Aung, Khin Mi Mi
458  results:
Search for persons X
?
1

Enabling Threshold Functionality for Private Set Intersecti..:

Hu, Jingwei ; Zhao, Yongjun ; Hong Meng Tan, Benjamin..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 6184-6196 , 2024
 
?
2

Practical Deep Neural Network Protection for Unmodified App..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XVII,
Kang, Dee Meng ; Faahym, Haadee ; Meftah, Souhail.. - p. 177-192 , 2023
 
?
4

Privacy-preserving outsourcing decision tree evaluation fro..:

Xu, Kexin ; Tan, Benjamin Hong Meng ; Wang, Li-Ping..
Journal of Information Security and Applications.  77 (2023)  - p. 103582 , 2023
 
?
6

CryptoRec: Novel Collaborative Filtering Recommender Made P..:

Wang, Jun ; Jin, Chao ; Tang, Qiang..
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  4 - p. 2622-2634 , 2022
 
?
8

Field Instruction Multiple Data:

, In: Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science,
Aung, Khin Mi Mi ; Lim, Enhui ; Sim, Jun Jie... - p. 611-641 , 2022
 
?
11

Skellam mixture mechanism: a novel approach to federated le..:

Bao, Ergute ; Zhu, Yizheng ; Xiao, Xiaokui...
Proceedings of the VLDB Endowment.  15 (2022)  11 - p. 2348-2360 , 2022
 
?
14

Genotype Imputation with Homomorphic Encryption:

, In: 2021 6th International Conference on Biomedical Signal and Image Processing,
 
?
15

Efficient Private Comparison Queries Over Encrypted Databas..:

Tan, Benjamin Hong Meng ; Lee, Hyung Tae ; Wang, Huaxiong..
IEEE Transactions on Dependable and Secure Computing.  18 (2021)  6 - p. 2861-2874 , 2021
 
1-15