default search action
Yan Huang 0001
Person information
- unicode name: 黄炎
- affiliation: Indiana University Bloomington, USA
Other persons with the same name
- Yan Huang — disambiguation page
- Yan Huang 0002 — University of North Texas, Department of Computer Science, Denton, TX, USA
- Yan Huang 0003 — Shandong University, China (and 1 more)
- Yan Huang 0004 — Purdue University, West Lafayette, IN, USA
- Coral Walker (aka: Yan Huang 0005, Coral Yan Huang Walker) — Cardiff University, UK
- Yan Huang 0006 — University of Kentucky, Department of Computer Science, Lexington, KY, USA
- Yan Huang 0007 — Beijing Institute of Technology, Key Laboratory of Biomimetic Robots and Systems, Beijing, China (and 1 more)
- Yan Huang 0008 — Chinese Academy of Sciences, Institute of Automation, National Laboratory of Pattern Recognition, Beijing, China
- Yan Huang 0009 — Carnegie Mellon University, Tepper School of Business, Pittsburgh, PA, USA (and 1 more)
- Yan Huang 0010 — CDH Investments, Beijing, China (and 2 more)
- Yan Huang 0011 — Beijing Institute of Technology, Beijing, China
- Yan Huang 0012 — Suzhou Vocational University, Suzhou, China
- Yan Huang 0013 — Huazhong University of Science and Technology, Wuhan, China
- Yan Huang 0014 — University of Cambridge, Department of Theoretical and Applied Linguistics, Language Technology Lab, UK
- Yan Huang 0015 — Shenyang Institute of Automation, CAS, Shenyang, China
- Yan Huang 0016 — Imperial College London, Dpt. of Bioengineering, UK
- Yan Huang 0017 — Georgia Inst. of Technol., Atlanta, GA, USA
- Yan Huang 0018 — Purple Mountain Laboratory, Nanjing, China (and 3 more)
- Yan Huang 0019 — Xihua University, School of Economics, Chengdu, China (and 1 more)
- Yan Huang 0020 — Beihang University, School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beijing, China (and 1 more)
- Yan Huang 0021 — Huaiyin Normal University, School of Computer Science and Technology, Huaian, China (and 2 more)
- Yan Huang 0022 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Yan Huang 0023 — University of Technology Sydney, School of Computing and Communications, Global Big Data Technology Center, NSW, Australia
- Yan Huang 0024 — Jiangsu Food & Pharmaceutical Science College, Huaian, China
- Yan Huang 0025 — Virginia Polytechnic Institute and State University, Department of Electrical and Computer Engineering, Blacksburg, VA, USA
- Yan Huang 0026 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Yan Huang 0027 — Nanjing University, International Institute for Earth System Science, Nanjing, China
- Yan Huang 0028 — Microsoft Corporation, Redmond, WA, USA
- Yan Huang 0029 — East China Normal University, Key Laboratory of Geographic Information Science, Shanghai, China
- Yan Huang 0030 — Xiamen University, Shenzhen Research Institute, Shenzhen, China
- Yan Huang 0031 — South China University of Technology, School of Computer Science and Engineering, Guangzhou, China
- Yan Huang 0032 — Kennesaw State University, College of Computing and Software Engineering, Atlanta, GA, USA (and 2 more)
- Yan Huang 0033 — Shanghai Jiao Tong University, Department of Electronic Engineering, China (and 1 more)
- Yan Huang 0034 — University of Texas Health Science Center at Houston, TX, USA (and 1 more)
- Yan Huang 0035 — Peking University, School of Electronics Engineering and Computer Science, Beijing, China (and 1 more)
- Yan Huang 0036 — Southeast University, School of Automation, Nanjing, China
- Yan Huang 0037 — Fujian Agriculture and Forestry University, Department of Computer and Information Sciences, College of Economics and Management, Fuzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Changchang Ding, Yan Huang:
Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications. USENIX Security Symposium 2023: 4373-4390 - 2022
- [j1]Ruiyu Zhu, Yan Huang:
Efficient and Precise Secure Generalized Edit Distance and Beyond. IEEE Trans. Dependable Secur. Comput. 19(1): 579-590 (2022) - 2021
- [c25]Ruiyu Zhu, Yan Huang:
Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits. AsiaCCS 2021: 488-500 - [c24]Lin Jin, Shuai Hao, Yan Huang, Haining Wang, Chase Cotton:
DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain. ICNP 2021: 1-11 - 2020
- [i12]Ruiyu Zhu, Changchang Ding, Yan Huang:
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation. IACR Cryptol. ePrint Arch. 2020: 550 (2020)
2010 – 2019
- 2019
- [c23]Ruiyu Zhu, Changchang Ding, Yan Huang:
Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. CCS 2019: 633-650 - [c22]Darion Cassel, Yan Huang, Limin Jia:
Uncovering Information Flow Policy Violations in C Programs (Extended Abstract). ESORICS (2) 2019: 26-46 - [i11]Darion Cassel, Yan Huang, Limin Jia:
Uncovering Information Flow Policy Violations in C Programs. CoRR abs/1907.01727 (2019) - 2018
- [c21]Ruiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang:
NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. CCS 2018: 862-879 - [c20]Darion Cassel, Yan Huang, Limin Jia:
FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C. CCS 2018: 2207-2209 - 2017
- [c19]Ruiyu Zhu, Yan Huang:
JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic Hashes. ASIACRYPT (2) 2017: 529-572 - [c18]Ruiyu Zhu, Yan Huang, Darion Cassel:
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries. CCS 2017: 245-257 - [i10]Ruiyu Zhu, Yan Huang:
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes. IACR Cryptol. ePrint Arch. 2017: 174 (2017) - [i9]Ruiyu Zhu, Yan Huang:
Faster LEGO-based Secure Computation without Homomorphic Commitments. IACR Cryptol. ePrint Arch. 2017: 226 (2017) - [i8]Ruiyu Zhu, Yan Huang:
Efficient Privacy-Preserving Edit Distance and Beyond. IACR Cryptol. ePrint Arch. 2017: 683 (2017) - 2016
- [c17]Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat:
The Cut-and-Choose Game and Its Application to Cryptographic Protocols. USENIX Security Symposium 2016: 1085-1100 - 2015
- [c16]Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu:
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance. CCS 2015: 492-503 - [c15]Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang:
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward. CCS 2015: 837-849 - [c14]Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi:
ObliVM: A Programming Framework for Secure Computation. IEEE Symposium on Security and Privacy 2015: 359-376 - [i7]Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:
Amortizing Garbled Circuits. IACR Cryptol. ePrint Arch. 2015: 81 (2015) - [i6]Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:
iDASH Secure Genome Analysis Competition Using ObliVM. IACR Cryptol. ePrint Arch. 2015: 191 (2015) - [i5]Yan Huang, Ruiyu Zhu:
Revisiting LEGOs: Optimizations, Analysis, and their Limit. IACR Cryptol. ePrint Arch. 2015: 1038 (2015) - 2014
- [c13]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. CCS 2014: 191-202 - [c12]Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang:
Oblivious Data Structures. CCS 2014: 215-226 - [c11]Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:
Amortizing Garbled Circuits. CRYPTO (2) 2014: 458-475 - [c10]Nachikethas A. Jagadeesan, Ranjan Pal, Kaushik Nadikuditi, Yan Huang, Elaine Shi, Minlan Yu:
A secure computation framework for SDNs. HotSDN 2014: 209-210 - [c9]Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks:
Automating Efficient RAM-Model Secure Computation. IEEE Symposium on Security and Privacy 2014: 623-638 - [i4]Xiao Wang, Kartik Nayak, Chang Liu, Elaine Shi, Emil Stefanov, Yan Huang:
Oblivious Data Structures. IACR Cryptol. ePrint Arch. 2014: 185 (2014) - [i3]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. IACR Cryptol. ePrint Arch. 2014: 671 (2014) - [i2]Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff:
Implementing Cryptographic Program Obfuscation. IACR Cryptol. ePrint Arch. 2014: 779 (2014) - 2013
- [c8]Yan Huang, Jonathan Katz, David Evans:
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. CRYPTO (2) 2013: 18-35 - [i1]Yan Huang, Jonathan Katz, David Evans:
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. IACR Cryptol. ePrint Arch. 2013: 81 (2013) - 2012
- [c7]Yan Huang, David Evans, Jonathan Katz:
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? NDSS 2012 - [c6]Yan Huang, Jonathan Katz, David Evans:
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy 2012: 272-284 - 2011
- [c5]Yan Huang, David Evans:
Private Editing Using Untrusted Cloud Services. ICDCS Workshops 2011: 263-272 - [c4]Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, Abhi Shelat:
Efficient Secure Computation with Garbled Circuits. ICISS 2011: 28-48 - [c3]Yan Huang, Lior Malka, David Evans, Jonathan Katz:
Efficient Privacy-Preserving Biometric Identification. NDSS 2011 - [c2]Yan Huang, Peter Chapman, David Evans:
Privacy-Preserving Applications on Smartphones. HotSec 2011 - [c1]Yan Huang, David Evans, Jonathan Katz, Lior Malka:
Faster Secure Two-Party Computation Using Garbled Circuits. USENIX Security Symposium 2011
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint