Labeled PSI from Fully Homomorphic Encryption with Malicious Security H Chen, Z Huang, K Laine, P Rindal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 181 | 2018 |
Logistic regression over encrypted data from fully homomorphic encryption H Chen, R Gilad-Bachrach, K Han, Z Huang, A Jalali, K Laine, K Lauter BMC medical genomics 11 (4), 81, 2018 | 177 | 2018 |
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies F Tramčr, Z Huang, JP Hubaux, E Ayday Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 117 | 2015 |
GenoGuard: Protecting genomic data against brute-force attacks Z Huang, E Ayday, J Fellay, JP Hubaux, A Juels 2015 IEEE Symposium on Security and Privacy, 447-462, 2015 | 98 | 2015 |
PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption W Lu, Z Huang, C Hong, Y Ma, H Qu 2021 IEEE Symposium on Security and Privacy (SP), 1057-1073, 2021 | 95 | 2021 |
Answering Multi-Dimensional Analytical Queries under Local Differential Privacy T Wang, B Ding, J Zhou, C Hong, Z Huang, N Li, S Jha Proceedings of the 2019 International Conference on Management of Data, 159-176, 2019 | 86 | 2019 |
Unlynx: a decentralized system for privacy-conscious data sharing D Froelicher, P Egger, JS Sousa, JL Raisaro, Z Huang, C Mouchet, B Ford, ... Proceedings on Privacy Enhancing Technologies 2017 (4), 232-250, 2017 | 83 | 2017 |
Efficient and secure outsourcing of genomic data storage JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ... BMC medical genomics 10 (2), 46, 2017 | 55 | 2017 |
Applications of homomorphic encryption D Archer, L Chen, JH Cheon, R Gilad-Bachrach, RA Hallman, Z Huang, ... Technical report, HomomorphicEncryption. org, Redmond WA, 2017 | 53 | 2017 |
Quantifying genomic privacy via inference attack with high-order SNV correlations SS Samani, Z Huang, E Ayday, M Elliot, J Fellay, JP Hubaux, Z Kutalik 2015 IEEE Security and Privacy Workshops, 32-40, 2015 | 50 | 2015 |
A privacy-preserving solution for compressed storage and selective retrieval of genomic data Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ... Genome Research 26 (12), 1687-1696, 2016 | 41 | 2016 |
Improving utility and security of the shuffler-based differential privacy T Wang, B Ding, M Xu, Z Huang, C Hong, J Zhou, N Li, S Jha arXiv preprint arXiv:1908.11515, 2019 | 36 | 2019 |
Simple encrypted arithmetic library v2. 3.0 H Chen, K Han, Z Huang, A Jalali, K Laine Microsoft, 2017 | 30 | 2017 |
Quantification of the Leakage in Federated Learning Z Li, Z Huang, C Chen, C Hong arXiv preprint arXiv:1910.05467, 2019 | 24 | 2019 |
Computing a private set intersection K Laine, H Chen, PB Rindal, Z Huang US Patent App. 16/008,915, 2019 | 17 | 2019 |
Privacy-preserving collaborative machine learning on genomic data using TensorFlow C Hong, Z Huang, W Lu, H Qu, L Ma, M Dahl, J Mancuso arXiv preprint arXiv:2002.04344, 2020 | 15 | 2020 |
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems Z Huang, C Hong, W Lu, C Weng, H Qu IEEE Transactions on Dependable and Secure Computing, 2021 | 14 | 2021 |
SQC: secure quality control for meta-analysis of genome-wide association studies Z Huang, H Lin, J Fellay, Z Kutalik, JP Hubaux Bioinformatics 33 (15), 2273-2280, 2017 | 14 | 2017 |
Credibleweb: a platform for web credibility evaluation Z Huang, A Olteanu, K Aberer CHI'13 Extended Abstracts on Human Factors in Computing Systems, 1887-1892, 2013 | 13 | 2013 |
Faster secure multiparty computation of adaptive gradient descent W Lu, Y Fang, Z Huang, C Hong, C Chen, H Qu, Y Zhou, K Ren Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in …, 2020 | 12 | 2020 |