Towards practical auditing of dynamic data in decentralized storage H Duan, Y Du, L Zheng, C Wang, MH Au, Q Wang IEEE Transactions on Dependable and Secure Computing 20 (1), 708-723, 2022 | 19 | 2022 |
Maximizing Approximately k-Submodular Functions L Zheng, H Chan, G Loukides, M Li Proceedings of the 2021 SIAM International Conference on Data Mining (SDM …, 2021 | 18 | 2021 |
Leakage-abuse attacks against forward and backward private searchable symmetric encryption L Xu, L Zheng, C Xu, X Yuan, C Wang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 11 | 2023 |
Car-Sharing: Online Scheduling k Cars Between Two Locations S Li, L Zheng, VCS Lee Frontiers in Algorithmics: 14th International Workshop, FAW 2020, Haikou …, 2020 | 3 | 2020 |
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores L Zheng, L Xu, C Wang, S Wang, Y Hu, Z Qin, F Li, K Ren Proceedings of the VLDB Endowment 17 (10), 2445 - 2458, 2024 | 1 | 2024 |
HORAM: A High-Performance Hierarchical Doubly Oblivious RAM L Zheng, Z Zhang, W Dong, Y Zhang, Y Wu, C Wang arXiv preprint arXiv:2409.07167, 2024 | | 2024 |