ObliVM: A Programming Framework for Secure Computation C Liu, XS Wang, K Nayak, Y Huang, E Shi IEEE S & P, 2015 | 440 | 2015 |
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound XS Wang, THH Chan, E Shi ACM SIGSAC Conference on Computer and Communications Security, 2015 | 334 | 2015 |
EMP-toolkit: Efficient MultiParty computation toolkit X Wang, AJ Malozemoff, J Katz https://github.com/emp-toolkit, 2016 | 280* | 2016 |
Oblivious Data Structures XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang ACM SIGSAC Conference on Computer and Communications Security, 215-226, 2014 | 254 | 2014 |
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures J Katz, V Kolesnikov, X Wang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 248 | 2018 |
Addressing class imbalance in federated learning L Wang, S Xu, X Wang, Q Zhu Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 10165 …, 2021 | 239 | 2021 |
Global-Scale Secure Multiparty Computation X Wang, S Ranellucci, J Katz Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 236 | 2017 |
Authenticated garbling and efficient maliciously secure two-party computation X Wang, S Ranellucci, J Katz Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 217 | 2017 |
SCORAM: oblivious RAM for secure computation XS Wang, Y Huang, THH Chan, A Shelat, E Shi ACM SIGSAC Conference on Computer and Communications Security, 191-202, 2014 | 197 | 2014 |
GraphSC: Parallel Secure Computation Made Easy K Nayak, XS Wang, S Ioannidis, U Weinsberg, N Taft, E Shi IEEE S & P, 2015 | 181 | 2015 |
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance XS Wang, Y Huang, Y Zhao, H Tang, X Wang, D Bu ACM SIGSAC Conference on Computer and Communications Security, 2015 | 146 | 2015 |
Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits C Weng, K Yang, J Katz, X Wang 2021 IEEE Symposium on Security and Privacy (SP), 1074-1091, 2021 | 145 | 2021 |
Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation S Zahur, X Wang, M Raykova, A Gascón, J Doerner, D Evans, J Katz Security and Privacy (SP), 2016 IEEE Symposium on, 218-234, 2016 | 142* | 2016 |
Ferret: Fast extension for correlated OT with small communication K Yang, C Weng, X Lan, J Zhang, X Wang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 132 | 2020 |
Federated class-incremental learning J Dong, L Wang, Z Fang, G Sun, S Xu, X Wang, Q Zhu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022 | 115 | 2022 |
Quicksilver: Efficient and affordable zero-knowledge proofs for circuits and polynomials over any field K Yang, P Sarkar, C Weng, X Wang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 99 | 2021 |
Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning C Weng, K Yang, X Xie, J Katz, X Wang 30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021 | 88 | 2021 |
Trustllm: Trustworthiness in large language models L Sun, Y Huang, H Wang, S Wu, Q Zhang, C Gao, Y Huang, W Lyu, ... arXiv preprint arXiv:2401.05561, 2024 | 79 | 2024 |
Faster Secure Two-Party Computation in the Single-Execution Setting X Wang, AJ Malozemoff, J Katz Advances in Cryptology -- EUROCRYPT 2017, 2017 | 72* | 2017 |
Eavesdrop the composition proportion of training labels in federated learning L Wang, S Xu, X Wang, Q Zhu arXiv preprint arXiv:1910.06044, 2019 | 68 | 2019 |