Le Trieu Phong

Orcid: 0000-0003-2219-1867

According to our database1, Le Trieu Phong authored at least 53 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Frameworks for Privacy-Preserving Federated Learning.
IEICE Trans. Inf. Syst., January, 2024

2023
Can Sleep Apnea Be Detected from Human Pulse Waveform with Laplace Noise?
J. Adv. Comput. Intell. Intell. Informatics, September, 2023

Differentially private stochastic gradient descent via compression and memorization.
J. Syst. Archit., February, 2023

Distributed Stochastic Gradient Descent With Compressed and Skipped Communication.
IEEE Access, 2023

2022
Decentralized Stochastic Optimization With Random Attendance.
IEEE Signal Process. Lett., 2022

Distributed differentially-private learning with communication efficiency.
J. Syst. Archit., 2022

Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022

2021
Decentralized Descent Optimization With Stochastic Gradient Signs for Device-to-Device Networks.
IEEE Wirel. Commun. Lett., 2021

Communication-Efficient Distributed SGD with Error-Feedback, Revisited.
Int. J. Comput. Intell. Syst., 2021

2020
Distributed SGD With Flexible Gradient Compression.
IEEE Access, 2020

Distributed SignSGD With Improved Accuracy and Network-Fault Tolerance.
IEEE Access, 2020

2019
Privacy-Preserving Deep Learning via Weight Transmission.
IEEE Trans. Inf. Forensics Secur., 2019

On the Convergence Proof of AMSGrad and a New Version.
IEEE Access, 2019

2018
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2018

Efficient Homomorphic Encryption with Key Rotation and Security Update.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Privacy-Preserving Deep Learning for any Activation Function.
CoRR, 2018

2017
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions.
Int. J. Appl. Cryptogr., 2017

Input and Output Privacy-Preserving Linear Regression.
IEICE Trans. Inf. Syst., 2017

Anonymous and leakage resilient IBE and IPE.
Des. Codes Cryptogr., 2017

Privacy preserving extreme learning machine using additively homomorphic encryption.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

A Generic yet Efficient Method for Secure Inner Product.
Proceedings of the Network and System Security - 11th International Conference, 2017

Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers.
Proceedings of the Network and System Security - 11th International Conference, 2017

Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

A New Secure Matrix Multiplication from Ring-LWE.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Privacy-Preserving Deep Learning: Revisited and Enhanced.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption.
IEICE Trans. Inf. Syst., 2016

Proxy Re-Encryption Schemes with Key Privacy from LWE.
IACR Cryptol. ePrint Arch., 2016

Scalable and Secure Logistic Regression via Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

2015
Generic Fully Simulatable Adaptive Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Hardness Estimation of LWE via Band Pruning.
IACR Cryptol. ePrint Arch., 2015

Fast and Secure Linear Regression and Biometric Authentication with Security Update.
IACR Cryptol. ePrint Arch., 2015

Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

IBE Under k k -LIN with Shorter Ciphertexts and Private Keys.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited.
IACR Cryptol. ePrint Arch., 2013

UC-Secure Multi-Session OT Using Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2013

Key-Private Proxy Re-encryption under LWE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Leakage Resilient IBE and IPE under the DLIN Assumption.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Undeniable and Unpretendable Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

New Leakage Resilient CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2012

2011
Maximum Leakage Resilient IBE and IPE.
IACR Cryptol. ePrint Arch., 2011

2010
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption.
IACR Cryptol. ePrint Arch., 2010

Leakage-Resilient RFID Authentication with Forward-Privacy.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

A Framework for Constructing Convertible Undeniable Signatures.
Proceedings of the Provable Security - 4th International Conference, 2010

Leakage Resilient Strong Key-Insulated Signatures in Public Channel.
Proceedings of the Trusted Systems - Second International Conference, 2010

2009
New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Provably Secure Convertible Undeniable Signatures with Unambiguity.
IACR Cryptol. ePrint Arch., 2009

2008
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption.
IACR Cryptol. ePrint Arch., 2008

Stateful identity-based encryption scheme: faster encryption and decryption.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model.
IACR Cryptol. ePrint Arch., 2006

On a Variation of Kurosawa-Desmedt Encryption Scheme.
IACR Cryptol. ePrint Arch., 2006


  Loading...