Fang-Yu Rao

According to our database1, Fang-Yu Rao authored at least 17 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Privacy-Preserving User Profile Matching in Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Practical Anonymous Subscription with Revocation Based on Broadcast Encryption.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.
ACM Trans. Priv. Secur., 2019

On the Security of a Variant of ElGamal Encryption Scheme.
IEEE Trans. Dependable Secur. Comput., 2019

Privacy Techniques for Edge Computing Systems.
Proc. IEEE, 2019

Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

Hybrid Differentially-Private String Matching.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2016
ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

Practical privacy-preserving user profile matching in social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Privacy-Preserving Association Rule Mining in Cloud Computing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Privacy-Preserving Assessment of Social Network Data Trustworthiness.
Int. J. Cooperative Inf. Syst., 2014

2013
Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Priv., 2013

2011
Privacy-preserving assessment of location data trustworthiness.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011


  Loading...