Cheetah: Lean and fast secure {Two-Party} deep neural network inference Z Huang, W Lu, C Hong, J Ding 31st USENIX Security Symposium (USENIX Security 22), 809-826, 2022 | 205 | 2022 |
Labeled PSI from Fully Homomorphic Encryption with Malicious Security H Chen, Z Huang, K Laine, P Rindal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 186 | 2018 |
Logistic regression over encrypted data from fully homomorphic encryption H Chen, R Gilad-Bachrach, K Han, Z Huang, A Jalali, K Laine, K Lauter BMC medical genomics 11 (4), 81, 2018 | 177 | 2018 |
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies F Tramčr, Z Huang, JP Hubaux, E Ayday Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 117 | 2015 |
GenoGuard: Protecting genomic data against brute-force attacks Z Huang, E Ayday, J Fellay, JP Hubaux, A Juels 2015 IEEE Symposium on Security and Privacy, 447-462, 2015 | 98 | 2015 |
PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption W Lu, Z Huang, C Hong, Y Ma, H Qu 2021 IEEE Symposium on Security and Privacy (SP), 1057-1073, 2021 | 97 | 2021 |
Answering Multi-Dimensional Analytical Queries under Local Differential Privacy T Wang, B Ding, J Zhou, C Hong, Z Huang, N Li, S Jha Proceedings of the 2019 International Conference on Management of Data, 159-176, 2019 | 88 | 2019 |
Unlynx: a decentralized system for privacy-conscious data sharing D Froelicher, P Egger, JS Sousa, JL Raisaro, Z Huang, C Mouchet, B Ford, ... Proceedings on Privacy Enhancing Technologies 2017 (4), 232-250, 2017 | 83 | 2017 |
Efficient and secure outsourcing of genomic data storage JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ... BMC medical genomics 10 (2), 46, 2017 | 56 | 2017 |
Applications of homomorphic encryption D Archer, L Chen, JH Cheon, R Gilad-Bachrach, RA Hallman, Z Huang, ... Technical report, HomomorphicEncryption. org, Redmond WA, 2017 | 54 | 2017 |
Quantifying genomic privacy via inference attack with high-order SNV correlations SS Samani, Z Huang, E Ayday, M Elliot, J Fellay, JP Hubaux, Z Kutalik 2015 IEEE Security and Privacy Workshops, 32-40, 2015 | 50 | 2015 |
A privacy-preserving solution for compressed storage and selective retrieval of genomic data Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ... Genome Research 26 (12), 1687-1696, 2016 | 42 | 2016 |
Improving utility and security of the shuffler-based differential privacy T Wang, B Ding, M Xu, Z Huang, C Hong, J Zhou, N Li, S Jha arXiv preprint arXiv:1908.11515, 2019 | 37 | 2019 |
Puma: Secure inference of llama-7b in five minutes Y Dong, W Lu, Y Zheng, H Wu, D Zhao, J Tan, Z Huang, C Hong, T Wei, ... arXiv preprint arXiv:2307.12533, 2023 | 30 | 2023 |
Simple encrypted arithmetic library v2. 3.0 H Chen, K Han, Z Huang, A Jalali, K Laine Microsoft, 2017 | 30 | 2017 |
Quantification of the Leakage in Federated Learning Z Li, Z Huang, C Chen, C Hong arXiv preprint arXiv:1910.05467, 2019 | 25 | 2019 |
Squirrel: A Scalable Secure {Two-Party} Computation Framework for Training Gradient Boosting Decision Tree W Lu, Z Huang, Q Zhang, Y Wang, C Hong 32nd USENIX Security Symposium (USENIX Security 23), 6435-6451, 2023 | 20 | 2023 |
Computing a private set intersection K Laine, H Chen, PB Rindal, Z Huang US Patent App. 16/008,915, 2019 | 17 | 2019 |
Privacy-preserving collaborative machine learning on genomic data using TensorFlow C Hong, Z Huang, W Lu, H Qu, L Ma, M Dahl, J Mancuso arXiv preprint arXiv:2002.04344, 2020 | 15 | 2020 |
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems Z Huang, C Hong, W Lu, C Weng, H Qu IEEE Transactions on Dependable and Secure Computing, 2021 | 14 | 2021 |