Ning Ding

Affiliations:
  • Shanghai Jiao Tong University, Shanghai, China


According to our database1, Ning Ding authored at least 35 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multi-source domain generalization for degradation monitoring of journal bearings under unseen conditions.
Reliab. Eng. Syst. Saf., 2023

2022
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries.
Inf. Comput., 2021

Privacy-Preserving Support Vector Machines with Flexible Deployment and Error Correction.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Multi-Party Private Set Intersection in Vertical Federated Learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
On Exactly Learning Disjunctions and DNFs Without Equivalence Queries.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

2018
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Learning AC<sup>0</sup> Under k-Dependent Distributions.
Proceedings of the Theory and Applications of Models of Computation, 2017

Agnostically Learning Boolean Functions with Finite Polynomial Representation.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.
Proceedings of the International Conference on Algorithmic Learning Theory, 2017

2016
Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
Sci. China Inf. Sci., 2016

Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Some New Consequences of the Hypothesis That P Has Fixed Polynomial-Size Circuits.
Proceedings of the Theory and Applications of Models of Computation, 2015

On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

2014
Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security - 17th International Conference, 2014

Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2012
Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

On Constant-Round Precise Zero-Knowledge.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Phrase Search over Encrypted Data with Symmetric Encryption Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

On Improving the Performance of Public Key Encryption with Keyword Search.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware.
Proceedings of the Information Security Practice and Experience, 2011

A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Precise bounded-concurrent zero-knowledge proofs for NP.
Sci. China Inf. Sci., 2010

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

On Obfuscating Programs with Tamper-proof Hardware.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds.
IACR Cryptol. ePrint Arch., 2009

Precise Time and Space Simulatable Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2009

Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Proceedings of the Advances in Cryptology, 2009

2007
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007


  Loading...