Follow
Cheng HONG
Cheng HONG
Director of Cryptography and Privacy Research, Ant Group
Verified email at antgroup.com - Homepage
Title
Cited by
Cited by
Year
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference.
Z Huang, W Lu, C Hong, J Ding
31st USENIX Security Symposium, 2022
1492022
面向云存储的高效动态密文访问控制方法
洪澄, 张敏, 冯登国
通信学报 32 (7), 125-132, 2011
94*2011
AB-ACCS: 一种云存储密文访问控制方法
洪澄, 张敏, 冯登国
计算机研究与发展, 2010
91*2010
Answering multi-dimensional analytical queries under local differential privacy
T Wang, B Ding, J Zhou, C Hong, Z Huang, N Li, S Jha
Proceedings of the 2019 International Conference on Management of Data, 159-176, 2019
802019
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.
W Lu, Z Huang, C Hong, Y Ma, H Qu
IEEE Symposium on Security and Privacy, 1057-1073, 2021
792021
When homomorphic encryption marries secret sharing: Secure large-scale sparse logistic regression and applications in risk control
C Chen, J Zhou, L Wang, X Wu, W Fang, J Tan, L Wang, AX Liu, H Wang, ...
Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data …, 2021
682021
Expressive and secure searchable encryption in the public key setting
Z Lv, C Hong, M Zhang, D Feng
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
65*2014
Secure social recommendation based on secret sharing
C Chen, L Li, B Wu, C Hong, L Wang, J Zhou
European Conference on Artificial Intelligence, 506 - 512, 2020
402020
Improving utility and security of the shuffler-based differential privacy
T Wang, B Ding, M Xu, Z Huang, C Hong, J Zhou, N Li, S Jha
Proceedings of the VLDB Endowment 13 (13), pp 3545–3558, 2020
39*2020
Covert security with public verifiability: Faster, leaner, and simpler
C Hong, J Katz, V Kolesnikov, W Lu, X Wang
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
382019
Quantification of the leakage in federated learning
Z Li, Z Huang, C Chen, C Hong
Workshop on Federated Learning in Conjunction with NeurIPS 2019 (FL-NeurIPS'19), 2019
242019
Falcon: Fast spectral inference on encrypted data
Q Lou, W Lu, C Hong, L Jiang
Advances in Neural Information Processing Systems 33, 2364-2374, 2020
232020
A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack
K Cai, C Hong, M Zhang, D Feng, Z Lv
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
232013
一种服务器透明的外包数据库查询验证方法
张敏, 洪澄, 陈驰
计算机研究与发展, 182-190, 2010
22*2010
Homopai: A secure collaborative machine learning platform based on homomorphic encryption
Q Li, Z Huang, W Lu, C Hong, H Qu, H He, W Zhang
2020 IEEE 36th International Conference on Data Engineering (ICDE), 1713-1717, 2020
212020
A secure and efficient revocation scheme for fine-grained access control in cloud storage
Z Lv, C Hong, M Zhang, D Feng
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
212012
Fast multi-dimensional range queries on encrypted cloud databases
J Chi, C Hong, M Zhang, Z Zhang
Database Systems for Advanced Applications: 22nd International Conference …, 2017
182017
A secure and efficient role-based access policy towards cryptographic cloud storage
C Hong, Z Lv, M Zhang, D Feng
Web-Age Information Management: 12th International Conference, WAIM 2011 …, 2011
172011
面向社交网络的隐私保护方案
吕志泉, 洪澄, 张敏, 冯登国, 陈开渠
通信学报 8, 2014
15*2014
PUMA: Secure Inference of LLaMA-7B in Five Minutes
Y Dong, W Lu, Y Zheng, H Wu, D Zhao, J Tan, Z Huang, C Hong, T Wei, ...
arXiv preprint arXiv:2307.12533, 2023
142023
The system can't perform the operation now. Try again later.
Articles 1–20