Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Qiang Tang
    Last name: 0001
    DBLP: 17/2212-1
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 25  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Jun Wang 0020, Qiang Tang 0001.
    A Probabilistic View of Neighborhood-based Recommendation Methods.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Jun Wang 0020, Qiang Tang 0001.
    Differentially Private Neighborhood-based Recommender Systems.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Qiang Tang 0001, Husen Wang.
    Privacy-preserving Hybrid Recommender System.
    Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017 2017 (0) 2017
    Conference paper
    Balazs Pejo, Qiang Tang 0001.
    To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification.
    Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017 2017 (0) 2017
    Conference paper
    Jun Wang, Qiang Tang 0001.
    Differentially Private Neighborhood-Based Recommender Systems.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Qiang Tang 0001, Balazs Pejo, Husen Wang.
    Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Husen Wang, Qiang Tang 0001.
    Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Erman Ayday, Qiang Tang 0001, Arif Yilmaz.
    Cryptographic Solutions for Credibility and Liability Issues of Genomic Data.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Jean Lancrenon, Marjan Skrobot, Qiang Tang 0001.
    Two More Efficient Variants of the J-PAKE Protocol.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Jean Lancrenon, Marjan Skrobot, Qiang Tang 0001.
    Two More Efficient Variants of the J-PAKE Protocol.
    Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 2016 (0) 2016
    Show item 1 to 10 of 25  

    Your query returned 25 matches in the database.