Chenghong Wang
Chenghong Wang
Verified email at - Homepage
Cited by
Cited by
Cryptϵ: Crypto-assisted differential privacy on untrusted servers
A Roy Chowdhury, C Wang, X He, A Machanavajjhala, S Jha
Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020
Presage: privacy-preserving genetic testing via software guard extension
F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ...
BMC medical genomics 10 (2), 77-85, 2017
SecureLR: Secure logistic regression model via a hybrid cryptographic protocol
Y Jiang, J Hamer, C Wang, X Jiang, M Kim, Y Song, Y Xia, N Mohammed, ...
IEEE/ACM transactions on computational biology and bioinformatics 16 (1 …, 2018
The k-peak decomposition: Mapping the global structure of graphs
P Govindan, C Wang, C Xu, H Duan, S Soundarajan
Proceedings of the 26th International Conference on World Wide Web, 1441-1450, 2017
iDASH secure genome analysis competition 2017
XF Wang, H Tang, S Wang, X Jiang, W Wang, D Bu, L Wang, Y Jiang, ...
BMC medical genomics 11 (4), 1-2, 2018
ART4SQLi: The ART of SQL injection vulnerability discovery
L Zhang, D Zhang, C Wang, J Zhao, Z Zhang
IEEE Transactions on Reliability 68 (4), 1470-1489, 2019
Evaluation of Privacy Risks of Patients’ Data in China: Case Study
M Gong, S Wang, L Wang, C Liu, J Wang, Q Guo, H Zheng, K Xie, ...
JMIR medical informatics 8 (2), e13046, 2020
Privacy-preserving biomedical data dissemination via a hybrid approach
Y Jiang, C Wang, Z Wu, X Du, S Wang
AMIA Annual Symposium Proceedings 2018, 1176, 2018
SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach
W Chenghong, Y Jiang, N Mohammed, F Chen, X Jiang, MM Al Aziz, ...
AMIA Annual Symposium Proceedings 2017, 1744, 2017
Software maintenance optimization based on Stackelberg game methods
J Zhao, YB Wang, GR Ning, CH Wang, KS Trivedi, KY Cai, ZY Zhang
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
ESMFL: Efficient and Secure Models for Federated Learning
S Lin, C Wang, H Li, J Deng, Y Wang, C Ding
arXiv preprint arXiv:2009.01867, 2020
MCMIA: Model Compression Against Membership Inference Attack in Deep Neural Networks
Y Wang, C Wang, Z Wang, S Zhou, H Liu, J Bi, C Ding, S Rajasekaran
arXiv preprint arXiv:2008.13578, 2020
A fast and effective memristor-based method for finding approximate eigenvalues and eigenvectors of non-negative matrices
C Wang, ZS Jalali, C Ding, Y Wang, S Soundarajan
2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 563-568, 2018
DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy
C Wang, J Bater, K Nayak, A Machanavajjhala
arXiv preprint arXiv:2103.15942, 2021
The system can't perform the operation now. Try again later.
Articles 1–14