BUSEC Publications 2023–2025
Recent publications collected from DBLP for BUSEC faculty, postdocs, and graduate students.
2025
- Privacy in Metalearning and Multitask Learning: Modeling and Separations. — AISTATS
- Private Eyes: Zero-Leakage Iris Searchable Encryption. — CODASPY
- An improved blockchain-based multi-region Federated Learning framework for crop disease diagnosis. — Comput. Electr. Eng.
- Beyond the Worst Case: Extending Differential Privacy Guarantees to Realistic Adversaries. — CoRR
- Cryptis: Cryptographic Reasoning in Separation Logic. — CoRR
- Do You Really Need Public Data? Surrogate Public Data for Differential Privacy on Tabular Data. — CoRR
- DTVM: Revolutionizing Smart Contract Execution with Determinism and Compatibility. — CoRR
- Enforcing Demographic Coherence: A Harms Aware Framework for Reasoning about Private Data Release. — CoRR
- Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs. — CoRR
- Interdependent Bilateral Trade: Information vs Approximation. — CoRR
- Is API Access to LLMs Useful for Generating Private Synthetic Tabular Data? — CoRR
- Privately Evaluating Untrusted Black-Box Functions. — CoRR
- A Kleene Algebra with Tests for Union Bound Reasoning About Probabilistic Programs. — CSL
- Kleene Algebra with Commutativity Conditions Is Undecidable. — CSL
- Murmurs of the Silenced: Secure Reporting of Misconduct Settlements. — CSLAW
- Bilateral Trade with Interdependent Values: Information vs. Approximation. — EC
- Zero-Knowledge Mechanisms. — EC
- Snake-Eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption. — EUROCRYPT
- 6th Symposium on Foundations of Responsible Computing, FORC 2025, June 4-6, 2025, Stanford University, CA, USA — FORC, LIPIcs
- BiGKAT: An Algebraic Framework for Relational Verification of Probabilistic Programs. — FoSSaCS
- SoK: Privacy-Preserving Signatures. — IACR Commun. Cryptol.
- Deniable Secret Sharing. — IACR Cryptol. ePrint Arch.
- SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models. — IACR Cryptol. ePrint Arch.
- Universally Composable Succinct Vector Commitments and Applications. — IACR Cryptol. ePrint Arch.
- Corrections to "The Optimization of Carbon Emission Prediction in Low Carbon Energy Economy Under Big Data". — IEEE Access
- SmartSpr: A Physics-Informed Mobile Sprinkler Scheduling System for Reducing Urban Particulate Matter Pollution. — IEEE Trans. Mob. Comput.
- BiGDC-BrainAgeNet: Enhancing EEG-Based Brain Age Prediction with Bidirectional Graph Diffusion Convolutions. — ISBRA
- Online Versus Offline Adversaries in Property Testing. — ITCS
- Multimodal-information-based optimized agricultural prescription recommendation system of crop electronic medical records. — J. Ind. Inf. Integr.
- Measuring memorization in language models via probabilistic extraction. — NAACL
- Knowledge-guided adaptive spatial-temporal graph contrastive learning framework: Regional crop diseases prediction based on electronic medical records. — Neural Networks
- Mitigation of Power Offset Induced by Hard-Decision-Error in Fiber Longitudinal Power Profile Estimation. — OFC
- Universally Composable Non-interactive Zero-Knowledge from Sigma Protocols via a New Straight-Line Compiler. — PKC
- Fully Dynamic Algorithms for Graph Databases with Edge Differential Privacy. — Proc. ACM Manag. Data
- Probabilistic Refinement Session Types. — Proc. ACM Program. Lang.
- Triangle Counting With Local Edge Differential Privacy. — Random Struct. Algorithms
- Differentially Private Sampling from Distributions. — SIAM J. Comput.
- Local Lipschitz Filters for Bounded-Range Functions with Applications to Arbitrary Real-Valued Functions. — SODA
- Differentially Private Release of Israel's National Registry of Live Births. — SP
- Privately Evaluating Untrusted Black-Box Functions. — STOC
2024
- Testing Connectedness of Images. — Algorithmica
- Not All Learnable Distribution Classes are Privately Learnable. — ALT
- Private PAC Learning May be Harder than Online Learning. — ALT
- Translation of Partially Paired Images with Generative Adversarial Networks. — BHI
- A Canary in the AI Coal Mine: American Jews May Be Disproportionately Harmed by Intellectual Property Dispossession in Large Language Model Training. — CHI
- "Delete it and Move On": Digital Management of Shared Sexual Content after a Breakup. — CHI
- A novel cascaded multi-task method for crop prescription recommendation based on electronic medical record. — Comput. Electron. Agric.
- A Canary in the AI Coal Mine: American Jews May Be Disproportionately Harmed by Intellectual Property Dispossession in Large Language Model Training. — CoRR
- ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries. — CoRR
- Auditing Privacy Mechanisms via Label Inference Attacks. — CoRR
- Differentially Private Release of Israel's National Registry of Live Births. — CoRR
- Domain Reasoning in TopKAT. — CoRR
- Fully Dynamic Graph Algorithms with Edge Differential Privacy. — CoRR
- Instance-Optimal Private Density Estimation in the Wasserstein Distance. — CoRR
- Kleene algebra with commutativity conditions is undecidable. — CoRR
- Measuring memorization through probabilistic discoverable extraction. — CoRR
- Not All Learnable Distribution Classes are Privately Learnable. — CoRR
- Online versus Offline Adversaries in Property Testing. — CoRR
- Oracle-Efficient Differentially Private Learning with Public Data. — CoRR
- Privacy in Metalearning and Multitask Learning: Modeling and Separations. — CoRR
- Private PAC Learning May be Harder than Online Learning. — CoRR
- Programming Frameworks for Differential Privacy. — CoRR
- Safer Digital Intimacy For Sex Workers And Beyond: A Technical Research Agenda. — CoRR
- Simple Mechanisms for Utility Maximization: Approximating Welfare in the I.I.D. Unit-Demand Setting. — CoRR
- The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media. — CoRR
- Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. — CoRR
- A Phenotypic Learning Classifier System for Problems with Continuous Features. — GECCO
- A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography. — IACR Commun. Cryptol.
- Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. — IACR Commun. Cryptol.
- A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography. — IACR Cryptol. ePrint Arch.
- Committing AVID with Partial Retrieval and Optimal Storage. — IACR Cryptol. ePrint Arch.
- DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. — IACR Cryptol. ePrint Arch.
- Fiat-Shamir for Bounded-Depth Adversaries. — IACR Cryptol. ePrint Arch.
- Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. — IACR Cryptol. ePrint Arch.
- PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. — IACR Cryptol. ePrint Arch.
- Secure Account Recovery for a Privacy-Preserving Web Service. — IACR Cryptol. ePrint Arch.
- Towards general-purpose program obfuscation via local mixing. — IACR Cryptol. ePrint Arch.
- Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler. — IACR Cryptol. ePrint Arch.
- Domain Reasoning in TopKAT. — ICALP
- The Optimization of Carbon Emission Prediction in Low Carbon Energy Economy Under Big Data. — IEEE Access
- Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda. — IEEE Secur. Priv.
- Design and Modeling of Large Helical Deformation Composite Actuators Under Complicated Loading Conditions. — IEEE Trans. Instrum. Meas.
- Impacts of Procedural Justice and Ethical Leadership on Organizational Innovation. — Int. J. Asian Bus. Inf. Manag.
- Poster Abstract: Sprinkler-UAV Cooperative Active Scheduling System. — IPSN
- Property Testing with Online Adversaries. — ITCS
- A Deep Neural Network-Based Assistive Decision Method for Financial Risk Prediction in Carbon Trading Market. — J. Circuits Syst. Comput.
- Intelligent Productivity Transformation: Corporate Market Demand Forecasting With the Aid of an AI Virtual Assistant. — J. Organ. End User Comput.
- Combinatorial Auctions with Interdependent Valuations: SOS to the Rescue. — Math. Oper. Res.
- Auditing Privacy Mechanisms via Label Inference Attacks. — NeurIPS
- Instance-Optimal Private Density Estimation in the Wasserstein Distance. — NeurIPS
- Optimal Hypothesis Selection in (Almost) Linear Time. — NeurIPS
- Oracle-Efficient Differentially Private Learning with Public Data. — NeurIPS
- The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate Media. — Proc. ACM Hum. Comput. Interact.
- Continual Release of Differentially Private Synthetic Data from Longitudinal Data Collections. — Proc. ACM Manag. Data
- Program Analysis for Adaptive Data Analysis. — Proc. ACM Program. Lang.
- Sensitivity by Parametricity. — Proc. ACM Program. Lang.
- SocIoTy: Practical Cryptography in Smart Home Contexts. — Proc. Priv. Enhancing Technol.
- Isoperimetric inequalities for real-valued functions with applications to monotonicity testing. — Random Struct. Algorithms
- Latitudinal Characteristics of Nighttime Electron Temperature in the Topside Ionosphere and Its Dependence on Solar and Geomagnetic Activities. — Remote. Sens.
- Non-Adaptive Matroid Prophet Inequalities. — SAGT
- To Regulate or Not to Regulate: Using Revenue Maximization Tools to Maximize Consumer Utility. — SAGT
- QueryShield: Cryptographically Secure Analytics in the Cloud. — SIGMOD Conference Companion
- Group Oblivious Message Retrieval. — SP
- Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. — SP
- The Role of Local Algorithms in Privacy (Invited Talk). — STACS
- Towards General-Purpose Program Obfuscation via Local Mixing. — TCC
- PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. — USENIX Security Symposium
- "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators. — USENIX Security Symposium
- RADIUS/UDP Considered Harmful. — USENIX Security Symposium
- Secure Account Recovery for a Privacy-Preserving Web Service. — USENIX Security Symposium
- ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. — USENIX Security Symposium
2023
- Report on Logic in Computer Science (LICS'23). — ACM SIGLOG News
- Testing Connectedness of Images. — APPROX/RANDOM
- Control, Confidentiality, and the Right to be Forgotten. — CCS
- Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. — CCS
- "Nudes? Shouldn't I charge for these?": Motivations of New Sexual Content Creators on OnlyFans. — CHI
- Identification of mutation gene prognostic biomarker in multiple myeloma through gene panel exome sequencing and transcriptome analysis in Chinese population. — Comput. Biol. Medicine
- A Formal Model for Secure Multiparty Computation. — CoRR
- Approximate degree lower bounds for oracle identification problems. — CoRR
- Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. — CoRR
- Circuit complexity and functionality: a thermodynamic perspective. — CoRR
- Constant Approximation for Private Interdependent Valuations. — CoRR
- Continual Release of Differentially Private Synthetic Data. — CoRR
- Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation. — CoRR
- Differentially Private Confidence Intervals for Proportions under Stratified Random Sampling. — CoRR
- DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection. — CoRR
- Integrated Simulation Platform for Quantifying the Traffic-Induced Environmental and Health Impacts. — CoRR
- Local Lipschitz Filters for Bounded-Range Functions. — CoRR
- Node-Differentially Private Estimation of the Number of Connected Components. — CoRR
- Property Testing with Online Adversaries. — CoRR
- Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. — CoRR
- Testing Connectedness of Images. — CoRR
- The Complexity of Verifying Boolean Programs as Differentially Private. — CoRR
- Triangle Counting with Local Edge Differential Privacy. — CoRR
- Zero-Knowledge Mechanisms. — CoRR
- Approximate degree lower bounds for oracle identification problems. — Electron. Colloquium Comput. Complex.
- ShrewdAttack: Low Cost High Accuracy Model Extraction. — Entropy
- Bunched Fuzz: Sensitivity for Vector Metrics. — ESOP
- Proof-Carrying Data from Arithmetized Random Oracles. — EUROCRYPT
- SoK: Data Sovereignty. — EuroS&P
- Constant Approximation for Private Interdependent Valuations. — FOCS
- 8th International Conference on Formal Structures for Computation and Deduction, FSCD 2023, July 3-6, 2023, Rome, Italy — FSCD, LIPIcs
- Spatial and Temporal Evolution of Precipitation and Its Main Driving Factors in Jiangsu Province, China. — Geoinformatics
- Group Oblivious Message Retrieval. — IACR Cryptol. ePrint Arch.
- OpenPubkey: Augmenting OpenID Connect with User held Signing Keys. — IACR Cryptol. ePrint Arch.
- Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. — IACR Cryptol. ePrint Arch.
- Private Eyes: Zero-Leakage Iris Searchable Encryption. — IACR Cryptol. ePrint Arch.
- Proof-Carrying Data From Arithmetized Random Oracles. — IACR Cryptol. ePrint Arch.
- SoK: Data Sovereignty. — IACR Cryptol. ePrint Arch.
- SoK: Privacy-Preserving Signatures. — IACR Cryptol. ePrint Arch.
- Taming Adaptivity in YOSO Protocols: The Modular Way. — IACR Cryptol. ePrint Arch.
- TVA: A multi-party computation system for secure and expressive time series analytics. — IACR Cryptol. ePrint Arch.
- ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. — IACR Cryptol. ePrint Arch.
- Isoperimetric Inequalities for Real-Valued Functions with Applications to Monotonicity Testing. — ICALP
- Triangle Counting with Local Edge Differential Privacy. — ICALP
- The Price of Differential Privacy under Continual Observation. — ICML
- Detecting Exception Handling Bugs in C++ Programs. — ICSE
- A Novel Scaffold-Reinforced Actuator With Tunable Attitude Ability for Grasping. — IEEE Trans. Robotics
- SymRustC: A Hybrid Fuzzer for Rust. — ISSTA
- On the Computational Hardness Needed for Quantum Cryptography. — ITCS
- Generalized Linear Models in Non-interactive Local Differential Privacy with Public Data. — J. Mach. Learn. Res.
- Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation. — NeurIPS
- Hypothesis Selection with Memory Constraints. — NeurIPS
- SECRECY: Secure collaborative analytics in untrusted clouds. — NSDI
- Learned Perturbation-Aided Advanced Digital Backpropagation with Nonlinear Compensation Fusion for Subcarrier-Multiplexing Systems. — OFC
- Node-Differentially Private Estimation of the Number of Connected Components. — PODS
- DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection. — Proc. Priv. Enhancing Technol.
- Semi-Quantum Random Number Generation. — QCE
- Verifiable Random Functions (VRFs). — RFC
- Stability Is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. — STOC
- Taming Adaptivity in YOSO Protocols: The Modular Way. — TCC
- Sublinear-Time Computation in the Presence of Online Erasures. — Theory Comput.
- Approximate Degree Lower Bounds for Oracle Identification Problems. — TQC
- Field Reconstruction-Based Non-Rendezvous Calibration for Low Cost Mobile Sensors. — UbiComp/ISWC Adjunct
- Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. — USENIX Security Symposium
- Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning. — USENIX Security Symposium
- TVA: A multi-party computation system for secure and expressive time series analytics. — USENIX Security Symposium