Name
Affiliation
Papers
TAEHO JUNG
Illinois Institute of Technology, Chicago, IL, USA
69
Collaborators
Citations 
PageRank 
119
462
36.24
Referers 
Referees 
References 
1213
1627
748
Search Limit
1001000
Title
Citations
PageRank
Year
The Stackelberg equilibrium for one-sided zero-sum partially observable stochastic games00.342022
Appangio: Revealing Contextual Information Of Android App Behaviors By Api-Level Audit Logs00.342021
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization10.362021
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery00.342021
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations00.342021
Prv 2 chain: Storage of Tree-structured Provenance Records in Blockchain with Linkage Privacy00.342021
A mining pool solution for novel proof-of-neural-architecture consensus00.342021
Provably Secure Contact Tracing with Conditional Private Set Intersection00.342021
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs00.342021
Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding50.392020
DLchain - Blockchain with Deep Learning as Proof-of-Useful-Work.00.342020
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM00.342020
Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption10.342020
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption.00.342020
PatronuS: A System for Privacy-Preserving Cloud Video Surveillance00.342020
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers10.372019
Non-Interactive Mpc With Trusted Hardware Secure Against Residual Function Attacks00.342019
Exploiting Computation Power of Blockchain for Biomedical Image Segmentation.20.372019
Energy-recycling Blockchain with Proof-of-Deep-Learning10.352019
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model80.492019
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified?00.342019
MIS2: Misinformation and Misbehavior Mining on the Web.00.342018
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats.30.402018
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs.00.342018
Crowdlearning: Crowded Deep Learning with Data Privacy20.382018
Hidebehind: Enjoy Voice Input with Voiceprint Unclonability and Anonymity.30.412018
Martian: Message Broadcast via LED Lights to Heterogeneous Smartphones.10.382017
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.40.512017
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified?00.342017
VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices.00.342017
Detecting Driver's Smartphone Usage via Nonintrusively Sensing Driving Dynamics.60.442017
Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs.90.472017
Graph-Based Privacy-Preserving Data Publication60.432016
User-Demand-Oriented Privacy-Preservation in Video Delivering00.342016
Real-time update with joint optimization of route selection and update scheduling for SDNs30.402016
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'.10.352016
Ensuring Semantic Validity in Privacy-Preserving Aggregate Statistics00.342016
Privacy Inference on Knowledge Graphs: Hardness and Approximation00.342016
Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis150.862016
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption411.502015
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel221.182015
Enabling Privacy-Preserving Auctions In Big Data10.362015
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks210.722015
A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm20.372015
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices220.732015
Predicting the influencers on wireless subscriber churn10.352014
Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs10.352014
It starts with iGaze: visual attention driven networking with smart glasses331.332014
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection.20.392014
Achieving differential privacy of data disclosure in the smart grid361.162014
  • 1
  • 2