Yongjun Zhao
Yongjun Zhao
Research Scientist at TikTok (was Senior Research Fellow at NTU)
Verified email at
Cited by
Cited by
Privacy-preserving decision trees evaluation via linear functions
RKH Tai, JPK Ma, Y Zhao, SSM Chow
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Updatable block-level message-locked encryption
Y Zhao, SSM Chow
IEEE Transactions on Dependable and Secure Computing, 2019
Goten: Gpu-outsourcing trusted execution of neural network training
LKL Ng, SSM Chow, APY Woo, DPH Wong, Y Zhao
Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 14876 …, 2021
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Y Zhao, SSM Chow
Workshop on Privacy in the Electronic Society (WPES), 2018
Position paper on blockchain technology: Smart contract and applications
W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou
IACR International Workshop on Public Key Cryptography, 221-251, 2019
Are you the one to share? Secret transfer with access structure
Y Zhao, SSM Chow
Proceedings on Privacy Enhancing Technologies, 2017
Sharding blockchain
SSM Chow, Z Lai, C Liu, E Lo, Y Zhao
2018 IEEE international conference on internet of things (iThings) and IEEE …, 2018
Let’s stride blindfolded in a forest: Sublinear multi-client decision trees evaluation
JPK Ma, RKH Tai, Y Zhao, SSM Chow
ZkRep: A privacy-preserving scheme for reputation-based blockchain system
C Huang, Y Zhao, H Chen, X Wang, Q Zhang, Y Chen, H Wang, KY Lam
IEEE Internet of Things Journal 9 (6), 4330-4342, 2021
Volume-hiding dynamic searchable symmetric encryption with forward and backward privacy
Y Zhao, H Wang, KY Lam
Cryptology ePrint Archive, 2021
Privacy preserving collaborative filtering from asymmetric randomized encoding
Y Zhao, SSM Chow
International Conference on Financial Cryptography and Data Security, 459-477, 2015
Towards proofs of ownership beyond bounded leakage
Y Zhao, SSM Chow
International Conference on Provable Security, 340-350, 2016
Cryptography-inspired federated learning for generative adversarial networks and meta learning
Y Zheng, W Song, M Du, S SM Chow, Q Lou, Y Zhao, X Wang
International Conference on Advanced Data Mining and Applications, 393-407, 2023
Sipster: settling iou privately and quickly with smart meters
SSM Chow, M Li, Y Zhao, W Jin
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
Privacy Preserving Credit Systems
SSM Chow, RWF Lai, X Wang, Y Zhao
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
Protecting membership and data in a secure multi-party computation and/or communication
J Du, H Qian, Y Zhao, B Jiang, YAN Qiang
US Patent 11,886,617, 2024
Protecting membership in a secure multi-party computation and/or communication
J Du, Y Zhao, H Qian, B Jiang, YAN Qiang
US Patent 11,989,325, 2024
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
J Hu, Y Zhao, BHM Tan, KMM Aung, H Wang
IEEE Transactions on Information Forensics and Security, 2024
Secure multi-party computation and communication
J Du, H Qian, Y Zhao, B Jiang, C Chen, YAN Qiang
US Patent 11,983,285, 2024
The system can't perform the operation now. Try again later.
Articles 1–20