default search action
Hung Dang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i10]Mingyuan Gao, Hung Dang, Ee-Chien Chang, Jialin Li:
Mixed Fault Tolerance Protocols with Trusted Execution Environment. CoRR abs/2208.01946 (2022) - 2021
- [c11]Mingyuan Gao, Hung Dang, Ee-Chien Chang:
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. ACSAC 2021: 235-247
2010 – 2019
- 2019
- [c10]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Towards a Marketplace for Secure Outsourced Computations. ESORICS (1) 2019: 790-808 - [c9]Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, Beng Chin Ooi:
Towards Scaling Blockchain Systems via Sharding. SIGMOD Conference 2019: 123-140 - [i9]Hung Dang, Ee-Chien Chang:
Autonomous Membership Service for Enclave Applications. CoRR abs/1905.06460 (2019) - [i8]Ziqi Yang, Hung Dang, Ee-Chien Chang:
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking. CoRR abs/1906.06046 (2019) - [i7]Hung Dang, Ee-Chien Chang:
Self-Expiring Data Capsule using Trusted Execution Environment. CoRR abs/1911.09305 (2019) - 2018
- [i6]Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang:
Learning Inverse Mappings with Adversarial Criterion. CoRR abs/1802.04504 (2018) - [i5]Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Chain of Trust: Can Trusted Hardware Help Scaling Blockchains? CoRR abs/1804.00399 (2018) - [i4]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Fair Marketplace for Secure Outsourced Computations. CoRR abs/1808.09682 (2018) - [i3]Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang:
Keeping Time-Release Secrets through Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1166 (2018) - 2017
- [j2]Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute. Proc. Priv. Enhancing Technol. 2017(3): 21 (2017) - [c8]Hung Dang, Ee-Chien Chang:
Privacy-Preserving Data Deduplication on Trusted Processors. CLOUD 2017: 66-73 - [c7]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifiers by Morphing in the Dark. CCS 2017: 119-133 - [c6]Hung Dang, Erick Purwanto, Ee-Chien Chang:
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. AsiaCCS 2017: 408-422 - [i2]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes. CoRR abs/1705.07535 (2017) - [i1]Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang:
PermuteRam: Optimizing Oblivious Computation for Efficiency. IACR Cryptol. ePrint Arch. 2017: 885 (2017) - 2016
- [c5]Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang:
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation. IH&MMSec 2016: 69-80 - 2015
- [c4]Hung Dang, Ee-Chien Chang:
PrAd: Enabling Privacy-Aware Location based Advertising. GeoPrivacy@SIGSPATIAL 2015: 1:1-1:8 - [c3]Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena:
Auto-patching DOM-based XSS at scale. ESEC/SIGSOFT FSE 2015: 272-283 - [c2]Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena:
DexterJS: robust testing platform for DOM-based XSS vulnerabilities. ESEC/SIGSOFT FSE 2015: 946-949 - 2013
- [c1]Hung Dang, Tuan A. Nguyen, Hien To:
Maximum Complex Task Assignment: Towards Tasks Correlation in Spatial Crowdsourcing. iiWAS 2013: 77
2000 – 2009
- 2007
- [j1]Hung Dang:
On Sensitivity Ranking Using Analytic Hierarchy Process. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 15(Supplement-2): 67-73 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint