Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Qiang Tang
    Last name: 0001
    DBLP: 17/2212-1
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 26  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Jun Wang 0020, Qiang Tang 0001.
    A Probabilistic View of Neighborhood-based Recommendation Methods.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Jun Wang 0020, Qiang Tang 0001.
    Differentially Private Neighborhood-based Recommender Systems.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Qiang Tang 0001, Husen Wang.
    Privacy-preserving Hybrid Recommender System.
    Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017 2017 (0) 2017
    Conference paper
    Balazs Pejo, Qiang Tang 0001.
    To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification.
    Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017 2017 (0) 2017
    Conference paper
    Jun Wang, Qiang Tang 0001.
    Differentially Private Neighborhood-Based Recommender Systems.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Qiang Tang 0001, Balazs Pejo, Husen Wang.
    Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Husen Wang, Qiang Tang 0001.
    Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Erman Ayday, Qiang Tang 0001, Arif Yilmaz.
    Cryptographic Solutions for Credibility and Liability Issues of Genomic Data.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Jean Lancrenon, Marjan Skrobot, Qiang Tang 0001.
    Two More Efficient Variants of the J-PAKE Protocol.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Jean Lancrenon, Marjan Skrobot, Qiang Tang 0001.
    Two More Efficient Variants of the J-PAKE Protocol.
    Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 2016 (0) 2016
    Conference paper
    Qiang Tang 0001, Balazs Pejo.
    Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Vincenzo Iovino, Qiang Tang 0001, Karol Zebrowski.
    On the Power of Public-key Function-Private Functional Encryption.
    Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Qiang Tang 0001, Husen Wang.
    Privacy-preserving Hybrid Recommender System.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Afonso Arriaga, Vincenzo Iovino, Qiang Tang 0001.
    Updatable Functional Encryption.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Qiang Tang 0001, Balazs Pejo, Husen Wang.
    Protect Both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations.
    9th IEEE International Conference on Cloud Computing, CLOUD 2016, San Francisco, CA, USA, June 27 - July 2, 2016 2016 (0) 2016
    Conference paper
    Jun Wang, Qiang Tang 0001.
    A Probabilistic View of Neighborhood-Based Recommendation Methods.
    IEEE International Conference on Data Mining Workshops, ICDM Workshops 2016, December 12-15, 2016, Barcelona, Spain. 2016 (0) 2016
    Conference paper
    Afonso Arriaga, Vincenzo Iovino, Qiang Tang 0001.
    Updatable Functional Encryption.
    Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Xiaofeng Chen 0001, Willy Susilo, Jin Li 0002, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang 0001.
    Efficient algorithms for secure outsourcing of bilinear pairings.
    Theor. Comput. Sci. 2015, Volume 562 (0) 2015
    Conference paper
    Qiang Tang 0001, Jun Wang 0020.
    Privacy-preserving Friendship-based Recommender Systems.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Jiuyong Li, A. H. M. Sarowar Sattar, Muzammil M. Baig, Jixue Liu, Raymond Heatherly, Qiang Tang 0001, Bradley Malin.
    Methods to Mitigate Risk of Composition Attack in Independent Data Publications.
    Medical Data Privacy Handbook 2015 (0) 2015
    Conference paper
    Jun Wang 0020, Qiang Tang 0001.
    Recommender Systems and their Security Concerns.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Xiaofeng Chen 0001, Jin Li 0002, Jianfeng Ma, Qiang Tang 0001, Wenjing Lou.
    New Algorithms for Secure Outsourcing of Modular Exponentiations.
    IEEE Trans. Parallel Distrib. Syst. 2014, Volume 25 (0) 2014
    Conference paper
    Qiang Tang 0001.
    Nothing is for Free: Security in Searching Shared and Encrypted Data.
    IEEE Transactions on Information Forensics and Security 2014, Volume 9 (0) 2014
    Book chapter
    Arjan Jeckmans, Michael Beye, Zekeriya Erkin, Pieter H. Hartel, Reginald L. Lagendijk, Qiang Tang 0001.
    Privacy in Recommender Systems.
    Social Media Retrieval 2013 (0) 2013
    Journal article
    Jianfeng Wang, Xiaofeng Chen 0001, Hua Ma, Qiang Tang 0001, Jin Li 0002, Hui Zhu.
    A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
    J. Internet Serv. Inf. Secur. 2012, Volume 2 (0) 2012
    Show item 1 to 25 of 26  

    Your query returned 26 matches in the database.