Xiao Wang
Orcid: 0000-0002-5991-7417Affiliations:
- Northwestern University, Department of Computer Science, Evanston, IL, USA
- Boston University, Department of Computer Science, MA, USA
- Massachusetts Institute of Technology, CSAIL, Cambridge, MA, USA
- University of Maryland, College Park, MD, USA (former)
According to our database1,
Xiao Wang
authored at least 111 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2025
CoRR, May, 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
Proceedings of the 2025 Symposium on Computer Science and Law, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Opca: Enabling Optimistic Concurrent Access for Multiple Users in Oblivious Data Storage.
IEEE Trans. Parallel Distributed Syst., November, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur., August, 2023
Proc. Priv. Enhancing Technol., January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Proc. VLDB Endow., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
GenoCraft: A Comprehensive, User-Friendly Web-Based Platform for High-Throughput Omics Data Analysis and Visualization.
CoRR, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
VaultDB: A Real-World Pilot of Secure Multi-Party Computation within a Clinical Research Network.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization.
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
CoRR, 2021
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning.
Proceedings of the 30th USENIX Security Symposium, 2021
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
Distributed Neighbor Distribution Estimation with Adaptive Compressive Sensing in VANETs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
SAQE: Practical Privacy-Preserving Approximate Query Processing for Data Federations.
Proc. VLDB Endow., 2020
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
CoRR, 2019
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
PhD thesis, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Faster Two-Party Computation Secure Against Malicious Adversaries in the Single-Execution Setting.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Regularized Discriminative Spectral Regression Method for Heterogeneous Face Matching.
IEEE Trans. Image Process., 2013