Qiang Tang

Publications in the past five years have been listed below. See Google Scholar for citation information, and see DBLP for a publication list.


Post-Quantum Era Privacy Protection for Intelligent Infrastructures
Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevi\v{c}ius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
IEEE Access
Privacy-by-Design in Intelligent Infrastructures
Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevičius, Marinella Petrocchi, Mari Seeba, Qiang Tang, Aimilia Tasidou, Jake Tom
Book chapter of "Deep Diving into Data Protection 1979-2019: Celebrating 40 Years of Privacy and Data Protection at the CRIDS"


CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-preserving Easy
Jun Wang, Chao Jin, Qiang Tang, Zhe Liu, Khin Mi Mi Aung
In submission to IEEE TDSC
Cybersecurity and data privacy aspects in 5G-MOBIX
Djibrilla Amadou Kountche, Marwane El Bekri, Pedro J. Fernandez, Jose Santa, Antonio F. Skarmeta, Joao Almeida, Qiang Tang, Nuno Cruz
ITS European Congress, 9-10 November 2020
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
CoRR abs/2004.06818
******This work has been cited in the SPIEGEL article on contact tracing. ******
Another Look at Privacy-Preserving Automated Contact Tracing
Qiang Tang
In Submission to ACM TSAS


Novel Collaborative Filtering Recommender Friendly to Privacy Protection
Jun Wang, Qiang Tang, Afonso Arriaga, Peter Ryan
IJCAI 2019
Together or Alone: The Price of Privacy in Joint Learning
Balazs Pejo, Qiang Tang, Gergely Biczok
PoPETs/PETS 2019
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
Erman Ayday, Qiang Tang, Arif Yilmaz
TDSC - IEEE Transactions on Dependable and Secure Computing (IEEE)
Towards Blockchain-enabled Searchable Encryption
Qiang Tang
ICICS 2019
Privacy-preserving Decentralised Singular Value Decomposition
Bowen Liu, Qiang Tang
ICICS 2019
Privacy-preserving and yet Robust Collaborative Filtering Recommender as a Service
Qiang Tang
Inscrypt 2019


Privacy-preserving friendship-based recommender systems
Qiang Tang, Jun Wang
TDSC - IEEE Transactions on Dependable and Secure Computing (IEEE)
Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
IET Information Security (The Institution of Engineering and Technology)
Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang, Qiang Tang
The Computer Journal (Oxford university Express)
Privacy in Collaborative Recommenders
Qiang Tang
Book chapter of Collaborative Recommendation: Algorithms, Practical Challenges and Applications (World Scientific Publishing)
Cybersecurity Education for Awareness and Compliance
Teemu Tokola, Thomas Schaberreiter, Gerald Quirchmayr, Ludwig Englbrecht, Guenther Pernul, Sokratis Katsikas, Bart Preneel, and Qiang Tang
Book chapter of A Collaborative Cybersecurity Education Programme (IGI Global)
POSTER: Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning
Jun Wang, Afonso Arriaga, Qiang Tang, Peter Ryan
ACM CCS 2018 (ACM)
POSTER: The Price of Privacy in Collaborative Learning
Balazs Pejo, Qiang Tang, Gergely Biczok
ACM CCS 2018 (ACM)


Differentially Private Neighborhood-based Recommender Systems
Jun Wang, Qiang Tang
IFIP SEC (Springer)
Privacy-preserving Hybrid Recommender System
Qiang Tang, Husen Wang
AsiaCCS SCC workshop (ACM)
To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Balazs Pejo, Qiang Tang
AsiaCCS SCC workshop (ACM)


Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon, Marjan Skrobot, Qiang Tang
ACNS - Applied Cryptography and Network Security - 14th International Conference (Springer)
On the Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
CANS - Cryptology and Network Security - 15th International Conference (Springer)
Updatable functional encryption
Afonso Arriaga, Vincenzo Iovino, Qiang Tang
Mycrypt - The International Conference on Cryptology and Malicious Security (Springer)
Protect both integrity and confidentiality in outsourcing collaborative filtering computations
Qiang Tang, Balazs Pejo, Husen Wang
CLOUD - 2016 IEEE International Conference on Cloud Computing (IEEE)
A probabilistic view of neighborhood-based recommendation methods
Jun Wang, Qiang Tang
CLOUDMINE - ICDM-2016 Workshop on Data Mining Systems and their Applications on the Cloud (IEEE)
(poster) Game-theoretic framework for integrity verification in computation outsourcing
Qiang Tang, Balazs Pejo
Gamesec - 2016 Conference on Decision and Game Theory for Security (Springer)