Yongjun Zhao
Yongjun Zhao
Research Scientist at TikTok (was Senior Research Fellow at NTU)
Zweryfikowany adres z tiktok.com
Cytowane przez
Cytowane przez
Privacy-preserving decision trees evaluation via linear functions
RKH Tai, JPK Ma, Y Zhao, SSM Chow
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Updatable block-level message-locked encryption
Y Zhao, SSM Chow
IEEE Transactions on Dependable and Secure Computing, 2019
Goten: Gpu-outsourcing trusted execution of neural network training
LKL Ng, SSM Chow, APY Woo, DPH Wong, Y Zhao
Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 14876 …, 2021
Position paper on blockchain technology: Smart contract and applications
W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Y Zhao, SSM Chow
Workshop on Privacy in the Electronic Society (WPES), 2018
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou
IACR International Workshop on Public Key Cryptography, 221-251, 2019
Sharding blockchain
SSM Chow, Z Lai, C Liu, E Lo, Y Zhao
2018 IEEE international conference on internet of things (iThings) and IEEE …, 2018
Are you the one to share? Secret transfer with access structure
Y Zhao, SSM Chow
Proceedings on Privacy Enhancing Technologies, 2017
Let’s stride blindfolded in a forest: Sublinear multi-client decision trees evaluation
JPK Ma, RKH Tai, Y Zhao, SSM Chow
Privacy preserving collaborative filtering from asymmetric randomized encoding
Y Zhao, SSM Chow
International Conference on Financial Cryptography and Data Security, 459-477, 2015
ZkRep: A privacy-preserving scheme for reputation-based blockchain system
C Huang, Y Zhao, H Chen, X Wang, Q Zhang, Y Chen, H Wang, KY Lam
IEEE Internet of Things Journal 9 (6), 4330-4342, 2021
Volume-hiding dynamic searchable symmetric encryption with forward and backward privacy
Y Zhao, H Wang, KY Lam
Cryptology ePrint Archive, 2021
Towards proofs of ownership beyond bounded leakage
Y Zhao, SSM Chow
International Conference on Provable Security, 340-350, 2016
Protecting membership and data in a secure multi-party computation and/or communication
J Du, H Qian, Y Zhao, B Jiang, YAN Qiang
US Patent 11,886,617, 2024
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning
Y Zheng, W Song, M Du, S SM Chow, Q Lou, Y Zhao, X Wang
International Conference on Advanced Data Mining and Applications, 393-407, 2023
Fast convolution algorithm for composition determination
B Jiang, J Du, H Qian, Y Zhao, YAN Qiang
US Patent 11,868,497, 2024
Secure multi-party computation and communication
J Du, H Qian, Y Zhao, B Jiang, C Chen, YAN Qiang
US Patent 11,836,263, 2023
Sipster: settling iou privately and quickly with smart meters
SSM Chow, M Li, Y Zhao, W Jin
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
Privacy Preserving Credit Systems
SSM Chow, RWF Lai, X Wang, Y Zhao
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
Protecting membership in a secure multi-party computation and/or communication
J Du, Y Zhao, H Qian, B Jiang, YAN Qiang
US Patent 11,989,325, 2024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20