End-to-End Text Recognition with Convolutional Neural Networks T Wang, DJ Wu, A Coates, AY Ng Pattern Recognition (ICPR), 2012 21st International Conference on, 3304-3308, 2012 | 1238 | 2012 |
Deep learning with COTS HPC systems A Coates, B Huval, T Wang, DJ Wu, B Catanzaro, N Andrew Proceedings of the 30th International Conference on Machine Learning (ICML …, 2013 | 971 | 2013 |
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning A Coates, B Carpenter, C Case, S Satheesh, B Suresh, T Wang, DJ Wu, ... Document Analysis and Recognition (ICDAR), 2011 International Conference on …, 2011 | 572 | 2011 |
Private Database Queries Using Somewhat Homomorphic Encryption D Boneh, C Gentry, S Halevi, F Wang, DJ Wu Applied Cryptography and Network Security, 102-118, 2013 | 265 | 2013 |
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds K Lewi, DJ Wu ACM Conference on Computer and Communications Security (CCS), 2016 | 246 | 2016 |
Practical Order-Revealing Encryption with Limited Leakage N Chenette, K Lewi, SA Weis, DJ Wu Proceedings of the 23rd International Conference on Fast Software Encryption …, 2016 | 216 | 2016 |
Secure genome-wide association analysis using multiparty computation H Cho, DJ Wu, B Berger Nature biotechnology 36 (6), 547-551, 2018 | 212 | 2018 |
Privately Evaluating Decision Trees and Random Forests DJ Wu, T Feng, M Naehrig, K Lauter Proceedings on Privacy Enhancing Technologies 2016 (4), 2015 | 212 | 2015 |
Function-Hiding Inner Product Encryption is Practical S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu International Conference on Security and Cryptography for Networks (SCN), 2016 | 183 | 2016 |
CryptGPU: Fast privacy-preserving machine learning on the GPU S Tan, B Knott, Y Tian, DJ Wu 2021 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2021 | 153 | 2021 |
Deriving genomic diagnoses without revealing patient genomes KA Jagadeesh, DJ Wu, JA Birgmeier, D Boneh, G Bejerano Science 357 (6352), 692-695, 2017 | 153 | 2017 |
Immunizing Multilinear Maps Against Zeroizing Attacks D Boneh, DJ Wu, J Zimmerman | 106 | 2014 |
Constraining Pseudorandom Functions Privately D Boneh, K Lewi, DJ Wu Public-Key Cryptography – PKC 2017, 2015 | 97 | 2015 |
Privacy, discovery, and authentication for the Internet of Things DJ Wu, A Taly, A Shankar, D Boneh European Symposium on Research in Computer Security, 301-319, 2016 | 89 | 2016 |
Privacy-Preserving Shortest Path Computation DJ Wu, J Zimmerman, J Planul, JC Mitchell arXiv preprint arXiv:1601.02281, 2016 | 89 | 2016 |
Spiral: Fast, high-rate single-server PIR via FHE composition SJ Menon, DJ Wu 2022 IEEE Symposium on Security and Privacy (SP), 930-947, 2022 | 76 | 2022 |
Lattice-based SNARGs and their application to more efficient obfuscation D Boneh, Y Ishai, A Sahai, DJ Wu Annual International Conference on the Theory and Applications of …, 2017 | 74 | 2017 |
Watermarking cryptographic functionalities from standard lattice assumptions S Kim, DJ Wu Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 63 | 2017 |
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications D Boneh, Y Ishai, A Passelègue, A Sahai, DJ Wu Theory of Cryptography Conference, 699-729, 2018 | 57* | 2018 |
Batch Arguments for and More from Standard Bilinear Group Assumptions B Waters, DJ Wu Annual International Cryptology Conference, 433-463, 2022 | 51 | 2022 |