Blindfolded evaluation of random forests with multi-key homomorphic encryption A Aloufi, P Hu, HWH Wong, SSM Chow IEEE Transactions on Dependable and Secure Computing 18 (4), 1821-1835, 2019 | 38 | 2019 |
Multi-key homomorphic signatures unforgeable under insider corruption RWF Lai, RKH Tai, HWH Wong, SSM Chow International Conference on the Theory and Application of Cryptology and …, 2018 | 31 | 2018 |
Real Threshold ECDSA. HWH Wong, JPK Ma, HHF Yin, SSM Chow NDSS, 2023 | 10 | 2023 |
Packet size optimization for batched network coding HHF Yin, HWH Wong, M Tahernia, J Qing 2022 IEEE International Symposium on Information Theory (ISIT), 1584-1589, 2022 | 8 | 2022 |
Access control encryption from group encryption X Wang, HWH Wong, SSM Chow International Conference on Applied Cryptography and Network Security, 417-441, 2021 | 6 | 2021 |
Multichannel optimal tree-decodable codes are not always optimal prefix codes HHF Yin, HWH Wong, M Tahernia, RWF Lai 2022 IEEE International Symposium on Information Theory (ISIT), 1-6, 2022 | 2 | 2022 |
Two-state alien tiles: A coding-theoretical perspective HHF Yin, KH Ng, SK Ma, HWH Wong, HWL Mak Mathematics 10 (16), 2994, 2022 | 1 | 2022 |
Learning DNN model with error—exposing the hidden model of BAYHENN HWH Wong, JPK Ma, DPH Wong, LKL Ng, SSM Chow Proceedings of the Twenty-Ninth International Conference on International …, 2021 | | 2021 |
A Zoo of Homomorphic Signatures RWF Lai, RKH Tai, HWH Wong, SSM Chow | | |