default search action
Le Trieu Phong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Le Trieu Phong, Tran Thi Phuong, Lihua Wang, Seiichi Ozawa:
Frameworks for Privacy-Preserving Federated Learning. IEICE Trans. Inf. Syst. 107(1): 2-12 (2024) - [c22]Hajime Ono, Tran Thi Phuong, Le Trieu Phong:
Differentially Private Extreme Learning Machine. MDAI 2024: 165-176 - 2023
- [j25]Tran Thi Phuong, Le Trieu Phong, Kazuhide Fukushima:
Distributed Stochastic Gradient Descent With Compressed and Skipped Communication. IEEE Access 11: 99836-99846 (2023) - [j24]Itaru Kaneko, Le Trieu Phong, Keita Emura, Emi Yuda:
Can Sleep Apnea Be Detected from Human Pulse Waveform with Laplace Noise? J. Adv. Comput. Intell. Intell. Informatics 27(5): 942-947 (2023) - [j23]Le Trieu Phong, Tran Thi Phuong:
Differentially private stochastic gradient descent via compression and memorization. J. Syst. Archit. 135: 102819 (2023) - 2022
- [j22]Sachiko Kanamori, Taeko Abe, Takuma Ito, Keita Emura, Lihua Wang, Shuntaro Yamamoto, Le Trieu Phong, Kaien Abe, Sangwook Kim, Ryo Nojima, Seiichi Ozawa, Shiho Moriai:
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks. J. Inf. Process. 30: 789-795 (2022) - [j21]Tran Thi Phuong, Le Trieu Phong:
Distributed differentially-private learning with communication efficiency. J. Syst. Archit. 128: 102555 (2022) - [j20]Tran Thi Phuong, Le Trieu Phong:
Decentralized Stochastic Optimization With Random Attendance. IEEE Signal Process. Lett. 29: 1322-1326 (2022) - 2021
- [j19]Tran Thi Phuong, Le Trieu Phong:
Communication-Efficient Distributed SGD with Error-Feedback, Revisited. Int. J. Comput. Intell. Syst. 14(1): 1373-1387 (2021) - [j18]Tran Thi Phuong, Le Trieu Phong:
Decentralized Descent Optimization With Stochastic Gradient Signs for Device-to-Device Networks. IEEE Wirel. Commun. Lett. 10(9): 1939-1943 (2021) - 2020
- [j17]Tran Thi Phuong, Le Trieu Phong:
Distributed SGD With Flexible Gradient Compression. IEEE Access 8: 64707-64717 (2020) - [j16]Le Trieu Phong, Tran Thi Phuong:
Distributed SignSGD With Improved Accuracy and Network-Fault Tolerance. IEEE Access 8: 191839-191849 (2020) - [i19]Tran Thi Phuong, Le Trieu Phong:
Communication-Efficient Distributed SGD with Error-Feedback, Revisited. CoRR abs/2003.04706 (2020)
2010 – 2019
- 2019
- [j15]Tran Thi Phuong, Le Trieu Phong:
On the Convergence Proof of AMSGrad and a New Version. IEEE Access 7: 61706-61716 (2019) - [j14]Le Trieu Phong, Tran Thi Phuong:
Privacy-Preserving Deep Learning via Weight Transmission. IEEE Trans. Inf. Forensics Secur. 14(11): 3003-3015 (2019) - [i18]Tran Thi Phuong, Le Trieu Phong:
On the Convergence Proof of AMSGrad and a New Version. CoRR abs/1904.03590 (2019) - 2018
- [j13]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Efficient Homomorphic Encryption with Key Rotation and Security Update. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 39-50 (2018) - [j12]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 13(5): 1333-1345 (2018) - [i17]Le Trieu Phong, Tran Thi Phuong:
Privacy-Preserving Deep Learning for any Activation Function. CoRR abs/1809.03272 (2018) - 2017
- [j11]Kaoru Kurosawa, Le Trieu Phong:
Anonymous and leakage resilient IBE and IPE. Des. Codes Cryptogr. 85(2): 273-298 (2017) - [j10]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Input and Output Privacy-Preserving Linear Regression. IEICE Trans. Inf. Syst. 100-D(10): 2339-2347 (2017) - [j9]Kaoru Kurosawa, Le Trieu Phong:
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. Int. J. Appl. Cryptogr. 3(3): 210-224 (2017) - [c21]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning: Revisited and Enhanced. ATIS 2017: 100-110 - [c20]Lihua Wang, Yoshinori Aono, Le Trieu Phong:
A New Secure Matrix Multiplication from Ring-LWE. CANS 2017: 93-111 - [c19]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption. SCC@AsiaCCS 2017: 35-42 - [c18]Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong:
A Generic yet Efficient Method for Secure Inner Product. NSS 2017: 217-232 - [c17]Le Trieu Phong:
Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers. NSS 2017: 510-518 - [c16]Shohei Kuri, Takuya Hayashi, Toshiaki Omori, Seiichi Ozawa, Yoshinori Aono, Le Trieu Phong, Lihua Wang, Shiho Moriai:
Privacy preserving extreme learning machine using additively homomorphic encryption. SSCI 2017: 1-8 - [i16]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 715 (2017) - 2016
- [j8]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption. IEICE Trans. Inf. Syst. 99-D(8): 2079-2089 (2016) - [c15]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. CODASPY 2016: 142-144 - [i15]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 111 (2016) - [i14]Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen:
Proxy Re-Encryption Schemes with Key Privacy from LWE. IACR Cryptol. ePrint Arch. 2016: 327 (2016) - 2015
- [j7]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 232-245 (2015) - [c14]Kaoru Kurosawa, Le Trieu Phong:
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. ACISP 2015: 145-159 - [c13]Keita Emura, Le Trieu Phong, Yohei Watanabe:
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability. TrustCom/BigDataSE/ISPA (1) 2015: 167-174 - [i13]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Fast and Secure Linear Regression and Biometric Authentication with Security Update. IACR Cryptol. ePrint Arch. 2015: 692 (2015) - [i12]Yoshinori Aono, Le Trieu Phong, Lihua Wang:
Hardness Estimation of LWE via Band Pruning. IACR Cryptol. ePrint Arch. 2015: 1026 (2015) - 2014
- [j6]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 215-224 (2014) - [c12]Kaoru Kurosawa, Le Trieu Phong:
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. AFRICACRYPT 2014: 51-68 - 2013
- [j5]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New leakage-resilient CCA-secure public key encryption. J. Math. Cryptol. 7(4): 297-312 (2013) - [c11]Kaoru Kurosawa, Le Trieu Phong:
Leakage Resilient IBE and IPE under the DLIN Assumption. ACNS 2013: 487-501 - [c10]Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang:
Key-Private Proxy Re-encryption under LWE. INDOCRYPT 2013: 1-18 - [i11]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
UC-Secure Multi-Session OT Using Tamper-Proof Hardware. IACR Cryptol. ePrint Arch. 2013: 77 (2013) - [i10]Kaoru Kurosawa, Le Trieu Phong:
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. IACR Cryptol. ePrint Arch. 2013: 765 (2013) - 2012
- [j4]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Undeniable and Unpretendable Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 138-150 (2012) - [c9]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. ACISP 2012: 235-246 - [i9]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. IACR Cryptol. ePrint Arch. 2012: 213 (2012) - [i8]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New Leakage Resilient CCA-Secure Public Key Encryption. IACR Cryptol. ePrint Arch. 2012: 453 (2012) - 2011
- [c8]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. ACNS 2011: 274-291 - [i7]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. IACR Cryptol. ePrint Arch. 2011: 382 (2011) - [i6]Kaoru Kurosawa, Le Trieu Phong:
Maximum Leakage Resilient IBE and IPE. IACR Cryptol. ePrint Arch. 2011: 628 (2011) - 2010
- [j3]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 63-75 (2010) - [c7]Le Trieu Phong, Shin'ichiro Matsuo, Moti Yung:
Leakage Resilient Strong Key-Insulated Signatures in Public Channel. INTRUST 2010: 160-172 - [c6]Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata:
A Framework for Constructing Convertible Undeniable Signatures. ProvSec 2010: 70-86 - [c5]Shin'ichiro Matsuo, Le Trieu Phong, Miyako Ohkubo, Moti Yung:
Leakage-Resilient RFID Authentication with Forward-Privacy. RFIDSec 2010: 176-188 - [c4]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. SCN 2010: 172-181 - [c3]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. SCN 2010: 291-308 - [i5]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. IACR Cryptol. ePrint Arch. 2010: 327 (2010)
2000 – 2009
- 2009
- [j2]Le Trieu Phong, Wakaha Ogata:
New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1822-1835 (2009) - [c2]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. AFRICACRYPT 2009: 116-134 - [i4]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. IACR Cryptol. ePrint Arch. 2009: 394 (2009) - 2008
- [c1]Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata:
Stateful identity-based encryption scheme: faster encryption and decryption. AsiaCCS 2008: 381-388 - [i3]Le Trieu Phong, Wakaha Ogata:
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption. IACR Cryptol. ePrint Arch. 2008: 327 (2008) - 2007
- [j1]Le Trieu Phong, Wakaha Ogata:
On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 226-230 (2007) - 2006
- [i2]Le Trieu Phong, Wakaha Ogata:
On a Variation of Kurosawa-Desmedt Encryption Scheme. IACR Cryptol. ePrint Arch. 2006: 31 (2006) - [i1]Le Trieu Phong, Wakaha Ogata:
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model. IACR Cryptol. ePrint Arch. 2006: 173 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint