Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Huayi Duan
@article{DBLP:journals/tdsc/DuanDZWAW23, author = {Huayi Duan and Yuefeng Du and Leqian Zheng and Cong Wang and Man Ho Au and Qian Wang}, title = {Towards Practical Auditing of Dynamic Data in Decentralized Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {708--723}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3142611}, doi = {10.1109/TDSC.2022.3142611}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DuanDZWAW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengWWDN23, author = {Yifeng Zheng and Cong Wang and Ruochen Wang and Huayi Duan and Surya Nepal}, title = {Optimizing Secure Decision Tree Inference Outsourcing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3079--3092}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3194048}, doi = {10.1109/TDSC.2022.3194048}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengWWDN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuDXCWW23, author = {Yuefeng Du and Huayi Duan and Lei Xu and Helei Cui and Cong Wang and Qian Wang}, title = {{\textdollar}\{\{{\textbackslash}sf PEBA\}\}{\textdollar}: Enhancing User Privacy and Coverage of Safe Browsing Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {4343--4358}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3204767}, doi = {10.1109/TDSC.2022.3204767}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuDXCWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/StogerZDP23, author = {Felix St{\"{o}}ger and Anxin Zhou and Huayi Duan and Adrian Perrig}, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Demystifying Web3 Centralization: The Case of Off-Chain {NFT} Hijacking}, booktitle = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13951}, pages = {182--199}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47751-5\_11}, doi = {10.1007/978-3-031-47751-5\_11}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/StogerZDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/DuanFL0BP23, author = {Huayi Duan and Rub{\'{e}}n Fischer and Jie Lou and Si Liu and David A. Basin and Adrian Perrig}, editor = {Mahesh Balakrishnan and Manya Ghobadi}, title = {{RHINE:} Robust and High-performance Internet Naming with {E2E} Authenticity}, booktitle = {20th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2023, Boston, MA, April 17-19, 2023}, pages = {531--553}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/nsdi23/presentation/duan}, timestamp = {Thu, 11 May 2023 17:08:22 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/DuanFL0BP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/0003DHBVBP23, author = {Si Liu and Huayi Duan and Lukas Heimes and Marco Bearzi and Jodok Vieli and David A. Basin and Adrian Perrig}, editor = {Henning Schulzrinne and Vishal Misra and Eddie Kohler and David A. Maltz}, title = {A Formal Framework for End-to-End {DNS} Resolution}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2023 Conference, {ACM} {SIGCOMM} 2023, New York, NY, USA, 10-14 September 2023}, pages = {932--949}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603269.3604870}, doi = {10.1145/3603269.3604870}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/0003DHBVBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDWWN22, author = {Yifeng Zheng and Huayi Duan and Cong Wang and Ruochen Wang and Surya Nepal}, title = {Securely and Efficiently Outsourcing Decision Tree Inference}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1841--1855}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3040012}, doi = {10.1109/TDSC.2020.3040012}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDWWN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuDZWAW22, author = {Yuefeng Du and Huayi Duan and Anxin Zhou and Cong Wang and Man Ho Au and Qian Wang}, title = {Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3038--3054}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3081826}, doi = {10.1109/TDSC.2021.3081826}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuDZWAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0019ZD00J22, author = {Lei Xu and Anxin Zhou and Huayi Duan and Cong Wang and Qian Wang and Xiaohua Jia}, title = {Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2022}, url = {https://eprint.iacr.org/2022/894}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0019ZD00J22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDTWZ21, author = {Yifeng Zheng and Huayi Duan and Xiaoting Tang and Cong Wang and Jiantao Zhou}, title = {Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1261--1275}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2907081}, doi = {10.1109/TDSC.2019.2907081}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDTWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuDZYW21, author = {Lei Xu and Huayi Duan and Anxin Zhou and Xingliang Yuan and Cong Wang}, title = {Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {5310--5325}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3128823}, doi = {10.1109/TIFS.2021.3128823}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuDZYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-00397, author = {Yifeng Zheng and Cong Wang and Ruochen Wang and Huayi Duan and Surya Nepal}, title = {Optimizing Secure Decision Tree Inference Outsourcing}, journal = {CoRR}, volume = {abs/2111.00397}, year = {2021}, url = {https://arxiv.org/abs/2111.00397}, eprinttype = {arXiv}, eprint = {2111.00397}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-00397.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuDZYW21, author = {Lei Xu and Huayi Duan and Anxin Zhou and Xingliang Yuan and Cong Wang}, title = {Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1593}, year = {2021}, url = {https://eprint.iacr.org/2021/1593}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/XuDZYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDY020, author = {Yifeng Zheng and Huayi Duan and Xingliang Yuan and Cong Wang}, title = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {121--133}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2753245}, doi = {10.1109/TDSC.2017.2753245}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/0001DZ0AW20, author = {Yuefeng Du and Huayi Duan and Anxin Zhou and Cong Wang and Man Ho Au and Qian Wang}, title = {Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {201--211}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00023}, doi = {10.1109/ICDCS47774.2020.00023}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/0001DZ0AW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-05531, author = {Yuefeng Du and Huayi Duan and Anxin Zhou and Cong Wang and Man Ho Au and Qian Wang}, title = {Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage}, journal = {CoRR}, volume = {abs/2005.05531}, year = {2020}, url = {https://arxiv.org/abs/2005.05531}, eprinttype = {arXiv}, eprint = {2005.05531}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-05531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DuanZWY19, author = {Huayi Duan and Yifeng Zheng and Cong Wang and Xingliang Yuan}, title = {Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {2637--2650}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2872461}, doi = {10.1109/JIOT.2018.2872461}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DuanZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuanWYZW019, author = {Huayi Duan and Cong Wang and Xingliang Yuan and Yajin Zhou and Qian Wang and Kui Ren}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2351--2367}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3339814}, doi = {10.1145/3319535.3339814}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DuanWYZW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhengDW19, author = {Yifeng Zheng and Huayi Duan and Cong Wang}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Towards Secure and Efficient Outsourcing of Machine Learning Classification}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {22--40}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_2}, doi = {10.1007/978-3-030-29959-0\_2}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhengDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/CuiDQWZ19, author = {Helei Cui and Huayi Duan and Zhan Qin and Cong Wang and Yajin Zhou}, title = {{SPEED:} Accelerating Enclave Applications Via Secure Deduplication}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1072--1082}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00110}, doi = {10.1109/ICDCS.2019.00110}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/CuiDQWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangDWLW19, author = {Xiaoli Zhang and Huayi Duan and Cong Wang and Qi Li and Jianping Wu}, title = {Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {1162--1170}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737435}, doi = {10.1109/INFOCOM.2019.8737435}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangDWLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LuoJDWXF19, author = {Yuchuan Luo and Xiaohua Jia and Huayi Duan and Cong Wang and Ming Xu and Shaojing Fu}, title = {pRide: private ride request for online ride hailing service with secure hardware enclave}, booktitle = {Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019}, pages = {27:1--27:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3326285.3329062}, doi = {10.1145/3326285.3329062}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/LuoJDWXF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/DuanZDZWA19, author = {Huayi Duan and Yifeng Zheng and Yuefeng Du and Anxin Zhou and Cong Wang and Man Ho Au}, title = {Aggregating Crowd Wisdom via Blockchain: {A} Private, Correct, and Robust Realization}, booktitle = {2019 {IEEE} International Conference on Pervasive Computing and Communications, PerCom, Kyoto, Japan, March 11-15, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOM.2019.8767412}, doi = {10.1109/PERCOM.2019.8767412}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/DuanZDZWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengDW18, author = {Yifeng Zheng and Huayi Duan and Cong Wang}, title = {Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2475--2489}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819134}, doi = {10.1109/TIFS.2018.2819134}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWLCMLDWQ18, author = {Fei Chen and Donghong Wang and Ronghua Li and Jianyong Chen and Zhong Ming and Alex X. Liu and Huayi Duan and Cong Wang and Jing Qin}, title = {Secure Hashing-Based Verifiable Pattern Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2677--2690}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825141}, doi = {10.1109/TIFS.2018.2825141}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenWLCMLDWQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YuanDW18, author = {Xingliang Yuan and Huayi Duan and Cong Wang}, title = {Assuring String Pattern Matching in Outsourced Middleboxes}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {26}, number = {3}, pages = {1362--1375}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2822837}, doi = {10.1109/TNET.2018.2822837}, timestamp = {Tue, 10 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YuanDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/CaiDW18, author = {Chengjun Cai and Huayi Duan and Cong Wang}, title = {Tutorial: Building Secure and Trustworthy Blockchain Applications}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {120--121}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00023}, doi = {10.1109/SECDEV.2018.00023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/CaiDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DuanYW17, author = {Huayi Duan and Xingliang Yuan and Cong Wang}, title = {LightBox: SGX-assisted Secure Network Functions at Near-native Speed}, journal = {CoRR}, volume = {abs/1706.06261}, year = {2017}, url = {http://arxiv.org/abs/1706.06261}, eprinttype = {arXiv}, eprint = {1706.06261}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DuanYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/YuanDW16, author = {Xingliang Yuan and Huayi Duan and Cong Wang}, title = {Bringing execution assurances of pattern matching in outsourced middleboxes}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784424}, doi = {10.1109/ICNP.2016.7784424}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/YuanDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/YuanDW16a, author = {Xingliang Yuan and Huayi Duan and Cong Wang}, title = {Towards verifiable outsourced middleboxes}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784466}, doi = {10.1109/ICNP.2016.7784466}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/YuanDW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.