What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Changyu Dong
Google Scholar
ORCID:
0000-0002-8625-0275
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Secure Embedding Aggregation for Cross-Silo Federated Representation Learning.
Songze Li
Jiaxiang Tang
Jinbao Zhu
Kai Zhang
Lichao Sun
Changyu Dong
2025
journals/tifs
Side-Channel Attacks and New Principles in the Shuffle Model of Differential Privacy.
Shaowei Wang
Jin Li
Changyu Dong
Jin Li
Zhili Zhou
Di Wang
Zikai Wen
2025
journals/tifs
SAMamba: Structure-Aware Mamba for Ethereum Fraud Detection.
Teng Huang
Jiahui Huang
Changyu Dong
Sisi Duan
Yan Pang
2025
journals/popets
Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF.
Yaxi Yang
Xiaojian Liang
Xiangfu Song
Ye Dong
Linting Huang
Hongyu Ren
Changyu Dong
Jianying Zhou
2025
conf/uss
Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling.
Shaowei Wang
Changyu Dong
Xiangfu Song
Jin Li
Zhili Zhou
Di Wang
Han Wu
2025
conf/uss
Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework.
Xingyu He
Youwen Zhu
Rongke Liu
Gaoning Pan
Changyu Dong
2024
journals/istr
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain.
Emanuele Scala
Changyu Dong
Flavio Corradini
Leonardo Mostarda
2024
journals/tifs
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers.
Boyu Zhu
Changyu Dong
Yuan Zhang
Yunlong Mao
Sheng Zhong
2024
journals/tifs
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes.
Jingyu Jia
Xinhao Li
Tong Li
Zhewei Liu
Chang Tan
Siyi Lv
Liang Guo
Changyu Dong
Zheli Liu
2024
journals/tifs
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi.
Lei Zhang
Yunzhe Jiang
Yazhou Ma
Shiwen Mao
Wenyuan Huang
Zhiyong Yu
Xiao Zheng
Lin Shu
Xiaochen Fan
Guangquan Xu
Changyu Dong
2024
journals/tifs
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
Yu Wei
Jingyu Jia
Yuduo Wu
Changhui Hu
Changyu Dong
Zheli Liu
Xiaofeng Chen
Yun Peng
Shaowei Wang
2024
conf/asiaccs
DISCO: Dynamic Searchable Encryption with Constant State.
Xiangfu Song
Yu Zheng
Jianli Bai
Changyu Dong
Zheli Liu
Ee-Chien Chang
2024
conf/ndss
Secret-Shared Shuffle with Malicious Security.
Xiangfu Song
Dong Yin
Jianli Bai
Changyu Dong
Ee-Chien Chang
2023
conf/acns
Predicate Private Set Intersection with Linear Complexity.
Yaxi Yang
Jian Weng
Yufeng Yi
Changyu Dong
Leo Yu Zhang
Jianying Zhou
2023
conf/asiaccs
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Mengdie Huang
Yi Xie
Xiaofeng Chen
Jin Li
Changyu Dong
Zheli Liu
Willy Susilo
2022
conf/fc
Multi-party Updatable Delegated Private Set Intersection.
Aydin Abadi
Changyu Dong
Steven J. Murdoch
Sotirios Terzis
2022
conf/esorics
GAME: Generative-Based Adaptive Model Extraction Attack.
Yi Xie
Mengdie Huang
Xiaoyu Zhang
Changyu Dong
Willy Susilo
Xiaofeng Chen
2021
journals/tifs
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
Xiaojie Guo
Zheli Liu
Jin Li
Jiqiang Gao
Boyu Hou
Changyu Dong
Thar Baker
2021
conf/uss
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
Changhui Hu
Jin Li
Zheli Liu
Xiaojie Guo
Yu Wei
Xuan Guang
Grigorios Loukides
Changyu Dong
2018
journals/tifs
Analyzing and Patching SPEKE in ISO/IEC.
Feng Hao
Roberto Metere
Siamak F. Shahandashti
Changyu Dong
2017
journals/tifs
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity.
Changyu Dong
Grigorios Loukides
2017
conf/ccs
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
Changyu Dong
Yilei Wang
Amjad Aldweesh
Patrick McCorry
Aad van Moorsel
2016
conf/fc
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.
Aydin Abadi
Sotirios Terzis
Changyu Dong
2015
conf/sec
O-PSI: Delegated Private Set Intersection on Outsourced Datasets.
Aydin Abadi
Sotirios Terzis
Changyu Dong
2015
conf/cans
Secure Set-Based Policy Checking and Its Application to Password Registration.
Changyu Dong
Franziskus Kiefer
2014
conf/esorics
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.
Changyu Dong
Liqun Chen
2013
conf/ccs
When private set intersection meets big data: an efficient and scalable protocol.
Changyu Dong
Liqun Chen
Zikai Wen
Coauthors
Aad van Moorsel
(1)
Amjad Aldweesh
(1)
Aydin Abadi
(3)
Boyu Hou
(1)
Boyu Zhu
(1)
Chang Tan
(1)
Changhui Hu
(2)
Changyu Dong
(27)
Di Wang
(2)
Dong Yin
(1)
Ee-Chien Chang
(2)
Emanuele Scala
(1)
Feng Hao
(1)
Flavio Corradini
(1)
Franziskus Kiefer
(1)
Gaoning Pan
(1)
Grigorios Loukides
(2)
Guangquan Xu
(1)
Han Wu
(1)
Hongyu Ren
(1)
Jiahui Huang
(1)
Jian Weng
(1)
Jianli Bai
(2)
Jianying Zhou
(2)
Jiaxiang Tang
(1)
Jin Li
(6)
Jinbao Zhu
(1)
Jingyu Jia
(2)
Jiqiang Gao
(1)
Kai Zhang
(1)
Lei Zhang
(1)
Leo Yu Zhang
(1)
Leonardo Mostarda
(1)
Liang Guo
(1)
Lichao Sun
(1)
Lin Shu
(1)
Linting Huang
(1)
Liqun Chen
(2)
Mengdie Huang
(2)
Patrick McCorry
(1)
Roberto Metere
(1)
Rongke Liu
(1)
Shaowei Wang
(3)
Sheng Zhong
(1)
Shiwen Mao
(1)
Siamak F. Shahandashti
(1)
Sisi Duan
(1)
Siyi Lv
(1)
Songze Li
(1)
Sotirios Terzis
(3)
Steven J. Murdoch
(1)
Teng Huang
(1)
Thar Baker
(1)
Tong Li
(1)
Wenyuan Huang
(1)
Willy Susilo
(2)
Xiangfu Song
(4)
Xiao Zheng
(1)
Xiaochen Fan
(1)
Xiaofeng Chen
(3)
Xiaojian Liang
(1)
Xiaojie Guo
(2)
Xiaoyu Zhang
(1)
Xingyu He
(1)
Xinhao Li
(1)
Xuan Guang
(1)
Yan Pang
(1)
Yaxi Yang
(2)
Yazhou Ma
(1)
Ye Dong
(1)
Yi Xie
(2)
Yilei Wang
(1)
Youwen Zhu
(1)
Yu Wei
(2)
Yu Zheng
(1)
Yuan Zhang
(1)
Yuduo Wu
(1)
Yufeng Yi
(1)
Yun Peng
(1)
Yunlong Mao
(1)
Yunzhe Jiang
(1)
Zheli Liu
(6)
Zhewei Liu
(1)
Zhili Zhou
(1)
Zhili Zhou
(1)
Zhiyong Yu
(1)
Zikai Wen
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to