Zhicong Huang
Zhicong Huang
Alibaba Group
Verified email at - Homepage
Cited by
Cited by
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
H Chen, Z Huang, K Laine, P Rindal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Logistic regression over encrypted data from fully homomorphic encryption
H Chen, R Gilad-Bachrach, K Han, Z Huang, A Jalali, K Laine, K Lauter
BMC medical genomics 11 (4), 81, 2018
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies
F Tramčr, Z Huang, JP Hubaux, E Ayday
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
GenoGuard: Protecting genomic data against brute-force attacks
Z Huang, E Ayday, J Fellay, JP Hubaux, A Juels
2015 IEEE Symposium on Security and Privacy, 447-462, 2015
PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption
W Lu, Z Huang, C Hong, Y Ma, H Qu
2021 IEEE Symposium on Security and Privacy (SP), 1057-1073, 2021
Answering Multi-Dimensional Analytical Queries under Local Differential Privacy
T Wang, B Ding, J Zhou, C Hong, Z Huang, N Li, S Jha
Proceedings of the 2019 International Conference on Management of Data, 159-176, 2019
Unlynx: a decentralized system for privacy-conscious data sharing
D Froelicher, P Egger, JS Sousa, JL Raisaro, Z Huang, C Mouchet, B Ford, ...
Proceedings on Privacy Enhancing Technologies 2017 (4), 232-250, 2017
Applications of homomorphic encryption
D Archer, L Chen, JH Cheon, R Gilad-Bachrach, RA Hallman, Z Huang, ...
Technical report, HomomorphicEncryption. org, Redmond WA, 2017
Efficient and secure outsourcing of genomic data storage
JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ...
BMC medical genomics 10 (2), 46, 2017
Quantifying genomic privacy via inference attack with high-order SNV correlations
SS Samani, Z Huang, E Ayday, M Elliot, J Fellay, JP Hubaux, Z Kutalik
2015 IEEE Security and Privacy Workshops, 32-40, 2015
A privacy-preserving solution for compressed storage and selective retrieval of genomic data
Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ...
Genome Research 26 (12), 1687-1696, 2016
Improving utility and security of the shuffler-based differential privacy
T Wang, B Ding, M Xu, Z Huang, C Hong, J Zhou, N Li, S Jha
arXiv preprint arXiv:1908.11515, 2019
Simple encrypted arithmetic library v2. 3.0
H Chen, K Han, Z Huang, A Jalali, K Laine
Microsoft, 2017
Quantification of the Leakage in Federated Learning
Z Li, Z Huang, C Chen, C Hong
arXiv preprint arXiv:1910.05467, 2019
Computing a private set intersection
K Laine, H Chen, PB Rindal, Z Huang
US Patent App. 16/008,915, 2019
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems
Z Huang, C Hong, W Lu, C Weng, H Qu
IEEE Transactions on Dependable and Secure Computing, 2021
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
C Hong, Z Huang, W Lu, H Qu, L Ma, M Dahl, J Mancuso
arXiv preprint arXiv:2002.04344, 2020
SQC: secure quality control for meta-analysis of genome-wide association studies
Z Huang, H Lin, J Fellay, Z Kutalik, JP Hubaux
Bioinformatics 33 (15), 2273-2280, 2017
Credibleweb: a platform for web credibility evaluation
Z Huang, A Olteanu, K Aberer
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 1887-1892, 2013
Faster secure multiparty computation of adaptive gradient descent
W Lu, Y Fang, Z Huang, C Hong, C Chen, H Qu, Y Zhou, K Ren
Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20