关注
Junbum Shin
Junbum Shin
cryptolab
在 cryptolab.co.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Collecting and analyzing multidimensional data with local differential privacy
N Wang, X Xiao, Y Yang, J Zhao, SC Hui, H Shin, J Shin, G Yu
2019 IEEE 35th International Conference on Data Engineering (ICDE), 638-649, 2019
3762019
ScanDal: Static analyzer for detecting privacy leaks in android applications
J Kim, Y Yoon, K Yi, J Shin, S Center
MoST 12 (110), 1, 2012
2982012
Collecting and analyzing data from smart device users with local differential privacy
TT Nguyên, X Xiao, Y Yang, SC Hui, H Shin, J Shin
arXiv preprint arXiv:1606.05053, 2016
2782016
Privacy enhanced matrix factorization for recommendation with local differential privacy
H Shin, S Kim, J Shin, X Xiao
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1770-1782, 2018
2442018
Algorithm specifications and supporting documentation
C Chen, O Danba, J Hoffstein, A Hülsing, J Rijneveld, JM Schanck, ...
Brown University and Onboard security company, Wilmington USA, 2019
1242019
New DSA-verifiable signcryption schemes
JB Shin, K Lee, K Shim
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
1152003
PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy
GYN Wang, X Xiao, Y Yang, TD Hoang, H Shin, J Shin, G Yu
IEEE International Conference on Data Engineering (ICDE), 2018
1002018
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
822016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
752018
Method and apparatus for protecting digital contents stored in usb mass storage device
CS Ahn, J Shin, B Kim
US Patent App. 11/872,161, 2008
702008
Automated extraction and presentation of data practices in privacy policies
D Bui, KG Shin, JM Choi, J Shin
Proceedings on Privacy Enhancing Technologies, 2021
682021
{Hardware-Assisted}{On-Demand} hypervisor activation for efficient security critical code execution on mobile devices
Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek
2016 USENIX Annual Technical Conference (USENIX ATC 16), 565-578, 2016
652016
Consistency analysis of data-usage purposes in mobile apps
D Bui, Y Yao, KG Shin, JM Choi, J Shin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
622021
Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity
J Shin, J Park
US Patent 8,155,311, 2012
602012
Method and apparatus for encrypting transport stream of multimedia content, and method and apparatus for decrypting transport stream of multimedia content
CH Lee, J Shin, SY Lee, EH Hong
US Patent 8,281,128, 2012
502012
Watermarking method and apparatus for tracking hacked content and method and apparatus for blocking hacking of content using the same
J Shin, BH Cha
US Patent 9,384,332, 2016
452016
HETAL: Efficient privacy-preserving transfer learning with homomorphic encryption
S Lee, G Lee, JW Kim, J Shin, MK Lee
International conference on machine learning, 19010-19035, 2023
342023
A new appraoch to server-aided secret computation.
SM Hong, JB Shin, H Lee-Kwang, H Yoon
ICISC, 33-45, 1998
261998
Instant privacy-preserving biometric authentication for hamming distance
J Lee, D Kim, D Kim, Y Song, J Shin, JH Cheon
Cryptology ePrint Archive, 2018
252018
Learning new words from keystroke data with local differential privacy
S Kim, H Shin, C Baek, S Kim, J Shin
IEEE Transactions on Knowledge and Data Engineering 32 (3), 479-491, 2018
212018
系统目前无法执行此操作,请稍后再试。
文章 1–20