Local differential privacy and its applications: A comprehensive survey M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao, KY Lam Computer Standards & Interfaces, 103827, 2023 | 187 | 2023 |
K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis M Yang, I Tjuawinata, KY Lam IEEE Transactions on Information Forensics and Security 17, 2524-2537, 2022 | 30 | 2022 |
Secure hot path crowdsourcing with local differential privacy under fog computing architecture M Yang, I Tjuawinata, KY Lam, J Zhao, L Sun IEEE Transactions on Services Computing 15 (4), 2188-2201, 2020 | 29 | 2020 |
Differential-linear cryptanalysis of ICEPOLE T Huang, I Tjuawinata, H Wu International Workshop on Fast Software Encryption, 243-263, 2015 | 29 | 2015 |
On List Decoding of Insertion and Deletion Errors S Liu, I Tjuawinata, C Xing arXiv preprint arXiv:1906.09705, 2019 | 23 | 2019 |
Explicit Constructions of Two-Dimensional Reed-Solomon Codes in High Insertion and Deletion Noise Regime T Do Duc, S Liu, I Tjuawinata, C Xing IEEE Transactions on Information Theory 67 (5), 2808-2820, 2021 | 18 | 2021 |
On 2-dimensional insertion-deletion Reed-Solomon codes with optimal asymptotic error-correcting capability S Liu, I Tjuawinata Finite Fields and Their Applications 73, 101841, 2021 | 14 | 2021 |
MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack Z Liu, I Tjuawinata, C Xing, KY Lam arXiv preprint arXiv:2007.12557, 2020 | 14 | 2020 |
Differentially Private Distributed Frequency Estimation M Yang, I Tjuawinata, KY Lam, T Zhu, J Zhao IEEE Transactions on Dependable and Secure Computing 20 (5), 3910-3926, 2022 | 9 | 2022 |
Efficiently List-Decodable Insertion and Deletion Codes via Concatenation S Liu, I Tjuawinata, C Xing IEEE Transactions on Information Theory 67 (9), 5778-5790, 2021 | 7 | 2021 |
Improved differential cryptanalysis on generalized Feistel schemes I Tjuawinata, T Huang, H Wu Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017 | 6 | 2017 |
Explicit Construction of q-ary 2-deletion Correcting Codes with Low Redundancy S Liu, I Tjuawinata, C Xing IEEE Transactions on Information Theory, 2024 | 5 | 2024 |
Privacy-Preserving Federated Unlearning with Certified Client Removal Z Liu, H Ye, Y Jiang, J Shen, J Guo, I Tjuawinata, KY Lam arXiv preprint arXiv:2404.09724, 2024 | 4 | 2024 |
Weakness in the authentication of primates-ape I Tjuawinata, H Wu Cryptographic Competitions Mailing List, 2014 | 4 | 2014 |
List Decoding of Insertion and Deletion Codes S Liu, I Tjuawinata, C Xing arXiv preprint arXiv:1906.09705, 2019 | 3 | 2019 |
Leakage-Resilient Secret Sharing with Constant Share Size I Tjuawinata, C Xing IEEE Transactions on Information Theory 68 (12), 8228-8250, 2022 | 2 | 2022 |
Fair and Differentially Private Distributed Frequency Estimation M Yang, I Tjuawinata, KY Lam, T Zhu, J Zhao arXiv preprint arXiv:2104.05974, 2021 | 2 | 2021 |
Cryptanalysis of simpira v2 I Tjuawinata, T Huang, H Wu Australasian Conference on Information Security and Privacy, 384-401, 2017 | 2 | 2017 |
Cryptanalysis of the Authenticated Encryption Algorithm COFFE I Tjuawinata, T Huang, H Wu Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016 | 2 | 2016 |
Search and Permission Request Over Encrypted Database I Tjuawinata, Y Zhao, B Shen, KY Lam, CH Chi 2023 10th International Conference on ICT for Smart Society (ICISS), 1-7, 2023 | 1 | 2023 |