selected papers主要論文
- Fuki Yamamoto, Seiichi Ozawa, Lihua Wang, "eFL-Boost: Efficient Federated Learning for Gradient Boosting Decision Trees," IEEE Access Vol.10, pp. 43954-43963 (2022) DOI: 10.1109/ACCESS.2022.3169502
- Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai, "Enhanced Secure Comparison Schemes Using Homomorphic Encryption," NBiS 2020 -Advances in Networked-Based Information Systems: pp. 211-224, Springer (2020)
- Fuki Yamamoto, Lihua Wang, Seiichi Ozawa, "New Approaches to Federated XGBoost Learning for Privacy-Preserving Data Analysis," ICONIP2020-27th International Conference on Neural Information Processing, LNCS 12533, pp.558-569, Springer (2020)
- Lihua Wang, Yoshinori Aono, Le Trieu Phong, "A new secure matrix multiplication from ring-LWE," CANS2017-16th International Conference on Cryptology And Network Security, Presented in Nov. 2017, LNCS 11261, pp. 93-111 (2018)
- Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang, "Securing Named Data Networking: Attribute-Based Encryption and Beyond," IEEE Communications Magazine, Vol. 56, No.11, pp. 76-81 (2018)
- Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai, "Privacy-preserving deep learning via additively homomorphic encryption," IEEE Transactions on Information Forensics and Security, Vol.13, Issue 5, pp.1333 - 1345 (2018) (doi:10.1109/TIFS.2017.2787987)
- Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang, "Efficient homomorphic encryption with key rotation and security update," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E101-A, No.1, pp.39-50 (2018)
- Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong, "A generic yet efficient method for secure inner product," Proceedings of NSS2017- 11th International Conference on Network and System Security, LNCS 10394, pp.217-232, Springer International Publishing (2017)
- Lihua Wang, Takuya Hayashi, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai, "POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity," CCS 2015, pp. 1684-1686, ACM press (2015)
- Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang, "Certificate-based proxy decryption systems with revocability in the standard model," Information Sciences, Vol.247, pp. 188-201 (2013)