Segui
Ivan Tjuawinata
Titolo
Citata da
Citata da
Anno
Local differential privacy and its applications: A comprehensive survey
M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao, KY Lam
Computer Standards & Interfaces, 103827, 2023
1872023
K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis
M Yang, I Tjuawinata, KY Lam
IEEE Transactions on Information Forensics and Security 17, 2524-2537, 2022
302022
Secure hot path crowdsourcing with local differential privacy under fog computing architecture
M Yang, I Tjuawinata, KY Lam, J Zhao, L Sun
IEEE Transactions on Services Computing 15 (4), 2188-2201, 2020
292020
Differential-linear cryptanalysis of ICEPOLE
T Huang, I Tjuawinata, H Wu
International Workshop on Fast Software Encryption, 243-263, 2015
292015
On List Decoding of Insertion and Deletion Errors
S Liu, I Tjuawinata, C Xing
arXiv preprint arXiv:1906.09705, 2019
232019
Explicit Constructions of Two-Dimensional Reed-Solomon Codes in High Insertion and Deletion Noise Regime
T Do Duc, S Liu, I Tjuawinata, C Xing
IEEE Transactions on Information Theory 67 (5), 2808-2820, 2021
182021
On 2-dimensional insertion-deletion Reed-Solomon codes with optimal asymptotic error-correcting capability
S Liu, I Tjuawinata
Finite Fields and Their Applications 73, 101841, 2021
142021
MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack
Z Liu, I Tjuawinata, C Xing, KY Lam
arXiv preprint arXiv:2007.12557, 2020
142020
Differentially Private Distributed Frequency Estimation
M Yang, I Tjuawinata, KY Lam, T Zhu, J Zhao
IEEE Transactions on Dependable and Secure Computing 20 (5), 3910-3926, 2022
92022
Efficiently List-Decodable Insertion and Deletion Codes via Concatenation
S Liu, I Tjuawinata, C Xing
IEEE Transactions on Information Theory 67 (9), 5778-5790, 2021
72021
Improved differential cryptanalysis on generalized Feistel schemes
I Tjuawinata, T Huang, H Wu
Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017
62017
Explicit Construction of q-ary 2-deletion Correcting Codes with Low Redundancy
S Liu, I Tjuawinata, C Xing
IEEE Transactions on Information Theory, 2024
52024
Privacy-Preserving Federated Unlearning with Certified Client Removal
Z Liu, H Ye, Y Jiang, J Shen, J Guo, I Tjuawinata, KY Lam
arXiv preprint arXiv:2404.09724, 2024
42024
Weakness in the authentication of primates-ape
I Tjuawinata, H Wu
Cryptographic Competitions Mailing List, 2014
42014
List Decoding of Insertion and Deletion Codes
S Liu, I Tjuawinata, C Xing
arXiv preprint arXiv:1906.09705, 2019
32019
Leakage-Resilient Secret Sharing with Constant Share Size
I Tjuawinata, C Xing
IEEE Transactions on Information Theory 68 (12), 8228-8250, 2022
22022
Fair and Differentially Private Distributed Frequency Estimation
M Yang, I Tjuawinata, KY Lam, T Zhu, J Zhao
arXiv preprint arXiv:2104.05974, 2021
22021
Cryptanalysis of simpira v2
I Tjuawinata, T Huang, H Wu
Australasian Conference on Information Security and Privacy, 384-401, 2017
22017
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
I Tjuawinata, T Huang, H Wu
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
22016
Search and Permission Request Over Encrypted Database
I Tjuawinata, Y Zhao, B Shen, KY Lam, CH Chi
2023 10th International Conference on ICT for Smart Society (ICISS), 1-7, 2023
12023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20