Go to Header
Go to Navigation
Go to Content
Go to Footer
Login
Help
中文(繁體)
Research Resources
CUHK UPDates
Theses
Experts List
User Guides
About Us
List of Researchers
> Associate Professor Sze Ming CHOW
Home
Research Outputs
Researcher Profiles
Department Profiles
Research Areas
Professor CHOW Sze Ming
Personal Information
Position and Department
Associate Professor
,
Department of Information Engineering
ORCiD
0000-0001-7306-453X
ResearcherID
A-2831-2012
CUHK Research Outputs
1 of 3
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
(
2023
)
Real Threshold ECDSA
(
2023
)
Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy
(
2023
)
Scored Anonymous Credentials
(
2023
)
Shielding Graph for eXact Analytics With SGX
(
2023
)
SoK: Cryptographic Neural-Network Computation
(
2023
)
Don’t Tamper with Dual System Encryption
(
2022
)
Forward and Backward-Secure Range-Searchable Symmetric Encryption
(
2022
)
Multi-client Oblivious RAM
(
2022
)
Non-Malleable Functions and their Applications
(
2022
)
Range Queries over Encrypted Data
(
2022
)
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation
(
2022
)
Secure Data Deduplication Schemes
(
2022
)
Access Control Encryption from Group Encryption
(
2021
)
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
(
2021
)
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient
(
2021
)
Differential Privacy for Text Analytics via Natural Text Sanitization
(
2021
)
Future Generation Computer Systems
(
2021
)
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference
(
2021
)
Goten: GPU-Outsourcing Trusted Execution of Neural Network Training
(
2021
)
LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership
(
2021
)
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation
(
2021
)
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps
(
2021
)
Sipster: Settling IOU Privately and Quickly with Smart Meters
(
2021
)
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
(
2021
)
Updatable Block-Level Message-Locked Encryption
(
2021
)
Learning DNN model with error - exposing the hidden model of BAYHENN
(
2020
)
Multi-client Oblivious RAM with Poly-logarithmic Communication
(
2020
)
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions
(
2020
)
Stargazing in the Dark: Secure Skyline Queries with SGX
(
2020
)
ACM Transactions on Embedded Computing Systems (TECS)
(
2019
)
Another Look at Anonymous Communication
(
2019
)
Can We Securely Outsource Big Data Analytics with Lightweight Cryptography?
(
2019
)
Fast-to-Finalize Nakamoto-Like Consensus
(
2019
)
Fork-Free Hybrid Consensus with Flexible Proof-of-Activity
(
2019
)
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog
(
2019
)
Structure-Preserving Certificateless Encryption and Its Application
(
2019
)
Can You Find The One for Me? Privacy-Preserving Matchmaking via Threshold PSI
(
2018
)
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers
(
2018
)
InstantCryptoGram: Secure Image Retrieval Service
(
2018
)
Multi-authority Fine-grained Access Control with Accountability and Its Application in Cloud
(
2018
)
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption
(
2018
)
Outsourced Biometric Identification With Privacy
(
2018
)
Position Paper on Blockchain Technology: Smart Contract and Applications
(
2018
)
Privacy-Preserving Machine Learning
(
2018
)
Searchable Encryption over Feature-Rich Data
(
2018
)
Sharding Blockchain
(
2018
)
Simple Password-Hardened Encryption Services
(
2018
)
Systematic Market Control of Cryptocurrency Inflations
(
2018
)
Are you The One to Share? Secret Transfer with Access Structure
(
2017
)
Most Relevant Area
Information security
(
Information engineering
)
Share Link
Last updated on 2024-03-09 at 16:09
Share Link
Your name*
Your email*
Recipient's name*
Recipient's email*
Message
Auxilliary Information
No information will be stored or shared with any third party.
Cancel
Our policy towards the use of cookies
All Clarivate Analytics websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.
Ok to Continue
Cookie Policy