Shiran Pan

According to our database1, Shiran Pan authored at least 12 papers between 2016 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Enforcing Access Control in Distributed Version Control Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

2018
Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2017

How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack.
Proceedings of the Information Security - 20th International Conference, 2017

2016
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016


  Loading...