Cheng Hong

Orcid: 0000-0002-5410-8573

According to our database1, Cheng Hong authored at least 44 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree.
IACR Cryptol. ePrint Arch., 2023

BumbleBee: Secure Two-party Inference Framework for Large Transformers.
IACR Cryptol. ePrint Arch., 2023

Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference.
IACR Cryptol. ePrint Arch., 2023

CipherGPT: Secure Two-Party GPT Inference.
IACR Cryptol. ePrint Arch., 2023

FFT-less TFHE: Simpler, Faster and Scale-invariant.
IACR Cryptol. ePrint Arch., 2023

PUMA: Secure Inference of LLaMA-7B in Five Minutes.
CoRR, 2023

Communication Efficient Secret Sharing with Dynamic Communication-Computation Conversion.
Proceedings of the IEEE INFOCOM 2023, 2023

CHAM: A Customized Homomorphic Encryption Accelerator for Fast Matrix-Vector Product.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference.
IACR Cryptol. ePrint Arch., 2022

Research on Predicting Food Allergy Based on Recurrent Neural Network.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022

Joint Extraction of Biomedical Entities and Relations based on Decomposition and Recombination Strategy.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

2020
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication.
Secur. Commun. Networks, 2020

Improving Utility and Security of the Shuffler-based Differential Privacy.
Proc. VLDB Endow., 2020

PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Privacy-preserving collaborative machine learning on genomic data using TensorFlow.
IACR Cryptol. ePrint Arch., 2020

When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
CoRR, 2020

Falcon: Fast Spectral Inference on Encrypted Data.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

HomoPAI: A Secure Collaborative Machine Learning Platform based on Homomorphic Encryption.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Secure Social Recommendation Based on Secret Sharing.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Faster Secure Multiparty Computation of Adaptive Gradient Descent.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
DPSAaS: Multi-Dimensional Data Sharing and Analytics as Services under Local Differential Privacy.
Proc. VLDB Endow., 2019

Quantification of the Leakage in Federated Learning.
CoRR, 2019

Optimal design and scheduling for offshore oil-field development.
Comput. Chem. Eng., 2019

Answering Multi-Dimensional Analytical Queries under Local Differential Privacy.
Proceedings of the 2019 International Conference on Management of Data, 2019

2018
Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
IACR Cryptol. ePrint Arch., 2018

2017
The joint effect of association-based corporate posting strategy and eWOM comment valence on social media.
Internet Res., 2017

"Liking" and being "liked": How are personality traits and demographics associated with giving and receiving "likes" on Facebook?
Comput. Hum. Behav., 2017

An Efficient Wireless Fronthaul (EWF) Method for LTE Signal Transmission.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Triple line-voltage cascaded VIENNA converter applied as the medium-voltage rectifier.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Fast Multi-dimensional Range Queries on Encrypted Cloud Databases.
Proceedings of the Database Systems for Advanced Applications, 2017

2016
Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

2015
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

A 15GHz Full Duplex System for Microwave Backhauling.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2014
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptol. ePrint Arch., 2014

A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Holographic Projection Using Converging Spherical Wave Illumination.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
A novel modulation strategy based on two dimensional modulation for balancing DC-link capacitor voltages of cascaded H-Bridges Rectifier.
Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society, 2012

A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011


  Loading...