Dr. DUAN Huayi (段華憶)
Research Output
- 2023
- Online published
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases
Xu, L., Zhou, A., Duan, H., Wang, C., Wang, Q. & Jia, X., 17 Jul 2023, (Online published) In: IEEE Transactions on Dependable and Secure Computing. 16 p.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
- Published
Optimizing Secure Decision Tree Inference Outsourcing
Zheng, Y., Wang, C., Wang, R., Duan, H. & Nepal, S., Jul 2023, In: IEEE Transactions on Dependable and Secure Computing. 20, 4, p. 3079-3092 14 p.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 1 - Published
Towards Practical Auditing of Dynamic Data in Decentralized Storage
Duan, H., Du, Y., Zheng, L., Wang, C., Au, M. H. & Wang, Q., Jan 2023, In: IEEE Transactions on Dependable and Secure Computing. 20, 1, p. 708-723Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 3 - 2022
- Online published
PEBA: Enhancing User Privacy and Coverage of Safe Browsing Services
Du, Y., Duan, H., Xu, L., Cui, H., Wang, C. & Wang, Q., 7 Sept 2022, (Online published) In: IEEE Transactions on Dependable and Secure Computing.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
- Published
Enabling Secure and Efficient Decentralized Storage Auditing with Blockchain
Du, Y., Duan, H., Zhou, A., Wang, C., Au, M. H. & Wang, Q., Sept 2022, In: IEEE Transactions on Dependable and Secure Computing. 19, 5, p. 3038-3054 17 p.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 15 - Published
Method for Accelerating Execution of Application in a Trusted Execution Environment
WANG, C., CUI, H. & DUAN, H., 19 Jul 2022, Patent No. US11,392,724, Priority No. 15/849,889Research output: Patents, Agreements and Assignments (RGC: 51, 52) › 51_Patents (CityU)
- Published
Securely and Efficiently Outsourcing Decision Tree Inference
Zheng, Y., Duan, H., Wang, C., Wang, R. & Nepal, S., May 2022, In: IEEE Transactions on Dependable and Secure Computing. 19, 3, p. 1841-1855Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 13 - 2021
- Published
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising
Zheng, Y., Duan, H., Tang, X., Wang, C. & Zhou, J., May 2021, In: IEEE Transactions on Dependable and Secure Computing. 18, 3, p. 1261-1275 15 p., 8673634.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 22 - Published
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption
Xu, L., Duan, H., Zhou, A., Yuan, X. & Wang, C., 2021, In: IEEE Transactions on Information Forensics and Security. 16, p. 5310-5325Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 11 - 2020
- Published
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage
Du, Y., Duan, H., ZHOU, A., Wang, C., Au, M. H. & Wang, Q., Nov 2020, Proceedings - 2020 IEEE 40th International Conference on Distributed Computing Systems: ICDCS 2020. IEEE, p. 201-211 9355771Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 12 - 2019
- Published
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Duan, H., Wang, C., Yuan, X., Zhou, Y., Wang, Q. & Ren, K., Nov 2019, CCS’19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2351-2367 (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 41 - Published
Towards Secure and Efficient Outsourcing of Machine Learning Classification
Zheng, Y., Duan, H. & Wang, C., Sept 2019, Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 22-40 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11735 LNCS).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 24 - Published
SPEED: Accelerating Enclave Applications via Secure Deduplication
Cui, H., Duan, H., Qin, Z., Wang, C. & Zhou, Y., Jul 2019, Proceedings: 2019 39th IEEE International Conference on Distributed Computing Systems: ICDCS 2019. IEEE, p. 1072-1082 8884945. (Proceedings - International Conference on Distributed Computing Systems).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 8 - Published
pRide: Private Ride Request for Online Ride Hailing Service with Secure Hardware Enclave
Luo, Y., Jia, X., Duan, H., Wang, C., Xu, M. & Fu, S., Jun 2019, IWQoS '19 - Proceedings of the International Symposium on Quality of Service. ACM, 10 p. 27. (Proceedings of the International Symposium on Quality of Service, IWQoS).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 9 - Published
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes
Zhang, X., Duan, H., Wang, C., Li, Q. & Wu, J., Apr 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, p. 1162-1170 8737435. (Proceedings - IEEE INFOCOM).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 6 - Published
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things
Duan, H., Zheng, Y., Wang, C. & Yuan, X., Apr 2019, In: IEEE Internet of Things Journal. 6, 2, p. 2637-2650Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 13 - Published
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Duan, H., Zheng, Y., Du, Y., Zhou, A., Wang, C. & Au, M. H., Mar 2019, 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). Institute of Electrical and Electronics Engineers, 8767412. (IEEE International Conference on Pervasive Computing and Communications, PerCom).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 38 - 2018
- Published
Secure Hashing-Based Verifiable Pattern Matching
Chen, F., Wang, D., Li, R., Chen, J., Ming, Z., Liu, A. X., Duan, H., & 2 others , Nov 2018, In: IEEE Transactions on Information Forensics and Security. 13, 11, p. 2677-2690Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 9 - Published
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing
Zheng, Y., Duan, H. & Wang, C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2475-2489Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 100 - Published
Tutorial: Building Secure and Trustworthy Blockchain Applications
Cai, C., Duan, H. & Wang, C., Sept 2018, PROCEEDINGS - 2018 IEEE Cybersecurity Development Conference, SecDev 2018. Institute of Electrical and Electronics Engineers Inc., p. 120-121 8543395. (Proceedings - IEEE Cybersecurity Development Conference, SecDev).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 11