Hung Dang

According to our database1, Hung Dang authored at least 23 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Mixed Fault Tolerance Protocols with Trusted Execution Environment.
CoRR, 2022

2021
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2019
Self-Expiring Data Capsule using Trusted Execution Environment.
CoRR, 2019

Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking.
CoRR, 2019

Autonomous Membership Service for Enclave Applications.
CoRR, 2019

Towards Scaling Blockchain Systems via Sharding.
Proceedings of the 2019 International Conference on Management of Data, 2019

Towards a Marketplace for Secure Outsourced Computations.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Keeping Time-Release Secrets through Smart Contracts.
IACR Cryptol. ePrint Arch., 2018

Fair Marketplace for Secure Outsourced Computations.
CoRR, 2018

Chain of Trust: Can Trusted Hardware Help Scaling Blockchains?
CoRR, 2018

Learning Inverse Mappings with Adversarial Criterion.
CoRR, 2018

2017
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute.
Proc. Priv. Enhancing Technol., 2017

PermuteRam: Optimizing Oblivious Computation for Efficiency.
IACR Cryptol. ePrint Arch., 2017

Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes.
CoRR, 2017

Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Evading Classifiers by Morphing in the Dark.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Privacy-Preserving Data Deduplication on Trusted Processors.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
DexterJS: robust testing platform for DOM-based XSS vulnerabilities.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Auto-patching DOM-based XSS at scale.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

PrAd: Enabling Privacy-Aware Location based Advertising.
Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, 2015

2013
Maximum Complex Task Assignment: Towards Tasks Correlation in Spatial Crowdsourcing.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

2007
On Sensitivity Ranking Using Analytic Hierarchy Process.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2007


  Loading...