David Wu
Cited by
Cited by
End-to-End Text Recognition with Convolutional Neural Networks
T Wang, DJ Wu, A Coates, AY Ng
Pattern Recognition (ICPR), 2012 21st International Conference on, 3304-3308, 2012
Deep learning with COTS HPC systems
A Coates, B Huval, T Wang, DJ Wu, B Catanzaro, N Andrew
Proceedings of the 30th International Conference on Machine Learning (ICML …, 2013
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning
A Coates, B Carpenter, C Case, S Satheesh, B Suresh, T Wang, DJ Wu, ...
Document Analysis and Recognition (ICDAR), 2011 International Conference on …, 2011
Private Database Queries Using Somewhat Homomorphic Encryption
D Boneh, C Gentry, S Halevi, F Wang, DJ Wu
Applied Cryptography and Network Security, 102-118, 2013
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
K Lewi, DJ Wu
ACM Conference on Computer and Communications Security (CCS), 2016
Practical Order-Revealing Encryption with Limited Leakage
N Chenette, K Lewi, SA Weis, DJ Wu
Proceedings of the 23rd International Conference on Fast Software Encryption …, 2016
Privately Evaluating Decision Trees and Random Forests
DJ Wu, T Feng, M Naehrig, K Lauter
Proceedings on Privacy Enhancing Technologies 2016 (4), 2015
Secure genome-wide association analysis using multiparty computation
H Cho, DJ Wu, B Berger
Nature biotechnology 36 (6), 547-551, 2018
Deriving genomic diagnoses without revealing patient genomes
KA Jagadeesh, DJ Wu, JA Birgmeier, D Boneh, G Bejerano
Science 357 (6352), 692-695, 2017
Immunizing Multilinear Maps Against Zeroizing Attacks
D Boneh, DJ Wu, J Zimmerman
Function-Hiding Inner Product Encryption is Practical
S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
International Conference on Security and Cryptography for Networks (SCN), 2016
Privacy, discovery, and authentication for the Internet of Things
DJ Wu, A Taly, A Shankar, D Boneh
European Symposium on Research in Computer Security, 301-319, 2016
Constraining Pseudorandom Functions Privately
D Boneh, K Lewi, DJ Wu
Public-Key Cryptography – PKC 2017, 2015
Lattice-based SNARGs and their application to more efficient obfuscation
D Boneh, Y Ishai, A Sahai, DJ Wu
Annual International Conference on the Theory and Applications of …, 2017
Privacy-Preserving Shortest Path Computation
DJ Wu, J Zimmerman, J Planul, JC Mitchell
arXiv preprint arXiv:1601.02281, 2016
Watermarking cryptographic functionalities from standard lattice assumptions
S Kim, DJ Wu
Annual International Cryptology Conference, 503-536, 2017
Multi-theorem preprocessing NIZKs from lattices
S Kim, DJ Wu
Journal of Cryptology, 1-84, 2019
Quasi-optimal snargs via linear multi-prover interactive proofs
D Boneh, Y Ishai, A Sahai, DJ Wu
Annual International Conference on the Theory and Applications of …, 2018
Using homomorphic encryption for large scale statistical analysis
D Wu, J Haven
New Constructions of Reusable Designated-Verifier NIZKs
A Lombardi, W Quach, RD Rothblum, D Wichs, DJ Wu
The system can't perform the operation now. Try again later.
Articles 1–20