Qiang Tang

Publications in the past five years have been listed below. See Google Scholar for citation information, and see DBLP for a publication list. For a complete list, see the PDF file.

Misc

CryptoRec: Privacy-preserving Recommendation as a Service
Jun Wang, Afonso Arriaga, Qiang Tang, Peter Ryan
arXiv:1802.02432
Together or Alone: The Price of Privacy in Joint Learning
Balazs Pejo, Qiang Tang, Gergely Biczok
arXiv:1712.00270
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
Cryptology ePrint Archive: Report 2014/670

2018

Privacy-preserving friendship-based recommender systems
Qiang Tang, Jun Wang
TDSC - IEEE Transactions on Dependable and Secure Computing (IEEE)
Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
IET Information Security (The Institution of Engineering and Technology)
Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang, Qiang Tang
The Computer Journal (Oxford university Express)
Privacy in Collaborative Recommenders
Qiang Tang
Book chapter of Collaborative Recommendation: Algorithms, Practical Challenges and Applications (World Scientific Publishing)
Cybersecurity Education for Awareness and Compliance
Teemu Tokola, Thomas Schaberreiter, Gerald Quirchmayr, Ludwig Englbrecht, Guenther Pernul, Sokratis Katsikas, Bart Preneel, and Qiang Tang
Book chapter of A Collaborative Cybersecurity Education Programme (IGI Global)
POSTER: Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning
Jun Wang, Afonso Arriaga, Qiang Tang, Peter Ryan
ACM CCS 2018 (ACM)
POSTER: The Price of Privacy in Collaborative Learning
Balazs Pejo, Qiang Tang, Gergely Biczok
ACM CCS 2018 (ACM)

2017

Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
Erman Ayday, Qiang Tang, Arif Yilmaz
TDSC - IEEE Transactions on Dependable and Secure Computing (IEEE)
Cryptology ePrint Archive: Report 2016/478
Differentially Private Neighborhood-based Recommender Systems
Jun Wang, Qiang Tang
IFIP SEC (Springer)
Privacy-preserving Hybrid Recommender System
Qiang Tang, Husen Wang
AsiaCCS SCC workshop (ACM)
To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Balazs Pejo, Qiang Tang
AsiaCCS SCC workshop (ACM)

2016

Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon, Marjan Skrobot, Qiang Tang
ACNS - Applied Cryptography and Network Security - 14th International Conference (Springer)
On the Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
CANS - Cryptology and Network Security - 15th International Conference (Springer)
Updatable functional encryption
Afonso Arriaga, Vincenzo Iovino, Qiang Tang
Mycrypt - The International Conference on Cryptology and Malicious Security (Springer)
Protect both integrity and confidentiality in outsourcing collaborative filtering computations
Qiang Tang, Balazs Pejo, Husen Wang
CLOUD - 2016 IEEE International Conference on Cloud Computing (IEEE)
A probabilistic view of neighborhood-based recommendation methods
Jun Wang, Qiang Tang
CLOUDMINE - ICDM-2016 Workshop on Data Mining Systems and their Applications on the Cloud (IEEE)
(poster) Game-theoretic framework for integrity verification in computation outsourcing
Qiang Tang, Balazs Pejo
Gamesec - 2016 Conference on Decision and Game Theory for Security (Springer)

2015

Efficient Algorithms for Secure Outsourcing of Bilinear Pairings
Xiaofeng Chen, Willy Susilo, Jin li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang
Theoretical Computer Science (Elsevier)
From Ephemerizer to Timed-Ephemerizer - Achieve Assured Lifecycle Enforcement for Sensitive Data
Qiang Tang
The Computer Journal (Oxford University Press)
Extend the Concept of Public Key Encryption with Delegated Search
Qiang Tang, Xiaofeng Chen, Hua Ma
The Computer Journal (Oxford University Press)
Towards Forward Security Properties for PEKS and IBE
Qiang Tang
ACISP - 20th Australasian Conference on Information Security and Privacy (Springer)
Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions
Qiang Tang, Jun Wang
ESORICS - 20th European Symposium on Research in Computer Security (Springer)
Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes
Massimo Chenal, Qiang Tang
ISC - Information Security - 18th International Conference (Springer)
Methods to Mitigate Risk of Composition Attack in Independent Data Publications
Jiuyong Li, Sarowar A. Sattar, Muzammil M. Baig, Jixue Liu, Raymond Heatherly, Qiang Tang, Bradley Malin
Book chapter of Medical Data Privacy Handbook

2014

Nothing is for Free: Security in Searching Shared & Encrypted Data
Qiang Tang
TIFS - IEEE Transactions on Information Forensics & Security (IEEE)
New Algorithms for Secure Outsourcing of Modular Exponentiations (full paper)
Xiaofeng Chen, Jin li, Jianfeng Ma, Qiang Tang, Wenjing Lou
TPDS - IEEE Transactions on Parallel and Distributed Systems (IEEE)
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan
Africacrypt 2014 (Springer)
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Massimo Chenal, Qiang Tang
Latincrypt 2014 (Springer)
Distributed Searchable Symmetric Encryption
Christoph Bosch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter Hartel, Willem Jonker
PST - International Conference on Privacy, Security and Trust (IEEE)