
Taeho Jung
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j18]Haohua Du
, Linlin Chen
, Jianwei Qian
, Jiahui Hou
, Taeho Jung
, Xiangyang Li
:
PatronuS: A System for Privacy-Preserving Cloud Video Surveillance. IEEE J. Sel. Areas Commun. 38(6): 1252-1261 (2020) - [j17]Ting Li, Taeho Jung
, Zhijin Qiu, Hanshang Li, Lijuan Cao, Yu Wang
:
Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding. IEEE Trans. Netw. Sci. Eng. 7(2): 855-868 (2020) - [j16]Dayane Reis
, Jonathan Takeshita, Taeho Jung, Michael T. Niemier, Xiaobo Sharon Hu
:
Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption. IEEE Trans. Very Large Scale Integr. Syst. 28(11): 2300-2313 (2020) - [c36]Changhao Chenli, Taeho Jung:
ProvNet: Networked Blockchain for Decentralized Secure Provenance. ICBC 2020: 76-93 - [c35]Jonathan Takeshita, Ryan Karl, Taeho Jung:
Secure Single-Server Nearly-Identical Image Deduplication. ICCCN 2020: 1-6 - [c34]Changhao Chenli, Boyang Li, Taeho Jung:
DLchain: Blockchain with Deep Learning as Proof-of-Useful-Work. SERVICES 2020: 43-60 - [i22]Alireza Partovi, Wei Zheng, Taeho Jung, Hai Lin:
Ensuring Privacy in Location-Based Services: A Model-based Approach. CoRR abs/2002.10055 (2020) - [i21]Jonathan Takeshita, Ryan Karl, Taeho Jung:
Secure Single-Server Nearly-Identical Image Deduplication. CoRR abs/2005.02330 (2020) - [i20]Dayane Reis, Jonathan Takeshita, Taeho Jung, Michael T. Niemier, Xiaobo Sharon Hu:
Computing-in-Memory for Performance and Energy Efficient Homomorphic Encryption. CoRR abs/2005.03002 (2020) - [i19]Alireza Partovi, Taeho Jung, Hai Lin:
Opacity of Discrete Event Systems with Active Intruder. CoRR abs/2007.14960 (2020) - [i18]Meng Jiang, Taeho Jung, Ryan Karl, Tong Zhao:
Federated Dynamic GNN with Secure Aggregation. CoRR abs/2009.07351 (2020) - [i17]Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung:
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2020: 91 (2020) - [i16]Jonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, Xiaobo Sharon Hu, Taeho Jung:
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM. IACR Cryptol. ePrint Arch. 2020: 1223 (2020) - [i15]Ryan Karl, Jonathan Takeshita, Taeho Jung:
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance. IACR Cryptol. ePrint Arch. 2020: 1561 (2020)
2010 – 2019
- 2019
- [j15]Jianwei Qian
, Xiang-Yang Li
, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han
:
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model. IEEE Trans. Dependable Secur. Comput. 16(4): 679-692 (2019) - [j14]Taeho Jung
, Xiang-Yang Li
, Wenchao Huang
, Zhongying Qiao
, Jianwei Qian
, Linlin Chen, Junze Han
, Jiahui Hou
:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. IEEE Trans. Inf. Forensics Secur. 14(1): 223-234 (2019) - [j13]Jianwei Qian, Xiang-Yang Li, Taeho Jung, Yang Fan, Yu Wang, Shaojie Tang:
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified? ACM Trans. Internet Techn. 19(3): 33:1-33:22 (2019) - [c33]Boyang Li, Changhao Chenli, Xiaowei Xu
, Taeho Jung, Yiyu Shi:
Exploiting Computation Power of Blockchain for Biomedical Image Segmentation. CVPR Workshops 2019: 2802-2811 - [c32]Changhao Chenli, Boyang Li, Yiyu Shi, Taeho Jung:
Energy-recycling Blockchain with Proof-of-Deep-Learning. IEEE ICBC 2019: 19-23 - [c31]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs. ICSE (Companion Volume) 2019: 230-231 - [c30]Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. SecureComm (2) 2019: 425-439 - [i14]Changhao Chenli, Boyang Li, Yiyu Shi, Taeho Jung:
Energy-recycling Blockchain with Proof-of-Deep-Learning. CoRR abs/1902.03912 (2019) - [i13]Boyang Li, Changhao Chenli, Xiaowei Xu, Taeho Jung, Yiyu Shi:
Exploiting Computation Power of Blockchain for Biomedical Image Segmentation. CoRR abs/1904.07349 (2019) - [i12]Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. IACR Cryptol. ePrint Arch. 2019: 454 (2019) - 2018
- [j12]Taeho Jung
, Junze Han, Xiang-Yang Li
:
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups. IEEE Trans. Dependable Secur. Comput. 15(2): 260-274 (2018) - [j11]Jiahui Hou
, Xiang-Yang Li
, Taeho Jung
, Yu Wang
, Daren Zheng:
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats. IEEE Trans. Inf. Forensics Secur. 13(7): 1656-1669 (2018) - [c29]Linlin Chen, Taeho Jung, Haohua Du, Jianwei Qian, Jiahui Hou, Xiang-Yang Li:
Crowdlearning: Crowded Deep Learning with Data Privacy. SECON 2018: 37-45 - [c28]Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiang-Yang Li:
Hidebehind: Enjoy Voice Input with Voiceprint Unclonability and Anonymity. SenSys 2018: 82-94 - [c27]Srijan Kumar, Meng Jiang, Taeho Jung, Roger Jie Luo, Jure Leskovec:
MIS2: Misinformation and Misbehavior Mining on the Web. WSDM 2018: 799-800 - [i11]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs. CoRR abs/1809.07036 (2018) - 2017
- [j10]Cheng Bo, Xuesi Jian, Taeho Jung, Junze Han, Xiang-Yang Li, XuFei Mao, Yu Wang
:
Detecting Driver's Smartphone Usage via Nonintrusively Sensing Driving Dynamics. IEEE Internet Things J. 4(2): 340-350 (2017) - [j9]Haohua Du, Junze Han, Xuesi Jian, Taeho Jung, Cheng Bo, Yu Wang, Xiang-Yang Li:
Martian: Message Broadcast via LED Lights to Heterogeneous Smartphones. IEEE J. Sel. Areas Commun. 35(5): 1154-1162 (2017) - [j8]Hongli Xu
, Zhuolong Yu, Xiang-Yang Li, Liusheng Huang, Chen Qian, Taeho Jung:
Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs. IEEE/ACM Trans. Netw. 25(5): 3073-3087 (2017) - [j7]Lan Zhang
, Taeho Jung, Kebin Liu, Xiang-Yang Li, Xuan Ding, Jiaxi Gu, Yunhao Liu:
PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud. IEEE Trans. Parallel Distributed Syst. 28(11): 3258-3271 (2017) - [c26]Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:
AccountTrade: Accountable protocols for big data trading against dishonest consumers. INFOCOM 2017: 1-9 - [c25]Zhenhua Li, Weiwei Wang, Christo Wilson, Jian Chen, Chen Qian, Taeho Jung, Lan Zhang, Kebin Liu, Xiangyang Li, Yunhao Liu:
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. NDSS 2017 - [c24]Ting Li, Taeho Jung, Hanshang Li, Lijuan Cao, Weichao Wang, Xiang-Yang Li, Yu Wang:
Scalable privacy-preserving participant selection in mobile crowd sensing. PerCom 2017: 59-68 - [i10]Jianwei Qian, Xiang-Yang Li, Yu Wang, Shaojie Tang, Taeho Jung, Yang Fan:
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified? CoRR abs/1710.10998 (2017) - [i9]Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiangyang Li, Yu Wang, Yanbo Deng:
VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices. CoRR abs/1711.11460 (2017) - 2016
- [j6]Cheng Bo, Taeho Jung, XuFei Mao, Xiang-Yang Li, Yu Wang:
SmartLoc: sensing landmarks silently for smartphone-based metropolitan localization. EURASIP J. Wirel. Commun. Netw. 2016: 111 (2016) - [j5]Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'. IEEE Trans. Inf. Forensics Secur. 11(4): 868 (2016) - [j4]Zhiyong Tian, Taeho Jung, Yi Wang, Fan Zhang, Lai Tu, Cheng-Zhong Xu
, Chen Tian, Xiang-Yang Li:
Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis. IEEE Trans. Intell. Transp. Syst. 17(11): 3098-3109 (2016) - [c23]Hongli Xu, Zhuolong Yu, Xiang-Yang Li, Chen Qian, Liusheng Huang, Taeho Jung:
Real-time update with joint optimization of route selection and update scheduling for SDNs. ICNP 2016: 1-10 - [c22]Xiang-Yang Li, Chunhong Zhang, Taeho Jung, Jianwei Qian, Linlin Chen:
Graph-based privacy-preserving data publication. INFOCOM 2016: 1-9 - [c21]Jianwei Qian, Shaojie Tang, Huiqi Liu, Taeho Jung, Xiang-Yang Li:
Privacy Inference on Knowledge Graphs: Hardness and Approximation. MSN 2016: 132-138 - [c20]Haohua Du, Taeho Jung, Xuesi Jian, Yiqing Hu, Jiahui Hou, Xiang-Yang Li:
User-Demand-Oriented Privacy-Preservation in Video Delivering. MSN 2016: 145-151 - [c19]Junze Han, Taeho Jung, Xiang-Yang Li, Lili Du:
Ensuring Semantic Validity in Privacy-Preserving Aggregate Statistics. MSN 2016: 160-166 - 2015
- [j3]Taeho Jung, Xiang-Yang Li, Meng Wan:
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel. IEEE Trans. Dependable Secur. Comput. 12(1): 45-57 (2015) - [j2]Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. IEEE Trans. Inf. Forensics Secur. 10(1): 190-199 (2015) - [j1]Lan Zhang, Xiang-Yang Li, Kebin Liu, Taeho Jung, Yunhao Liu:
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks. IEEE Trans. Mob. Comput. 14(9): 1888-1902 (2015) - [c18]Taeho Jung, Xiang-Yang Li, Junze Han:
A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm. BigCom 2015: 88-102 - [c17]Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu:
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices. ICDCS 2015: 308-317 - [c16]Lan Zhang, Taeho Jung, Puchun Feng, Kebin Liu, Xiang-Yang Li, Yunhao Liu:
PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud. ICPP 2015: 949-958 - [c15]Taeho Jung, Xiang-Yang Li:
Enabling privacy-preserving auctions in big data. INFOCOM Workshops 2015: 173-178 - 2014
- [c14]Jing Zhao, Taeho Jung, Yu Wang, Xiangyang Li:
Achieving differential privacy of data disclosure in the smart grid. INFOCOM 2014: 504-512 - [c13]Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, Yu Wang:
Continuous user identification via touch and movement behavioral biometrics. IPCCC 2014: 1-8 - [c12]Junze Han, Xiang-Yang Li, Taeho Jung, Jumin Zhao, Zenghua Zhao:
Network agile preference-based prefetching for mobile devices. IPCCC 2014: 1-8 - [c11]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
It starts with iGaze: visual attention driven networking with smart glasses. MobiCom 2014: 91-102 - [c10]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
Demo: visual attention driven networking with smart glasses. MobiCom 2014: 329-332 - [c9]Xuangou Wu, Panlong Yang, Taeho Jung, Yan Xiong, Xiao Zheng:
Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs. MobiHoc 2014: 13-22 - [c8]Sara Motahari, Taeho Jung, Hui Zang, Krishna Janakiraman, Xiang-Yang Li, Kevin Soo Hoo:
Predicting the influencers on wireless subscriber churn. WCNC 2014: 3402-3407 - [i8]Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu:
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection. CoRR abs/1410.6589 (2014) - [i7]Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu:
Cloud-based Privacy Preserving Image Storage, Sharing and Search. CoRR abs/1410.6593 (2014) - 2013
- [c7]Lan Zhang, Xiang-Yang Li, Yunhao Liu, Taeho Jung:
Verifiable private multi-party computation: Ranging and ranking. INFOCOM 2013: 605-609 - [c6]Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Privacy preserving cloud data access with multi-authorities. INFOCOM 2013: 2625-2633 - [c5]Taeho Jung, XuFei Mao, Xiang-Yang Li, Shaojie Tang, Wei Gong, Lan Zhang:
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation. INFOCOM 2013: 2634-2642 - [c4]Xiang-Yang Li, Taeho Jung:
Search me if you can: Privacy-preserving location query service. INFOCOM 2013: 2760-2768 - [c3]Cheng Bo, Xiang-Yang Li, Taeho Jung, XuFei Mao, Yue Tao, Lan Yao:
SmartLoc: push the limit of the inertial sensor based metropolitan localization using smartphone. MobiCom 2013: 195-198 - [i6]Taeho Jung, Xiang-Yang Li:
Infinite Choices of Data Aggregations with Linear Number of Keys. CoRR abs/1308.6198 (2013) - [i5]Taeho Jung, Xiang-Yang Li, Lan Zhang, He Huang:
Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design. CoRR abs/1308.6202 (2013) - [i4]Cheng Bo, Xiang-Yang Li, Taeho Jung, XuFei Mao:
SmartLoc: Sensing Landmarks Silently for Smartphone Based Metropolitan Localization. CoRR abs/1310.8187 (2013) - 2012
- [c2]Taeho Jung:
Numerical Analysis of Instabilities of Organic Thin-Film Transistors for Flexible Displays. ICHIT (1) 2012: 453-460 - [c1]Shaojie Tang, XuFei Mao, Taeho Jung, Junze Han, Xiang-Yang Li, Boliu Xu, Chao Ma:
Closing the gap in the multicast capacity of hybrid wireless networks. MobiHoc 2012: 135-144 - [i3]Taeho Jung, Xiang-Yang Li, Zhiguo Wan:
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption. CoRR abs/1206.2657 (2012) - [i2]Taeho Jung, Xiang-Yang Li, Shaojie Tang:
Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely. CoRR abs/1206.2660 (2012) - [i1]Taeho Jung, Xiang-Yang Li:
Search Me If You Can: Privacy-preserving Location Query Service. CoRR abs/1208.0107 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-21 00:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint