Yongjun Zhao

Orcid: 0000-0001-7380-3806

Affiliations:
  • Chinese University of Hong Kong, Hong Kong


According to our database1, Yongjun Zhao authored at least 17 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System.
IEEE Internet Things J., 2022

2021
Updatable Block-Level Message-Locked Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Sipster: Settling IOU Privately and Quickly with Smart Meters.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Goten: GPU-Outsourcing Trusted Execution of Neural Network Training.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2019
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI.
IACR Cryptol. ePrint Arch., 2018

Can You Find The One for Me?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Sharding Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Are you The One to Share? Secret Transfer with Access Structure.
Proc. Priv. Enhancing Technol., 2017

Privacy-Preserving Decision Trees Evaluation via Linear Functions.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Towards Proofs of Ownership Beyond Bounded Leakage.
Proceedings of the Provable Security, 2016

Privacy Preserving Credit Systems.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding.
Proceedings of the Financial Cryptography and Data Security, 2015


  Loading...