Publications

Polynomial Commitment with a One-to-Many Prover and Applications

USENIX Security Symposium (USENIX Security) 2022

PDF

A Metadata-Hiding File-Sharing System with Malicious Security

Annual Network and Distributed System Security Symposium (NDSS) 2022

PDF DOI

Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work

International Conference on Security and Cryptography (SECRYPT) 2021

PDF DOI

MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves

ACM Conference on Data and Application Security and Privacy (CODASPY) 2020

PDF DOI

MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework

Annual Network and Distributed System Security Symposium (NDSS) 2020

PDF Code Slides Video DOI

A Multi-server ORAM Framework with Constant Client Bandwidth Blowup

ACM Transactions on Privacy and Security  2020

PDF Code DOI

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset

Privacy Enhancing Technologies Symposium (PETS) 2019

PDF Code Slides DOI

A Multi-Server Oblivious Dynamic Searchable Encryption Framework

Journal of Computer Security  2019

PDF Code DOI

A Secure Searchable Encryption Framework for PrivacyCritical Cloud Storage Services

IEEE Transactions on Services Computing  2018

PDF Code DOI

Efficient Oblivious Data Structures for Database Services on the Cloud

IEEE Transactions on Cloud Computing  2018

PDF Code DOI

Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems

IFIP WG 11.3 COnference on Data and Applications Security and Privacy (DBSec) 2018 *Best Paper Award*

PDF Code DOI

Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search

IEEE International Conference on Communications (ICC) 2018

PDF Code DOI

Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis

International Conference on Information Security (ISC) 2017

PDF Slides DOI

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

ACM Conference on Computer and Communications Security (CCS) 2017

PDF Code Slides Video DOI

Practical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure

Annual Computer Security Applications Conference (ACSAC) 2016

PDF Slides DOI

Gait Authentication on Mobile Phone Using Biometric Cryptosystem and Fuzzy Commitment Scheme

International Journal of Information Security  2015

PDF DOI

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone

International Conference on Security and Cryptography (SECRYPT) 2015

PDF Code Dataset Slides DOI

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error

International Information Security and Privacy Conference (IFIP SEC) 2013

PDF DOI

Adaptive Cross-Device Gait Recognition Using Mobile Accelerometer

Journal of Information Processing System (K-JIPS) 2013

PDF DOI

Personalization in Mobile Activity Recognition System using KMedoids Clustering Algorithm

International Journal of Distributed Sensor Networks  2013

PDF DOI

Adaptive Energy-Saving Strategy for Activity Recognition on Mobile Phone

IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) 2012

PDF DOI

Gait Identification Using Accelerometer on Mobile Phone

International Conference on Control, Automation and Information Sciences (ICCAIS) 2012 *Best Paper Award*

PDF DOI