Author of the publication

Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.

, , , , and . SIGMOD Conference, page 603-619. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Delay-dependent Stability Criteria for Recurrent Neural Networks with Time-varying Delay., , and . ISIC, page 876-881. IEEE, (2008)China's 12-Year Quest of Autonomous Vehicular Intelligence: The Intelligent Vehicles Future Challenge Program., , , , , , , , , and 1 other author(s). IEEE Intell. Transp. Syst. Mag., 13 (2): 6-19 (2021)RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference., , , , , , , , , and 4 other author(s). CoRR, (2023)Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers., , , , and . SIGMOD Conference, page 603-619. ACM, (2020)AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization., , , , , , , , and . MICRO, page 628-640. ACM, (2023)Poirot: private contact summary aggregation: poster abstract., , , , , , , , and . SenSys, page 774-775. ACM, (2020)Encrypted Data Management Systems with tunable Privacy.. Duke University, Durham, NC, USA, (2023)base-search.net (ftdukeunivdsp:oai:localhost:10161/29132).IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy., , , and . SIGMOD Conference, page 818-832. ACM, (2022)TAG: Gradient Attack on Transformer-based Language Models., , , , , , , and . EMNLP (Findings), page 3600-3610. Association for Computational Linguistics, (2021)Deterministic Learning and Pattern-Based NN Control., , and . ISIC, page 144-149. IEEE, (2007)