Chenghong Wang

Orcid: 0000-0001-7837-5791

According to our database1, Chenghong Wang authored at least 35 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Memristor-Based Spectral Decomposition of Matrices and Its Applications.
IEEE Trans. Computers, May, 2023

Encrypted Data Management Systems with tunable Privacy.
PhD thesis, 2023

Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion.
IACR Cryptol. ePrint Arch., 2023

RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference.
CoRR, 2023

LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

AutoReP: Automatic ReLU Replacement for Fast Private Network Inference.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2022
Construction of a Family of Maximally Entangled Bases in ℂd ⊗ ℂd′.
Entropy, 2022

IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

Variance of the Gradient Also Matters: Privacy Leakage from Gradients.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
China's 12-Year Quest of Autonomous Vehicular Intelligence: The Intelligent Vehicles Future Challenge Program.
IEEE Intell. Transp. Syst. Mag., 2021

DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Practical Security and Privacy for Database Systems.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Against Membership Inference Attack: Pruning is All You Need.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

A Secure and Efficient Federated Learning Framework for NLP.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

TAG: Gradient Attack on Transformer-based Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

2020
SAPAG: A Self-Adaptive Privacy Attack From Gradients.
CoRR, 2020

ESMFL: Efficient and Secure Models for Federated Learning.
CoRR, 2020

MCMIA: Model Compression Against Membership Inference Attack in Deep Neural Networks.
CoRR, 2020

Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.
Proceedings of the 2020 International Conference on Management of Data, 2020

Poirot: private contact summary aggregation: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

2019
SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Parallel testing of vehicle intelligence via virtual-real interaction.
Sci. Robotics, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

2018
A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Privacy-preserving biomedical data dissemination via a hybrid approach.
Proceedings of the AMIA 2018, 2018

2017
The k-peak Decomposition: Mapping the Global Structure of Graphs.
Proceedings of the 26th International Conference on World Wide Web, 2017

SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach.
Proceedings of the AMIA 2017, 2017

2014
Special issue on big data research in China.
Knowl. Inf. Syst., 2014

2009
A local approach of adaptive affinity propagation clustering for large scale data.
Proceedings of the International Joint Conference on Neural Networks, 2009

2008
An Improved Delay-dependent Stability Criteria for Recurrent Neural Networks with Time-varying Delay.
Proceedings of the 2008 IEEE International Symposium on Intelligent Control, 2008

2007
Rapid Recognition of Dynamical Patterns via Deterministic Learning and State Observation.
Proceedings of the 22nd IEEE International Symposium on Intelligent Control, 2007

Deterministic Learning and Pattern-Based NN Control.
Proceedings of the 22nd IEEE International Symposium on Intelligent Control, 2007

2004
An enhanced 0-1 mixed-integer LP formulation for traffic signal control.
IEEE Trans. Intell. Transp. Syst., 2004


  Loading...