What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tianhao Wang
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
White-box Membership Inference Attacks against Diffusion Models.
Yan Pang
Tianhao Wang
Xuhui Kang
Mengdi Huai
Yang Zhang
2025
conf/sp
From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis.
Kecen Li
Chen Gong
Xiaochen Li
Yuzhong Zhao
Xinwen Hou
Tianhao Wang
2025
conf/ndss
Towards Understanding Unsafe Video Generation.
Yan Pang
Aiping Xiong
Yang Zhang
Tianhao Wang
2025
conf/ndss
Revisiting EM-based Estimation for Locally Differentially Private Protocols.
Yutong Ye
Tianhao Wang
Min Zhang
Dengguo Feng
2025
conf/ndss
Delay-allowed Differentially Private Data Stream Release.
Xiaochen Li
Zhan Qin
Kui Ren
Chen Gong
Shuya Feng
Yuan Hong
Tianhao Wang
2025
conf/ndss
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models.
Yan Pang
Tianhao Wang
2025
conf/ndss
TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents.
Chen Gong
Kecen Li
Jin Yao
Tianhao Wang
2025
conf/uss
Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run.
Zihang Xiang
Tianhao Wang
Di Wang
2024
conf/ccs
Benchmarking Secure Sampling Protocols for Differential Privacy.
Yucheng Fu
Tianhao Wang
2024
conf/ccs
PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps.
Ruixuan Liu
Tianhao Wang
Yang Cao
Li Xiong
2024
conf/uss
PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining.
Kecen Li
Chen Gong
Zhixiang Li
Yuzhong Zhao
Xinwen Hou
Tianhao Wang
2024
conf/sp
Baffle: Hiding Backdoors in Offline Reinforcement Learning Datasets.
Chen Gong
Zhou Yang
Yunpeng Bai
Junda He
Jieke Shi
Kecen Li
Arunesh Sinha
Bowen Xu
Xinwen Hou
David Lo
Tianhao Wang
2024
conf/sp
Preserving Node-level Privacy in Graph Neural Networks.
Zihang Xiang
Tianhao Wang
Di Wang
2023
conf/ccs
Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy.
Chengkun Wei
Ruijing Yu
Yuan Fan
Wenzhi Chen
Tianhao Wang
2023
conf/ccs
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass.
Minxin Du
Xiang Yue
Sherman S. M. Chow
Tianhao Wang
Chenyu Huang
Huan Sun
2023
conf/uss
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models.
Haiming Wang
Zhikun Zhang
Tianhao Wang
Shibo He
Michael Backes
Jiming Chen
Yang Zhang
2023
conf/uss
FACE-AUDITOR: Data Auditing in Facial Recognition Systems.
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Yang Zhang
2023
conf/uss
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
Boyang Zhang
Xinlei He
Yun Shen
Tianhao Wang
Yang Zhang
2023
conf/acsac
Mitigating Membership Inference Attacks via Weighted Smoothing.
Mingtian Tan
Xiaofei Xie
Jun Sun
Tianhao Wang
2023
conf/acsac
Differentially Private Resource Allocation.
Joann Qiongna Chen
Tianhao Wang
Zhikun Zhang
Yang Zhang
Somesh Jha
Zhou Li
2022
conf/ccs
Federated Boosted Decision Trees with Differential Privacy.
Samuel Maddock
Graham Cormode
Tianhao Wang
Carsten Maple
Somesh Jha
2022
conf/ccs
Graph Unlearning.
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Mathias Humbert
Yang Zhang
2022
conf/sp
Locally Differentially Private Sparse Vector Aggregation.
Mingxun Zhou
Tianhao Wang
T.-H. Hubert Chan
Giulia Fanti
Elaine Shi
2021
conf/ccs
When Machine Unlearning Jeopardizes Privacy.
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Mathias Humbert
Yang Zhang
2021
conf/ccs
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Tianhao Wang
Joann Qiongna Chen
Zhikun Zhang
Dong Su
Yueqiang Cheng
Zhou Li
Ninghui Li
Somesh Jha
2021
conf/uss
PrivSyn: Differentially Private Data Synthesis.
Zhikun Zhang
Tianhao Wang
Ninghui Li
Jean Honorio
Michael Backes
Shibo He
Jiming Chen
Yang Zhang
2020
conf/sp
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension.
Aiping Xiong
Tianhao Wang
Ninghui Li
Somesh Jha
2020
conf/ndss
Locally Differentially Private Frequency Estimation with Consistency.
Tianhao Wang
Milan Lopuhaä-Zwakenberg
Zitao Li
Boris Skoric
Ninghui Li
2019
conf/acsac
Koinonia: verifiable e-voting with long-term privacy.
Huangyi Ge
Sze Yiu Chau
Victor E. Gonsalves
Huian Li
Tianhao Wang
Xukai Zou
Ninghui Li
2018
conf/ccs
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy.
Zhikun Zhang
Tianhao Wang
Ninghui Li
Shibo He
Jiming Chen
2018
conf/sp
Locally Differentially Private Frequent Itemset Mining.
Tianhao Wang
Ninghui Li
Somesh Jha
2017
conf/uss
Locally Differentially Private Protocols for Frequency Estimation.
Tianhao Wang
Jeremiah Blocki
Ninghui Li
Somesh Jha
2016
conf/ccs
Secure Dynamic SSE via Access Indistinguishable Storage.
Tianhao Wang
Yunlei Zhao
2016
conf/ccs
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Tianhao Wang
Huangyi Ge
Omar Chowdhury
Hemanta K. Maji
Ninghui Li
Coauthors
Aiping Xiong
(2)
Arunesh Sinha
(1)
Boris Skoric
(1)
Bowen Xu
(1)
Boyang Zhang
(1)
Carsten Maple
(1)
Chen Gong
(5)
Chengkun Wei
(1)
Chenyu Huang
(1)
David Lo
(1)
Dengguo Feng
(1)
Di Wang
(2)
Dong Su
(1)
Elaine Shi
(1)
Giulia Fanti
(1)
Graham Cormode
(1)
Haiming Wang
(1)
Hemanta K. Maji
(1)
Huan Sun
(1)
Huangyi Ge
(2)
Huian Li
(1)
Jean Honorio
(1)
Jeremiah Blocki
(1)
Jieke Shi
(1)
Jiming Chen
(3)
Jin Yao
(1)
Joann Qiongna Chen
(2)
Jun Sun
(1)
Junda He
(1)
Kecen Li
(4)
Kui Ren
(1)
Li Xiong
(1)
Mathias Humbert
(2)
Mengdi Huai
(1)
Michael Backes
(5)
Milan Lopuhaä-Zwakenberg
(1)
Min Chen
(3)
Min Zhang
(1)
Mingtian Tan
(1)
Mingxun Zhou
(1)
Minxin Du
(1)
Ninghui Li
(9)
Omar Chowdhury
(1)
Ruijing Yu
(1)
Ruixuan Liu
(1)
Samuel Maddock
(1)
Sherman S. M. Chow
(1)
Shibo He
(3)
Shuya Feng
(1)
Somesh Jha
(6)
Sze Yiu Chau
(1)
T.-H. Hubert Chan
(1)
Tianhao Wang
(34)
Victor E. Gonsalves
(1)
Wenzhi Chen
(1)
Xiang Yue
(1)
Xiaochen Li
(2)
Xiaofei Xie
(1)
Xinlei He
(1)
Xinwen Hou
(3)
Xuhui Kang
(1)
Xukai Zou
(1)
Yan Pang
(3)
Yang Cao
(1)
Yang Zhang
(9)
Yuan Fan
(1)
Yuan Hong
(1)
Yucheng Fu
(1)
Yueqiang Cheng
(1)
Yun Shen
(1)
Yunlei Zhao
(1)
Yunpeng Bai
(1)
Yutong Ye
(1)
Yuzhong Zhao
(2)
Zhan Qin
(1)
Zhikun Zhang
(8)
Zhixiang Li
(1)
Zhou Li
(2)
Zhou Yang
(1)
Zihang Xiang
(2)
Zitao Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to