Follow
Zhicong Huang
Zhicong Huang
Ant Group
Verified email at antgroup.com - Homepage
Title
Cited by
Cited by
Year
Cheetah: Lean and fast secure {Two-Party} deep neural network inference
Z Huang, W Lu, C Hong, J Ding
31st USENIX Security Symposium (USENIX Security 22), 809-826, 2022
2052022
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
H Chen, Z Huang, K Laine, P Rindal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1862018
Logistic regression over encrypted data from fully homomorphic encryption
H Chen, R Gilad-Bachrach, K Han, Z Huang, A Jalali, K Laine, K Lauter
BMC medical genomics 11 (4), 81, 2018
1772018
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies
F Tramčr, Z Huang, JP Hubaux, E Ayday
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1172015
GenoGuard: Protecting genomic data against brute-force attacks
Z Huang, E Ayday, J Fellay, JP Hubaux, A Juels
2015 IEEE Symposium on Security and Privacy, 447-462, 2015
982015
PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption
W Lu, Z Huang, C Hong, Y Ma, H Qu
2021 IEEE Symposium on Security and Privacy (SP), 1057-1073, 2021
972021
Answering Multi-Dimensional Analytical Queries under Local Differential Privacy
T Wang, B Ding, J Zhou, C Hong, Z Huang, N Li, S Jha
Proceedings of the 2019 International Conference on Management of Data, 159-176, 2019
882019
Unlynx: a decentralized system for privacy-conscious data sharing
D Froelicher, P Egger, JS Sousa, JL Raisaro, Z Huang, C Mouchet, B Ford, ...
Proceedings on Privacy Enhancing Technologies 2017 (4), 232-250, 2017
832017
Efficient and secure outsourcing of genomic data storage
JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ...
BMC medical genomics 10 (2), 46, 2017
562017
Applications of homomorphic encryption
D Archer, L Chen, JH Cheon, R Gilad-Bachrach, RA Hallman, Z Huang, ...
Technical report, HomomorphicEncryption. org, Redmond WA, 2017
542017
Quantifying genomic privacy via inference attack with high-order SNV correlations
SS Samani, Z Huang, E Ayday, M Elliot, J Fellay, JP Hubaux, Z Kutalik
2015 IEEE Security and Privacy Workshops, 32-40, 2015
502015
A privacy-preserving solution for compressed storage and selective retrieval of genomic data
Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ...
Genome Research 26 (12), 1687-1696, 2016
422016
Improving utility and security of the shuffler-based differential privacy
T Wang, B Ding, M Xu, Z Huang, C Hong, J Zhou, N Li, S Jha
arXiv preprint arXiv:1908.11515, 2019
372019
Puma: Secure inference of llama-7b in five minutes
Y Dong, W Lu, Y Zheng, H Wu, D Zhao, J Tan, Z Huang, C Hong, T Wei, ...
arXiv preprint arXiv:2307.12533, 2023
302023
Simple encrypted arithmetic library v2. 3.0
H Chen, K Han, Z Huang, A Jalali, K Laine
Microsoft, 2017
302017
Quantification of the Leakage in Federated Learning
Z Li, Z Huang, C Chen, C Hong
arXiv preprint arXiv:1910.05467, 2019
252019
Squirrel: A Scalable Secure {Two-Party} Computation Framework for Training Gradient Boosting Decision Tree
W Lu, Z Huang, Q Zhang, Y Wang, C Hong
32nd USENIX Security Symposium (USENIX Security 23), 6435-6451, 2023
202023
Computing a private set intersection
K Laine, H Chen, PB Rindal, Z Huang
US Patent App. 16/008,915, 2019
172019
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
C Hong, Z Huang, W Lu, H Qu, L Ma, M Dahl, J Mancuso
arXiv preprint arXiv:2002.04344, 2020
152020
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems
Z Huang, C Hong, W Lu, C Weng, H Qu
IEEE Transactions on Dependable and Secure Computing, 2021
142021
The system can't perform the operation now. Try again later.
Articles 1–20