publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2023
- Quantum Heavy-tailed BanditsarXiv preprint arXiv:2301.09680, 2023
2020
- Investigating Quantum Computing via Algebraic and Logical ToolsState University of New York at Buffalo, 2020
- Estimating stochastic linear combination of non-linear regressions efficiently and scalablyNeurocomputing, 2020
- Estimating Stochastic Linear Combination of Non-Linear RegressionsIn Proceedings of the AAAI Conference on Artificial Intelligence, 2020
- A New Graph Polynomial and Generalized Tutte–Grothendieck Invariant from Quantum CircuitsIn Advanced Computing and Systems for Security: Volume Eleven, 2020
2019
- Stabilizer circuits, quadratic forms, and computing matrix rankarXiv preprint arXiv:1904.00101, 2019
2018
- Algebraic and logical emulations of quantum circuitsTransactions on Computational Science XXXI: Special Issue on Signal Processing and Security in Distributed Systems, 2018
- Middlebox-based packet-level redundancy elimination over encrypted network trafficIEEE/ACM Transactions on Networking, 2018
2017
- Spabox: Safeguarding privacy during deep packet inspection at a middleboxIEEE/ACM Transactions on Networking, 2017
- When smart tv meets crn: Privacy-preserving fine-grained spectrum accessIn 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017
- Availability-aware mapping of service function chainsIn IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 2017
2016
- Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvementIEEE Transactions on Information Forensics and Security, 2016
- Enabling ciphertext deduplication for secure cloud storage and access controlIn Proceedings of the 11th ACM on asia conference on computer and communications security, 2016
2015
- Symmetric-key based proofs of retrievability supporting public verificationIn Computer Security–ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I 20, 2015
- Verifiable searchable symmetric encryption from indistinguishability obfuscationIn Proceedings of the 10th ACM symposium on information, computer and communications security, 2015
- GREP: Guaranteeing reliability with enhanced protection in NFVIn Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015
2014
- Cryptanalysis of a signcryption scheme with fast online signing and short signcryptextScience China Information Sciences, 2014
- Unforgeability of an improved certificateless signature scheme in the standard modelIET Information Security, 2014
2013
- Attribute-based encryption with verifiable outsourced decryptionIEEE Transactions on information forensics and security, 2013
- Cryptanalysis of a certificateless proxy re-encryption schemeIn 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013