default search action
Taeho Jung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung:
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. Proc. Priv. Enhancing Technol. 2024(4): 209-225 (2024) - [j28]Jonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, Xiaobo Sharon Hu, Taeho Jung:
Accelerating Finite-Field and Torus Fully Homomorphic Encryption via Compute-Enabled (S)RAM. IEEE Trans. Computers 73(10): 2449-2462 (2024) - [j27]Changhao Chenli, Wenyi Tang, Hyeonbum Lee, Taeho Jung:
Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution Fairness. IEEE Trans. Dependable Secur. Comput. 21(5): 4827-4842 (2024) - [c56]Wenyi Tang, Shankha Shubhra Mukherjee, Seongho Park, Changhao Chenli, Hyunok Oh, Jihye Kim, Taeho Jung:
GrAC: Graph-Based Anonymous Credentials from Identity Graphs on Blockchain. Blockchain 2024: 113-122 - [c55]Changhao Chenli, Wenyi Tang, Shankha Shubhra Mukherjee, Taeho Jung:
SCAFT: A Scalable Crowd-Assisted Fair Trading Protocol. Blockchain 2024: 442-449 - [c54]Hyeonbum Lee, Kyuhwan Lee, Wenyi Tang, Shankha Shubhra Mukherjee, Jae Hong Seo, Taeho Jung:
PrivHChain: Monitoring the Supply Chain of Controlled Substances with Privacy-Preserving Hierarchical Blockchain. ICBC 2024: 467-475 - [c53]Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang:
PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud. ISVLSI 2024: 403-408 - [i36]Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang:
PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud. CoRR abs/2404.13475 (2024) - [i35]Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung:
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 753 (2024) - [i34]Jonathan Takeshita, Nirajan Koirala, Colin McKechney, Taeho Jung:
HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries. IACR Cryptol. ePrint Arch. 2024: 1059 (2024) - [i33]Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, Taeho Jung:
PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis. IACR Cryptol. ePrint Arch. 2024: 1460 (2024) - 2023
- [j26]Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung:
SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors. J. Cryptol. 36(2): 8 (2023) - [j25]Wei Zheng, Taeho Jung, Hai Lin:
Continuous-Observation One-Sided Two-Player Zero-Sum Partially Observable Stochastic Game With Public Actions. IEEE Trans. Autom. Control. 68(12): 7390-7404 (2023) - [c52]Boyang Li, Bingyu Shen, Qing Lu, Taeho Jung, Yiyu Shi:
Proof-of-Federated-Learning-Subchain: Free Partner Selection Subchain Based on Federated Learning. BCCA 2023: 600-605 - [c51]Michael Bartholic, Eric William Burger, Shin'ichiro Matsuo, Taeho Jung:
Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles. ICBC 2023: 1-9 - [c50]Wenyi Tang, Taeho Jung, E. Paul Ratazzi:
TISIN: Traceable Information Sharing in Intermittent Networks. MILCOM 2023: 876-881 - [i32]Boyang Li, Bingyu Shen, Qing Lu, Taeho Jung, Yiyu Shi:
Proof-of-Federated-Learning-Subchain: Free Partner Selection Subchain Based on Federated Learning. CoRR abs/2307.16342 (2023) - [i31]Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael T. Niemier, Xiaobo Sharon Hu:
Privacy Preserving In-memory Computing Engine. CoRR abs/2308.02648 (2023) - 2022
- [j24]Wei Zheng, Taeho Jung, Hai Lin:
The Stackelberg equilibrium for one-sided zero-sum partially observable stochastic games. Autom. 140: 110231 (2022) - [j23]Wei Zheng, Taeho Jung, Hai Lin:
Privacy-Preserving POMDP Planning via Belief Manipulation. IEEE Control. Syst. Lett. 6: 3415-3420 (2022) - [j22]Ryan Karl, Hannah Burchfield, Jonathan Takeshita, Taeho Jung:
Developing non-interactive MPC with trusted hardware for enhanced security. Int. J. Inf. Sec. 21(4): 777-797 (2022) - [j21]Changhao Chenli, Wenyi Tang, Frank Gomulka, Taeho Jung:
ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance. J. Parallel Distributed Comput. 166: 32-44 (2022) - [j20]Meng Jiang, Taeho Jung, Ryan Karl, Tong Zhao:
Federated Dynamic Graph Neural Networks with Secure Aggregation for Video-based Distributed Surveillance. ACM Trans. Intell. Syst. Technol. 13(4): 56:1-56:23 (2022) - [c49]Chanyang Ju, Wenyi Tang, Changhao Chenli, Gwangwoon Lee, Jae Hong Seo, Taeho Jung:
Monitoring Provenance of Delegated Personal Data with Blockchain. Blockchain 2022: 11-20 - [c48]Wenyi Tang, Changhao Chenli, Chanyang Ju, Taeho Jung:
Trac2Chain: trackability and traceability of graph data in blockchain with linkage privacy. SAC 2022: 272-281 - [c47]Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung:
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. SecureComm 2022: 331-352 - [c46]Shemon Rawat, Seokki Lee, Taeho Jung:
Measuring information gain using provenance. TaPP 2022: 7:1-7:4 - [i30]Boyang Li, Qing Lu, Weiwen Jiang, Taeho Jung, Yiyu Shi:
A Collaboration Strategy in the Mining Pool for Proof-of-Neural-Architecture Consensus. CoRR abs/2206.07089 (2022) - [i29]Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung:
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. IACR Cryptol. ePrint Arch. 2022: 829 (2022) - 2021
- [j19]Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiang-Yang Li:
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization. IEEE Trans. Dependable Secur. Comput. 18(6): 2631-2642 (2021) - [c45]Changhao Chenli, Wenyi Tang, Taeho Jung:
FairTrade: Efficient Atomic Exchange-based Fair Exchange Protocol for Digital Data Trading. Blockchain 2021: 38-46 - [c44]Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
CryptoGram: Fast Private Calculations of Histograms over Multiple Users' Inputs. DCOSS 2021: 25-34 - [c43]Boyang Li, Qing Lu, Weiwen Jiang, Taeho Jung, Yiyu Shi:
A mining pool solution for novel proof-of-neural-architecture consensus. IEEE ICBC 2021: 1-3 - [c42]Wenyi Tang, Changhao Chenli, Taeho Jung:
Prv2chain: Storage of Tree-structured Provenance Records in Blockchain with Linkage Privacy. IEEE ICBC 2021: 1-3 - [c41]Ryan Karl, Jonathan Takeshita, Taeho Jung:
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery. SecureComm (1) 2021: 311-331 - [c40]Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations. SecureComm (1) 2021: 332-351 - [c39]Jonathan Takeshita, Ryan Karl, Alamin Mohammed, Aaron Striegel, Taeho Jung:
Provably Secure Contact Tracing with Conditional Private Set Intersection. SecureComm (1) 2021: 352-373 - [c38]Taeho Jung, Seokki Lee, Wenyi Tang:
Using Provenance to Evaluate Risk and Benefit of Data Sharing. TaPP 2021 - [i28]Taeho Jung, Ryan Karl, Geoffrey H. Siwo:
Genomic Encryption of Biometric Information for Privacy-Preserving Forensics. CoRR abs/2103.14741 (2021) - [i27]Wei Zheng, Taeho Jung, Hai Lin:
The Stackelberg Equilibrium for One-sided Zero-sum Partially Observable Stochastic Games. CoRR abs/2109.08339 (2021) - [i26]Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
CryptoGram: Fast Private Calculations of Histograms over Multiple Users' Inputs. IACR Cryptol. ePrint Arch. 2021: 472 (2021) - [i25]Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations. IACR Cryptol. ePrint Arch. 2021: 473 (2021) - [i24]Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung:
GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data. IACR Cryptol. ePrint Arch. 2021: 1155 (2021) - 2020
- [j18]Haohua Du, Linlin Chen, Jianwei Qian, Jiahui Hou, Taeho Jung, Xiangyang Li:
PatronuS: A System for Privacy-Preserving Cloud Video Surveillance. IEEE J. Sel. Areas Commun. 38(6): 1252-1261 (2020) - [j17]Ting Li, Taeho Jung, Zhijin Qiu, Hanshang Li, Lijuan Cao, Yu Wang:
Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding. IEEE Trans. Netw. Sci. Eng. 7(2): 855-868 (2020) - [j16]Dayane Reis, Jonathan Takeshita, Taeho Jung, Michael T. Niemier, Xiaobo Sharon Hu:
Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption. IEEE Trans. Very Large Scale Integr. Syst. 28(11): 2300-2313 (2020) - [c37]Changhao Chenli, Taeho Jung:
ProvNet: Networked Blockchain for Decentralized Secure Provenance. ICBC 2020: 76-93 - [c36]Jonathan Takeshita, Ryan Karl, Taeho Jung:
Secure Single-Server Nearly-Identical Image Deduplication. ICCCN 2020: 1-6 - [c35]Jonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, X. Sharon Hu, Taeho Jung:
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM. SAC 2020: 66-89 - [c34]Changhao Chenli, Boyang Li, Taeho Jung:
DLchain: Blockchain with Deep Learning as Proof-of-Useful-Work. SERVICES 2020: 43-60 - [i23]Alireza Partovi, Wei Zheng, Taeho Jung, Hai Lin:
Ensuring Privacy in Location-Based Services: A Model-based Approach. CoRR abs/2002.10055 (2020) - [i22]Jonathan Takeshita, Ryan Karl, Taeho Jung:
Secure Single-Server Nearly-Identical Image Deduplication. CoRR abs/2005.02330 (2020) - [i21]Dayane Reis, Jonathan Takeshita, Taeho Jung, Michael T. Niemier, Xiaobo Sharon Hu:
Computing-in-Memory for Performance and Energy Efficient Homomorphic Encryption. CoRR abs/2005.03002 (2020) - [i20]Alireza Partovi, Taeho Jung, Hai Lin:
Opacity of Discrete Event Systems with Active Intruder. CoRR abs/2007.14960 (2020) - [i19]Meng Jiang, Taeho Jung, Ryan Karl, Tong Zhao:
Federated Dynamic GNN with Secure Aggregation. CoRR abs/2009.07351 (2020) - [i18]Jonathan Takeshita, Matthew M. Schoenbauer, Ryan Karl, Taeho Jung:
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2020: 91 (2020) - [i17]Jonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, Xiaobo Sharon Hu, Taeho Jung:
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM. IACR Cryptol. ePrint Arch. 2020: 1223 (2020) - [i16]Ryan Karl, Jonathan Takeshita, Taeho Jung:
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance. IACR Cryptol. ePrint Arch. 2020: 1561 (2020) - [i15]Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung:
SLAP: Simple Lattice-Based Private Stream Aggregation Protocol. IACR Cryptol. ePrint Arch. 2020: 1611 (2020)
2010 – 2019
- 2019
- [j15]Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han:
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model. IEEE Trans. Dependable Secur. Comput. 16(4): 679-692 (2019) - [j14]Taeho Jung, Xiang-Yang Li, Wenchao Huang, Zhongying Qiao, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. IEEE Trans. Inf. Forensics Secur. 14(1): 223-234 (2019) - [j13]Jianwei Qian, Xiang-Yang Li, Taeho Jung, Yang Fan, Yu Wang, Shaojie Tang:
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified? ACM Trans. Internet Techn. 19(3): 33:1-33:22 (2019) - [c33]Boyang Li, Changhao Chenli, Xiaowei Xu, Taeho Jung, Yiyu Shi:
Exploiting Computation Power of Blockchain for Biomedical Image Segmentation. CVPR Workshops 2019: 2802-2811 - [c32]Changhao Chenli, Boyang Li, Yiyu Shi, Taeho Jung:
Energy-recycling Blockchain with Proof-of-Deep-Learning. IEEE ICBC 2019: 19-23 - [c31]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs. ICSE (Companion Volume) 2019: 230-231 - [c30]Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. SecureComm (2) 2019: 425-439 - [i14]Changhao Chenli, Boyang Li, Yiyu Shi, Taeho Jung:
Energy-recycling Blockchain with Proof-of-Deep-Learning. CoRR abs/1902.03912 (2019) - [i13]Boyang Li, Changhao Chenli, Xiaowei Xu, Taeho Jung, Yiyu Shi:
Exploiting Computation Power of Blockchain for Biomedical Image Segmentation. CoRR abs/1904.07349 (2019) - [i12]Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. IACR Cryptol. ePrint Arch. 2019: 454 (2019) - 2018
- [j12]Taeho Jung, Junze Han, Xiang-Yang Li:
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups. IEEE Trans. Dependable Secur. Comput. 15(2): 260-274 (2018) - [j11]Jiahui Hou, Xiang-Yang Li, Taeho Jung, Yu Wang, Daren Zheng:
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats. IEEE Trans. Inf. Forensics Secur. 13(7): 1656-1669 (2018) - [c29]Linlin Chen, Taeho Jung, Haohua Du, Jianwei Qian, Jiahui Hou, Xiang-Yang Li:
Crowdlearning: Crowded Deep Learning with Data Privacy. SECON 2018: 37-45 - [c28]Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiang-Yang Li:
Hidebehind: Enjoy Voice Input with Voiceprint Unclonability and Anonymity. SenSys 2018: 82-94 - [c27]Srijan Kumar, Meng Jiang, Taeho Jung, Roger Jie Luo, Jure Leskovec:
MIS2: Misinformation and Misbehavior Mining on the Web. WSDM 2018: 799-800 - [i11]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs. CoRR abs/1809.07036 (2018) - 2017
- [j10]Cheng Bo, Xuesi Jian, Taeho Jung, Junze Han, Xiang-Yang Li, XuFei Mao, Yu Wang:
Detecting Driver's Smartphone Usage via Nonintrusively Sensing Driving Dynamics. IEEE Internet Things J. 4(2): 340-350 (2017) - [j9]Haohua Du, Junze Han, Xuesi Jian, Taeho Jung, Cheng Bo, Yu Wang, Xiang-Yang Li:
Martian: Message Broadcast via LED Lights to Heterogeneous Smartphones. IEEE J. Sel. Areas Commun. 35(5): 1154-1162 (2017) - [j8]Hongli Xu, Zhuolong Yu, Xiang-Yang Li, Liusheng Huang, Chen Qian, Taeho Jung:
Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs. IEEE/ACM Trans. Netw. 25(5): 3073-3087 (2017) - [j7]Lan Zhang, Taeho Jung, Kebin Liu, Xiang-Yang Li, Xuan Ding, Jiaxi Gu, Yunhao Liu:
PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud. IEEE Trans. Parallel Distributed Syst. 28(11): 3258-3271 (2017) - [c26]Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:
AccountTrade: Accountable protocols for big data trading against dishonest consumers. INFOCOM 2017: 1-9 - [c25]Zhenhua Li, Weiwei Wang, Christo Wilson, Jian Chen, Chen Qian, Taeho Jung, Lan Zhang, Kebin Liu, Xiangyang Li, Yunhao Liu:
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. NDSS 2017 - [c24]Ting Li, Taeho Jung, Hanshang Li, Lijuan Cao, Weichao Wang, Xiang-Yang Li, Yu Wang:
Scalable privacy-preserving participant selection in mobile crowd sensing. PerCom 2017: 59-68 - [i10]Jianwei Qian, Xiang-Yang Li, Yu Wang, Shaojie Tang, Taeho Jung, Yang Fan:
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified? CoRR abs/1710.10998 (2017) - [i9]Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiangyang Li, Yu Wang, Yanbo Deng:
VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices. CoRR abs/1711.11460 (2017) - 2016
- [j6]Cheng Bo, Taeho Jung, XuFei Mao, Xiang-Yang Li, Yu Wang:
SmartLoc: sensing landmarks silently for smartphone-based metropolitan localization. EURASIP J. Wirel. Commun. Netw. 2016: 111 (2016) - [j5]Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'. IEEE Trans. Inf. Forensics Secur. 11(4): 868 (2016) - [j4]Zhiyong Tian, Taeho Jung, Yi Wang, Fan Zhang, Lai Tu, Cheng-Zhong Xu, Chen Tian, Xiang-Yang Li:
Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis. IEEE Trans. Intell. Transp. Syst. 17(11): 3098-3109 (2016) - [c23]Hongli Xu, Zhuolong Yu, Xiang-Yang Li, Chen Qian, Liusheng Huang, Taeho Jung:
Real-time update with joint optimization of route selection and update scheduling for SDNs. ICNP 2016: 1-10 - [c22]Xiang-Yang Li, Chunhong Zhang, Taeho Jung, Jianwei Qian, Linlin Chen:
Graph-based privacy-preserving data publication. INFOCOM 2016: 1-9 - [c21]Jianwei Qian, Shaojie Tang, Huiqi Liu, Taeho Jung, Xiang-Yang Li:
Privacy Inference on Knowledge Graphs: Hardness and Approximation. MSN 2016: 132-138 - [c20]Haohua Du, Taeho Jung, Xuesi Jian, Yiqing Hu, Jiahui Hou, Xiang-Yang Li:
User-Demand-Oriented Privacy-Preservation in Video Delivering. MSN 2016: 145-151 - [c19]Junze Han, Taeho Jung, Xiang-Yang Li, Lili Du:
Ensuring Semantic Validity in Privacy-Preserving Aggregate Statistics. MSN 2016: 160-166 - 2015
- [j3]Taeho Jung, Xiang-Yang Li, Meng Wan:
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel. IEEE Trans. Dependable Secur. Comput. 12(1): 45-57 (2015) - [j2]Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. IEEE Trans. Inf. Forensics Secur. 10(1): 190-199 (2015) - [j1]Lan Zhang, Xiang-Yang Li, Kebin Liu, Taeho Jung, Yunhao Liu:
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks. IEEE Trans. Mob. Comput. 14(9): 1888-1902 (2015) - [c18]Taeho Jung, Xiang-Yang Li, Junze Han:
A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm. BigCom 2015: 88-102 - [c17]Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu:
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices. ICDCS 2015: 308-317 - [c16]Lan Zhang, Taeho Jung, Puchun Feng, Kebin Liu, Xiang-Yang Li, Yunhao Liu:
PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud. ICPP 2015: 949-958 - [c15]Taeho Jung, Xiang-Yang Li:
Enabling privacy-preserving auctions in big data. INFOCOM Workshops 2015: 173-178 - 2014
- [c14]Jing Zhao, Taeho Jung, Yu Wang, Xiangyang Li:
Achieving differential privacy of data disclosure in the smart grid. INFOCOM 2014: 504-512 - [c13]Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, Yu Wang:
Continuous user identification via touch and movement behavioral biometrics. IPCCC 2014: 1-8 - [c12]Junze Han, Xiang-Yang Li, Taeho Jung, Jumin Zhao, Zenghua Zhao:
Network agile preference-based prefetching for mobile devices. IPCCC 2014: 1-8 - [c11]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
It starts with iGaze: visual attention driven networking with smart glasses. MobiCom 2014: 91-102 - [c10]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
Demo: visual attention driven networking with smart glasses. MobiCom 2014: 329-332 - [c9]Xuangou Wu, Panlong Yang, Taeho Jung, Yan Xiong, Xiao Zheng:
Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs. MobiHoc 2014: 13-22 - [c8]Sara Motahari, Taeho Jung, Hui Zang, Krishna Janakiraman, Xiang-Yang Li, Kevin Soo Hoo:
Predicting the influencers on wireless subscriber churn. WCNC 2014: 3402-3407 - [i8]Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu:
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection. CoRR abs/1410.6589 (2014) - [i7]Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu:
Cloud-based Privacy Preserving Image Storage, Sharing and Search. CoRR abs/1410.6593 (2014) - 2013
- [c7]Lan Zhang, Xiang-Yang Li, Yunhao Liu, Taeho Jung:
Verifiable private multi-party computation: Ranging and ranking. INFOCOM 2013: 605-609 - [c6]Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Privacy preserving cloud data access with multi-authorities. INFOCOM 2013: 2625-2633 - [c5]Taeho Jung, XuFei Mao, Xiang-Yang Li, Shaojie Tang, Wei Gong, Lan Zhang:
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation. INFOCOM 2013: 2634-2642 - [c4]Xiang-Yang Li, Taeho Jung:
Search me if you can: Privacy-preserving location query service. INFOCOM 2013: 2760-2768 - [c3]Cheng Bo, Xiang-Yang Li, Taeho Jung, XuFei Mao, Yue Tao, Lan Yao:
SmartLoc: push the limit of the inertial sensor based metropolitan localization using smartphone. MobiCom 2013: 195-198 - [i6]Taeho Jung, Xiang-Yang Li:
Infinite Choices of Data Aggregations with Linear Number of Keys. CoRR abs/1308.6198 (2013) - [i5]Taeho Jung, Xiang-Yang Li, Lan Zhang, He Huang:
Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design. CoRR abs/1308.6202 (2013) - [i4]Cheng Bo, Xiang-Yang Li, Taeho Jung, XuFei Mao:
SmartLoc: Sensing Landmarks Silently for Smartphone Based Metropolitan Localization. CoRR abs/1310.8187 (2013) - 2012
- [c2]Taeho Jung:
Numerical Analysis of Instabilities of Organic Thin-Film Transistors for Flexible Displays. ICHIT (1) 2012: 453-460 - [c1]Shaojie Tang, XuFei Mao, Taeho Jung, Junze Han, Xiang-Yang Li, Boliu Xu, Chao Ma:
Closing the gap in the multicast capacity of hybrid wireless networks. MobiHoc 2012: 135-144 - [i3]Taeho Jung, Xiang-Yang Li, Zhiguo Wan:
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption. CoRR abs/1206.2657 (2012) - [i2]Taeho Jung, Xiang-Yang Li, Shaojie Tang:
Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely. CoRR abs/1206.2660 (2012) - [i1]Taeho Jung, Xiang-Yang Li:
Search Me If You Can: Privacy-preserving Location Query Service. CoRR abs/1208.0107 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint