Jun-Bum Shin

Orcid: 0009-0005-7985-6163

According to our database1, Jun-Bum Shin authored at least 22 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
HEaaN.MLIR: An Optimizing Compiler for Fast Ring-Based Homomorphic Encryption.
Proc. ACM Program. Lang., 2023

HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption.
Proceedings of the International Conference on Machine Learning, 2023

2021
Automated Extraction and Presentation of Data Practices in Privacy Policies.
Proc. Priv. Enhancing Technol., 2021

Consistency Analysis of Data-Usage Purposes in Mobile Apps.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Lattice-Based Secure Biometric Authentication for Hamming Distance.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Learning New Words from Keystroke Data with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2020

Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography.
Sci. China Inf. Sci., 2020

2019
Collecting and Analyzing Multidimensional Data with Local Differential Privacy.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2018

Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

Instant Privacy-Preserving Biometric Authentication for Hamming Distance.
IACR Cryptol. ePrint Arch., 2018

New Communication Technologies in Poster Design through the Religion Conflict in Global Social Issues.
Proceedings of the 22nd International Conference Information Visualisation, 2018

PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy.
CoRR, 2016

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

New Paradigm of Social Poster Embedding Unexpected Graphic Pattern for the Ongoing Issue, Radiation Contamination in Fukushima.
Proceedings of the 20th International Conference Information Visualisation, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2012
A Privacy Protection Method for Social Network Data against Content/Degree Attacks.
IEICE Trans. Inf. Syst., 2012

2002
Bauer-Berson-Feiertag attack revisited.
IACR Cryptol. ePrint Arch., 2002

New DSA-Verifiable Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 2002

1998
A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...