·Paper Publications
- [1] d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.The 33nd USENIX Security Symposium,2024,
- [2] Query Recovery from Easy to Hard: Jigsaw Attack against SSE.The 33rd USENIX Security Symposium,2024,
- [3] The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.The Network and Distributed System Security (NDSS) Symposium 2023,2023,
- [4] High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.The 32nd USENIX Security Symposium,2023,
- [5] Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.The Network and Distributed System Security (NDSS) Symposium 2023,2023,
- [6] An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE.The Design Automation Conference (DAC) 2024,2024,
- [7] An FPGA-based Key-Switching Accelerator with Ultra-High Throughput for FHE.2024 ACM/IEEE International Conference on Computer-Aided Design (ICCAD 2024),2024,
- [8] ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification.The 29th European Symposium on Research in Computer Security (ESORICS’24),2024,
- [9] PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds.The 29th European Symposium on Research in Computer Security (ESORICS’24),2024,
- [10] You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults.The 28th European Symposium on Research in Computer Security (ESORICS’23),2023,