Xiao Wang

Orcid: 0000-0002-5991-7417

Affiliations:
  • Northwestern University, Department of Computer Science, Evanston, IL, USA
  • Boston University, Department of Computer Science, MA, USA
  • Massachusetts Institute of Technology, CSAIL, Cambridge, MA, USA
  • University of Maryland, College Park, MD, USA (former)


According to our database1, Xiao Wang authored at least 111 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Confidential Guardian: Cryptographically Prohibiting the Abuse of Model Abstention.
CoRR, May, 2025

Efficient Mixed-Mode Oblivious RAMs.
IACR Cryptol. ePrint Arch., 2025

BitGC Made (More) Efficient.
IACR Cryptol. ePrint Arch., 2025

Founding Zero-Knowledge Proofs of Training on Optimum Vicinity.
IACR Cryptol. ePrint Arch., 2025

Committed Vector Oblivious Linear Evaluation and Its Applications.
IACR Cryptol. ePrint Arch., 2025

DFS: Delegation-friendly zkSNARK and Private Delegation of Provers.
IACR Cryptol. ePrint Arch., 2025

Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding.
IACR Cryptol. ePrint Arch., 2025

Dory: Streaming PCG with Small Memory.
IACR Cryptol. ePrint Arch., 2025

Secure Noise Sampling for Differentially Private Collaborative Learning.
IACR Cryptol. ePrint Arch., 2025

Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC.
IACR Cryptol. ePrint Arch., 2025

Smaug: Modular Augmentation of LLVM for MPC.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Stateless Deterministic Multi-party EdDSA Signatures with Low Communication.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

On Large Language Model Continual Unlearning.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

BitGC: Garbled Circuits with 1 Bit per Gate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Split Adaptation for Pre-trained Vision Transformers.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

Murmurs of the Silenced: Secure Reporting of Misconduct Settlements.
Proceedings of the 2025 Symposium on Computer Science and Law, 2025

Authenticated BitGC for Actively Secure Rate-One 2PC.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Opca: Enabling Optimistic Concurrent Access for Multiple Users in Oblivious Data Storage.
IEEE Trans. Parallel Distributed Syst., November, 2024

Large-Scale Private Set Intersection in the Client-Server Setting.
IACR Cryptol. ePrint Arch., 2024

Garbled Circuits with 1 Bit per Gate.
IACR Cryptol. ePrint Arch., 2024

Leakage-Resilience of Circuit Garbling.
IACR Cryptol. ePrint Arch., 2024

Towards Optimal Garbled Circuits in the Standard Model.
IACR Cryptol. ePrint Arch., 2024

On Tweakable Correlation Robust Hashing against Key Leakages.
IACR Cryptol. ePrint Arch., 2024

The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
IACR Cryptol. ePrint Arch., 2024

Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication.
IACR Cryptol. ePrint Arch., 2024

AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2024

Practical Unlearning for Large Language Models.
CoRR, 2024

Federated Learning with New Knowledge: Fundamentals, Advances, and Futures.
CoRR, 2024

TrustLLM: Trustworthiness in Large Language Models.
CoRR, 2024

Lightweight Authentication of Web Data via Garble-Then-Prove.
Proceedings of the 33rd USENIX Security Symposium, 2024

ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge.
Proceedings of the 33rd USENIX Security Symposium, 2024

Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Scalable Mixed-Mode MPC.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Nimbus: Secure and Efficient Two-Party Inference for Transformers.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024


Confidential-DPproof: Confidential Proof of Differentially Private Training.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

The Hardness of LPN over Any Integer Ring and Field for PCG Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Actively Secure Private Set Intersection in the Client-Server Setting.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Leakage-Resilient Circuit Garbling.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur., August, 2023

Private Multi-Winner Voting for Machine Learning.
Proc. Priv. Enhancing Technol., January, 2023

Efficient and Secure Quantile Aggregation of Private Data Streams.
IEEE Trans. Inf. Forensics Secur., 2023

ZKSQL: Verifiable and Efficient Query Evaluation with Zero-Knowledge Proofs.
Proc. VLDB Endow., 2023

RESCU-SQL: Oblivious Querying for the Zero Trust Cloud.
Proc. VLDB Endow., 2023

Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves.
IACR Cryptol. ePrint Arch., 2023

An Efficient ZK Compiler from SIMD Circuits to General Circuits.
IACR Cryptol. ePrint Arch., 2023

SoK: Vector OLE-Based Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2023

GenoCraft: A Comprehensive, User-Friendly Web-Based Platform for High-Throughput Omics Data Analysis and Visualization.
CoRR, 2023

Federated Continual Novel Class Learning.
CoRR, 2023

Robust and Actively Secure Serverless Collaborative Learning.
CoRR, 2023

Robust and Actively Secure Serverless Collaborative Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Confidential-PROFITT: Confidential PROof of FaIr Training of Trees.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Deja Vu: Continual Model Generalization for Unseen Domains.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Half-Tree: Halving the Cost of Tree Expansion in COT and DPF.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Ou: Automating the Parallelization of Zero-Knowledge Protocols.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
VaultDB: A Real-World Pilot of Secure Multi-Party Computation within a Clinical Research Network.
CoRR, 2022

ppSAT: Towards Two-Party Private SAT Solving.
Proceedings of the 31st USENIX Security Symposium, 2022

Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Federated Class-Incremental Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Proving UNSAT in Zero Knowledge.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Non-interactive Zero-Knowledge Proofs to Multiple Verifiers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Triply Adaptive UC NIZK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Provable Security of SP Networks with Partial Non-Linear Layers.
IACR Trans. Symmetric Cryptol., 2021

Non-Transferable Learning: A New Approach for Model Verification and Authorization.
CoRR, 2021

Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Practical Security and Privacy for Database Systems.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Distributed Neighbor Distribution Estimation with Adaptive Compressive Sensing in VANETs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

CaPC Learning: Confidential and Private Collaborative Learning.
Proceedings of the 9th International Conference on Learning Representations, 2021

QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Constant-Overhead Zero-Knowledge for RAM Programs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Addressing Class Imbalance in Federated Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
SAQE: Practical Privacy-Preserving Approximate Query Processing for Data Federations.
Proc. VLDB Endow., 2020

Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2020

Towards Class Imbalance in Federated Learning.
CoRR, 2020

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Blazing Fast OT for Three-Round UC OT Extension.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting).
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

More Efficient MPC from Improved Triple Generation and Authenticated Garbling.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Ferret: Fast Extension for Correlated OT with Small Communication.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Eavesdrop the Composition Proportion of Training Labels in Federated Learning.
CoRR, 2019

Privacy Changes Everything.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Scalable Private Set Union from Symmetric-Key Techniques.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
A New Paradigm for Practical Maliciously Secure Multi-Party Computation.
PhD thesis, 2018

Optimizing Authenticated Garbling for Faster Secure Two-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Secure Computation with Low Communication from Cross-Checking.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Simple and Efficient Two-Server ORAM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Faster Secure Two-Party Computation in the Single-Execution Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Global-Scale Secure Multiparty Computation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Faster Two-Party Computation Secure Against Malicious Adversaries in the Single-Execution Setting.
IACR Cryptol. ePrint Arch., 2016

Efficiently Enforcing Input Validity in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2016

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Secure Computation of MIPS Machine Code.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
iDASH Secure Genome Analysis Competition Using ObliVM.
IACR Cryptol. ePrint Arch., 2015

GraphSC: Parallel Secure Computation Made Easy.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

ObliVM: A Programming Framework for Secure Computation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Oblivious Data Structures.
IACR Cryptol. ePrint Arch., 2014

Oblivious Data Structures.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SCORAM: Oblivious RAM for Secure Computation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Regularized Discriminative Spectral Regression Method for Heterogeneous Face Matching.
IEEE Trans. Image Process., 2013


  Loading...