Publications

*underlined indicates my current/former advisees at the time of initial/completion of the project.
 
Privacy-Preserving Verifiable Neural Network Inference Service

The Annual Computer Security Applications Conference (ACSAC) 2024

Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning

The Annual Computer Security Applications Conference (ACSAC) 2024

Breaking Privacy in Model-Heterogeneous Federated Learning

International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2024

PDF Code Slides DOI

An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline

IEEE Transactions on Dependable and Secure Computing  2024

PDF DOI

MUSES: Efficient Multi-User Searchable Encrypted Database

USENIX Security Symposium (USENIX Security) 2024

PDF Code Slides

Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware

Privacy Enhancing Technologies Symposium (PETS) 2024

PDF Code Slides DOI

Exploiting Update Leakage in Searchable Symmetric Encryption

ACM Conference on Data and Application Security and Privacy (CODASPY) 2024

PDF Code Slides DOI

VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications

International Conference on Computer Communications and Networks (ICCCN) 2023

PDF DOI

ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline

Privacy Enhancing Technologies Symposium (PETS) 2023

PDF Code Slides DOI

Efficient Dynamic Proof of Retrievability for Cold Storage

Annual Network and Distributed System Security Symposium (NDSS) 2023

PDF Code Slides DOI

AVET: A Novel Transform Function to Improve Cancellable Biometrics Security

IEEE Transactions on Information Forensics and Security  2022

PDF DOI

ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database

IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS) 2022

PDF DOI

Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations

IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS) 2022

PDF DOI

Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era

IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS) 2022

PDF DOI

Polynomial Commitment with a One-to-Many Prover and Applications

USENIX Security Symposium (USENIX Security) 2022

PDF Code Slides

A Metadata-Hiding File-Sharing System with Malicious Security

Annual Network and Distributed System Security Symposium (NDSS) 2022

PDF DOI

Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work

International Conference on Security and Cryptography (SECRYPT) 2021

PDF DOI

Multi-Model Long Short-Term Memory Network for Gait Recognition Using Window-Based Data Segment

IEEE Access  2021

PDF DOI

MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves

ACM Conference on Data and Application Security and Privacy (CODASPY) 2020

PDF Slides DOI

MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework

Annual Network and Distributed System Security Symposium (NDSS) 2020

PDF Code Slides Video DOI

A Multi-server ORAM Framework with Constant Client Bandwidth Blowup

ACM Transactions on Privacy and Security  2020

PDF Code DOI

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset

Privacy Enhancing Technologies Symposium (PETS) 2019

PDF Code Slides DOI

A Multi-Server Oblivious Dynamic Searchable Encryption Framework

Journal of Computer Security  2019

PDF Code DOI

A Secure Searchable Encryption Framework for PrivacyCritical Cloud Storage Services

IEEE Transactions on Services Computing  2018

PDF Code DOI

Efficient Oblivious Data Structures for Database Services on the Cloud

IEEE Transactions on Cloud Computing  2018

PDF Code DOI

Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems

IFIP WG 11.3 COnference on Data and Applications Security and Privacy (DBSec) 2018 *Best Paper Award*

PDF Code DOI

Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search

IEEE International Conference on Communications (ICC) 2018

PDF Code DOI

Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis

International Conference on Information Security (ISC) 2017

PDF Slides DOI

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

ACM Conference on Computer and Communications Security (CCS) 2017

PDF Code Slides Video DOI

Practical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure

Annual Computer Security Applications Conference (ACSAC) 2016

PDF Slides DOI

Gait Authentication on Mobile Phone Using Biometric Cryptosystem and Fuzzy Commitment Scheme

International Journal of Information Security  2015

PDF DOI

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone

International Conference on Security and Cryptography (SECRYPT) 2015

PDF Code Dataset Slides DOI

Secure and Privacy Enhanced Gait Authentication on Smart Phone

The Scientific World Journal  2014

PDF DOI

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error

International Information Security and Privacy Conference (IFIP SEC) 2013

PDF DOI

Adaptive Cross-Device Gait Recognition Using Mobile Accelerometer

Journal of Information Processing System (K-JIPS) 2013

PDF DOI

Personalization in Mobile Activity Recognition System using KMedoids Clustering Algorithm

International Journal of Distributed Sensor Networks  2013

PDF DOI

Adaptive Energy-Saving Strategy for Activity Recognition on Mobile Phone

IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) 2012

PDF DOI

Gait Identification Using Accelerometer on Mobile Phone

International Conference on Control, Automation and Information Sciences (ICCAIS) 2012 *Best Paper Award*

PDF DOI