Taeho Jung

Orcid: 0000-0001-5873-0629

According to our database1, Taeho Jung authored at least 96 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Continuous-Observation One-Sided Two-Player Zero-Sum Partially Observable Stochastic Game With Public Actions.
IEEE Trans. Autom. Control., December, 2023

SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors.
J. Cryptol., April, 2023

Privacy Preserving In-memory Computing Engine.
CoRR, 2023

TISIN: Traceable Information Sharing in Intermittent Networks.
Proceedings of the IEEE Military Communications Conference, 2023

Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Proof-of-Federated-Learning-Subchain: Free Partner Selection Subchain Based on Federated Learning.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Federated Dynamic Graph Neural Networks with Secure Aggregation for Video-based Distributed Surveillance.
ACM Trans. Intell. Syst. Technol., 2022

ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance.
J. Parallel Distributed Comput., 2022

Developing non-interactive MPC with trusted hardware for enhanced security.
Int. J. Inf. Sec., 2022

TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving POMDP Planning via Belief Manipulation.
IEEE Control. Syst. Lett., 2022

A Collaboration Strategy in the Mining Pool for Proof-of-Neural-Architecture Consensus.
CoRR, 2022

The Stackelberg equilibrium for one-sided zero-sum partially observable stochastic games.
Autom., 2022

Measuring information gain using provenance.
Proceedings of the 14th International Workshop on the Theory and Practice of Provenance, 2022

Trac<sup>2</sup>Chain: trackability and traceability of graph data in blockchain with linkage privacy.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Monitoring Provenance of Delegated Personal Data with Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization.
IEEE Trans. Dependable Secur. Comput., 2021

GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data.
IACR Cryptol. ePrint Arch., 2021

Cryptonomial: A Framework for Private Time-Series Polynomial Calculations.
IACR Cryptol. ePrint Arch., 2021

CryptoGram: Fast Private Calculations of Histograms over Multiple Users' Inputs.
IACR Cryptol. ePrint Arch., 2021

Genomic Encryption of Biometric Information for Privacy-Preserving Forensics.
CoRR, 2021

Using Provenance to Evaluate Risk and Benefit of Data Sharing.
Proceedings of the 13th International Workshop on Theory and Practice of Provenance, 2021

Provably Secure Contact Tracing with Conditional Private Set Intersection.
Proceedings of the Security and Privacy in Communication Networks, 2021

Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery.
Proceedings of the Security and Privacy in Communication Networks, 2021

Prv<sup>2</sup>chain: Storage of Tree-structured Provenance Records in Blockchain with Linkage Privacy.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

A mining pool solution for novel proof-of-neural-architecture consensus.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

FairTrade: Efficient Atomic Exchange-based Fair Exchange Protocol for Digital Data Trading.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding.
IEEE Trans. Netw. Sci. Eng., 2020

PatronuS: A System for Privacy-Preserving Cloud Video Surveillance.
IEEE J. Sel. Areas Commun., 2020

Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM.
IACR Cryptol. ePrint Arch., 2020

SLAP: Simple Lattice-Based Private Stream Aggregation Protocol.
IACR Cryptol. ePrint Arch., 2020

Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance.
IACR Cryptol. ePrint Arch., 2020

Federated Dynamic GNN with Secure Aggregation.
CoRR, 2020

Opacity of Discrete Event Systems with Active Intruder.
CoRR, 2020

Ensuring Privacy in Location-Based Services: A Model-based Approach.
CoRR, 2020

DLchain: Blockchain with Deep Learning as Proof-of-Useful-Work.
Proceedings of the Services - SERVICES 2020, 2020

Secure Single-Server Nearly-Identical Image Deduplication.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

ProvNet: Networked Blockchain for Decentralized Secure Provenance.
Proceedings of the Blockchain - ICBC 2020, 2020

2019
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified?
ACM Trans. Internet Techn., 2019

AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers.
IEEE Trans. Inf. Forensics Secur., 2019

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model.
IEEE Trans. Dependable Secur. Comput., 2019

Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks.
IACR Cryptol. ePrint Arch., 2019

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Energy-recycling Blockchain with Proof-of-Deep-Learning.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Exploiting Computation Power of Blockchain for Biomedical Image Segmentation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

2018
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats.
IEEE Trans. Inf. Forensics Secur., 2018

PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups.
IEEE Trans. Dependable Secur. Comput., 2018

MIS2: Misinformation and Misbehavior Mining on the Web.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Hidebehind: Enjoy Voice Input with Voiceprint Unclonability and Anonymity.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

Crowdlearning: Crowded Deep Learning with Data Privacy.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

2017
PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud.
IEEE Trans. Parallel Distributed Syst., 2017

Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs.
IEEE/ACM Trans. Netw., 2017

Martian: Message Broadcast via LED Lights to Heterogeneous Smartphones.
IEEE J. Sel. Areas Commun., 2017

Detecting Driver's Smartphone Usage via Nonintrusively Sensing Driving Dynamics.
IEEE Internet Things J., 2017

VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices.
CoRR, 2017

Scalable privacy-preserving participant selection in mobile crowd sensing.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

AccountTrade: Accountable protocols for big data trading against dishonest consumers.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis.
IEEE Trans. Intell. Transp. Syst., 2016

Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'.
IEEE Trans. Inf. Forensics Secur., 2016

SmartLoc: sensing landmarks silently for smartphone-based metropolitan localization.
EURASIP J. Wirel. Commun. Netw., 2016

Privacy Inference on Knowledge Graphs: Hardness and Approximation.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Ensuring Semantic Validity in Privacy-Preserving Aggregate Statistics.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

User-Demand-Oriented Privacy-Preservation in Video Delivering.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Graph-based privacy-preserving data publication.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Real-time update with joint optimization of route selection and update scheduling for SDNs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

2015
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks.
IEEE Trans. Mob. Comput., 2015

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel.
IEEE Trans. Dependable Secur. Comput., 2015

Enabling privacy-preserving auctions in big data.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud.
Proceedings of the 44th International Conference on Parallel Processing, 2015

POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection.
CoRR, 2014

Cloud-based Privacy Preserving Image Storage, Sharing and Search.
CoRR, 2014

Predicting the influencers on wireless subscriber churn.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Demo: visual attention driven networking with smart glasses.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

It starts with iGaze: visual attention driven networking with smart glasses.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Network agile preference-based prefetching for mobile devices.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Continuous user identification via touch and movement behavioral biometrics.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Achieving differential privacy of data disclosure in the smart grid.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design.
CoRR, 2013

Infinite Choices of Data Aggregations with Linear Number of Keys.
CoRR, 2013

SmartLoc: Sensing Landmarks Silently for Smartphone Based Metropolitan Localization.
CoRR, 2013

SmartLoc: push the limit of the inertial sensor based metropolitan localization using smartphone.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Verifiable private multi-party computation: Ranging and ranking.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Search me if you can: Privacy-preserving location query service.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Privacy preserving cloud data access with multi-authorities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely
CoRR, 2012

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption
CoRR, 2012

Closing the gap in the multicast capacity of hybrid wireless networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Numerical Analysis of Instabilities of Organic Thin-Film Transistors for Flexible Displays.
Proceedings of the Convergence and Hybrid Information Technology, 2012


  Loading...