEE Trans. Inf. Forensics Secur., 2018

Special issue on security in cloud computing.
J. Netw. Comput. Appl., 2018

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency.
IACR Cryptol. ePrint Arch., 2018

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
IACR Cryptol. ePrint Arch., 2018

Efficient Delegated Private Set Intersection on Outsourced Private Datasets.
IACR Cryptol. ePrint Arch., 2018

Analysing and Patching SPEKE in ISO/IEC.
CoRR, 2018

2017
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity.
IEEE Trans. Inf. Forensics Secur., 2017

Automated Cryptographic Analysis of the Pedersen Commitment Scheme.
Proceedings of the Computer Network Security, 2017

2016
Information Flow Control with Minimal Tag Disclosure.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Secure Set-based Policy Checking and Its Application to Password Registration.
IACR Cryptol. ePrint Arch., 2015

Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Efficient Data Intensive Secure Computation: Fictional or Real?
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

O-PSI: Delegated Private Set Intersection on Outsourced Datasets.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Efficient protocols for private record linkage.
Proceedings of the Symposium on Applied Computing, 2014

A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol.
IACR Cryptol. ePrint Arch., 2013

2012
Fair Private Set Intersection with a Semi-trusted Arbiter.
IACR Cryptol. ePrint Arch., 2012

2011
Shared and searchable encrypted data for untrusted servers.
J. Comput. Secur., 2011

Argumentation-based fault diagnosis for home networks.
Proceedings of the 2nd ACM SIGCOMM workshop on Home networks, 2011

Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

2010
Providing data confidentiality against malicious hosts in Shared Data Spaces.
Sci. Comput. Program., 2010

Context-based authentication and transport of cultural assets.
Pers. Ubiquitous Comput., 2010

Shinren: Non-monotonic Trust Management for Distributed Systems.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2009
Non-monotonic trust management for distributed systems.
PhD thesis, 2009

Policies for Self Tuning Home Networks.
Proceedings of the POLICY 2009, 2009

2008
Consent-Based Workflows for Healthcare Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Personalising situated workflow systems for pervasive healthcare applications.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Place and Time Authentication of Cultural Assets.
Proceedings of the Trust Management II, 2008

Flexible Resolution of Authorisation Conflicts in Distributed Systems.
Proceedings of the Managing Large-Scale Service Deployment, 2008

Encrypted Shared Data Spaces.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

A Workflow-Based Access Control Framework for e-Health Applications.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Authorisation and Conflict Resolution for Hierarchical Domains.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Trust Transfer in Distributed Systems.
Proceedings of the Trust Management, 2007

Enforcing Fine-Grained Authorization Policies for Java Mobile Agents.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Privacy Preserving Trust Negotiation for Pervasive Healthcare.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006


  Loading...