default search action
Thang Hoang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware. Proc. Priv. Enhancing Technol. 2024(4): 327-348 (2024) - [j15]Yao-Jung Shiao, Guan-Yu Chen, Thang Hoang:
Three-Dimensional Human Posture Recognition by Extremity Angle Estimation with Minimal IMU Sensor. Sensors 24(13): 4306 (2024) - [c22]Jacob Haltiwanger, Thang Hoang:
Exploiting Update Leakage in Searchable Symmetric Encryption. CODASPY 2024: 115-126 - [c21]Atharva Haldankar, Arman Riasi, Hoang-Dung Nguyen, Tran Phuong, Thang Hoang:
Breaking Privacy in Model-Heterogeneous Federated Learning. RAID 2024: 465-479 - [c20]Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang:
MUSES: Efficient Multi-User Searchable Encrypted Database. USENIX Security Symposium 2024 - [i18]Hoang-Dung Nguyen, Jorge Guajardo, Thang Hoang:
Client-Efficient Online-Offline Private Information Retrieval. IACR Cryptol. ePrint Arch. 2024: 719 (2024) - 2023
- [j14]Haodi Wang, Thang Hoang:
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline. Proc. Priv. Enhancing Technol. 2023(2): 430-448 (2023) - [j13]Tung Le, Thang Hoang:
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust. Proc. Priv. Enhancing Technol. 2023(4): 184-203 (2023) - [j12]Thang Hoang, Yao-Jung Shiao:
New Method for Reduced-Number IMU Estimation in Observing Human Joint Motion. Sensors 23(12): 5712 (2023) - [j11]Thao M. Dang, Thuc Dinh Nguyen, Thang Hoang, Hyunseok Kim, Andrew Beng Jin Teoh, Deokjai Choi:
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security. IEEE Trans. Inf. Forensics Secur. 18: 758-772 (2023) - [c19]Trevor Miller, Bobby Alvarez, Thang Hoang:
VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications. ICCCN 2023: 1-10 - [c18]Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. NDSS 2023 - [i17]Rouzbeh Behnia, Mohammadreza Ebrahimi, Arman Riasi, Balaji Padmanabhan, Thang Hoang:
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning. CoRR abs/2304.03841 (2023) - [i16]Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang:
MUSES: Efficient Multi-User Searchable Encrypted Database. IACR Cryptol. ePrint Arch. 2023: 720 (2023) - [i15]Tung Le, Thang Hoang:
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust. IACR Cryptol. ePrint Arch. 2023: 1105 (2023) - 2022
- [j10]Yao-Jung Shiao, Thang Hoang:
Exercise Condition Sensing in Smart Leg Extension Machine. Sensors 22(17): 6336 (2022) - [c17]Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security. NDSS 2022 - [c16]Attila A. Yavuz, Saif E. Nouma, Thang Hoang, Duncan Earl, Scott Packard:
Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era. TPS-ISA 2022: 29-38 - [c15]Mohit Bhasi Thazhath, Jan Michalak, Thang Hoang:
Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations. TPS-ISA 2022: 229-238 - [c14]Hai-Van Dang, Tran Viet Xuan Phuong, Thuc Dinh Nguyen, Thang Hoang:
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database. TPS-ISA 2022: 248-257 - [c13]Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang:
Polynomial Commitment with a One-to-Many Prover and Applications. USENIX Security Symposium 2022: 2965-2982 - [i14]Ahmad Khan, Yuze Li, Ali Anwar, Yue Cheng, Thang Hoang, Nathalie Baracaldo, Ali Raza Butt:
A Distributed and Elastic Aggregation Service for Scalable Federated Learning Systems. CoRR abs/2204.07767 (2022) - [i13]Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning. CoRR abs/2210.10133 (2022) - [i12]Mohit Bhasi Thazhath, Jan Michalak, Thang Hoang:
Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations. CoRR abs/2211.04741 (2022) - [i11]Haodi Wang, Thang Hoang:
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline. CoRR abs/2212.05428 (2022) - [i10]Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security. IACR Cryptol. ePrint Arch. 2022: 51 (2022) - [i9]Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. IACR Cryptol. ePrint Arch. 2022: 1417 (2022) - 2021
- [j9]Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Hyunil Kim, Deokjai Choi:
Multi-Model Long Short-Term Memory Network for Gait Recognition Using Window-Based Data Segment. IEEE Access 9: 23826-23839 (2021) - [j8]Tam T. Huynh, Thuc Dinh Nguyen, Thang Hoang, Lam Tran, Deokjai Choi:
A Reliability Guaranteed Solution for Data Storing and Sharing. IEEE Access 9: 108318-108328 (2021) - [j7]Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila Altay Yavuz:
Efficient Oblivious Data Structures for Database Services on the Cloud. IEEE Trans. Cloud Comput. 9(2): 598-609 (2021) - [j6]Thang Hoang, Attila A. Yavuz, Jorge Guajardo:
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services. IEEE Trans. Serv. Comput. 14(6): 1675-1689 (2021) - [c12]Efe Ulas Akay Seyitoglu, Attila Altay Yavuz, Thang Hoang:
Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work. SECRYPT 2021: 412-419 - 2020
- [b1]Thang Hoang:
Privacy-Preserving and Functional Information Systems. University of South Florida, Tampa, USA, 2020 - [j5]Thang Hoang, Attila A. Yavuz, Jorge Guajardo:
A Multi-server ORAM Framework with Constant Client Bandwidth Blowup. ACM Trans. Priv. Secur. 23(1): 1:1-1:35 (2020) - [c11]Thang Hoang, Rouzbeh Behnia, Yeongjin Jang, Attila A. Yavuz:
MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves. CODASPY 2020: 17-28 - [c10]Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. NDSS 2020 - [i8]Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. IACR Cryptol. ePrint Arch. 2020: 203 (2020)
2010 – 2019
- 2019
- [j4]Thang Hoang, Attila A. Yavuz, F. Betül Durak, Jorge Guajardo:
A multi-server oblivious dynamic searchable encryption framework. J. Comput. Secur. 27(6): 649-676 (2019) - [j3]Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz:
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. Proc. Priv. Enhancing Technol. 2019(1): 172-191 (2019) - 2018
- [c9]Thang Hoang, Attila A. Yavuz, F. Betül Durak, Jorge Guajardo:
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems. DBSec 2018: 113-130 - [c8]Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz:
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search. ICC 2018: 1-6 - [c7]Thang Hoang, Hoai Nguyen, Thanh Le Chau Nguyen, Khoa Xuan Le, Tung Minh Phung:
Dynamic Measurement for Detecting the Road of an Autonomous Vehicle Using the Proximity Sensor. ICCASA/ICTCC 2018: 171-179 - [i7]Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz:
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. IACR Cryptol. ePrint Arch. 2018: 247 (2018) - 2017
- [c6]Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen:
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing. CCS 2017: 491-505 - [c5]Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Deokjai Choi:
Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis. ISC 2017: 214-229 - [i6]Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen:
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing. IACR Cryptol. ePrint Arch. 2017: 819 (2017) - [i5]Thang Hoang, Attila A. Yavuz, F. Betül Durak, Jorge Guajardo:
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM. IACR Cryptol. ePrint Arch. 2017: 1158 (2017) - [i4]Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz:
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search. IACR Cryptol. ePrint Arch. 2017: 1222 (2017) - [i3]Thang Hoang, Attila A. Yavuz, Jorge Guajardo:
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services. IACR Cryptol. ePrint Arch. 2017: 1237 (2017) - [i2]Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz:
Efficient Oblivious Data Structures for Database Services on the Cloud. IACR Cryptol. ePrint Arch. 2017: 1238 (2017) - 2016
- [c4]Thang Hoang, Attila Altay Yavuz, Jorge Guajardo:
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. ACSAC 2016: 302-313 - [i1]Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. CoRR abs/1602.03199 (2016) - 2015
- [j2]Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int. J. Inf. Sec. 14(6): 549-560 (2015) - [c3]Huan Nguyen, Huy H. Nguyen, Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
A Generalized Authentication Scheme for Mobile Phones Using Gait Signals. ICETE (Selected Papers) 2015: 386-407 - [c2]Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. SECRYPT 2015: 148-159 - 2013
- [j1]Thang Hoang, Thuc Dinh Nguyen, Chuyen Luong, Son Do, Deokjai Choi:
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer. J. Inf. Process. Syst. 9(2): 333 (2013) - [c1]Thang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen:
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error. SEC 2013: 83-101
Coauthor Index
aka: Attila Altay Yavuz
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint