David Wu
David Wu
Verified email at virginia.edu - Homepage
Title
Cited by
Cited by
Year
End-to-End Text Recognition with Convolutional Neural Networks
T Wang, DJ Wu, A Coates, AY Ng
Pattern Recognition (ICPR), 2012 21st International Conference on, 3304-3308, 2012
8112012
Deep learning with COTS HPC systems
A Coates, B Huval, T Wang, DJ Wu, B Catanzaro, N Andrew
Proceedings of the 30th International Conference on Machine Learning (ICML …, 2013
7282013
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning
A Coates, B Carpenter, C Case, S Satheesh, B Suresh, T Wang, DJ Wu, ...
Document Analysis and Recognition (ICDAR), 2011 International Conference on …, 2011
4332011
Private Database Queries Using Somewhat Homomorphic Encryption
D Boneh, C Gentry, S Halevi, F Wang, DJ Wu
Applied Cryptography and Network Security, 102-118, 2013
1882013
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
K Lewi, DJ Wu
ACM Conference on Computer and Communications Security (CCS), 2016
1242016
Practical Order-Revealing Encryption with Limited Leakage
N Chenette, K Lewi, SA Weis, DJ Wu
Proceedings of the 23rd International Conference on Fast Software Encryption …, 2016
1172016
Privately Evaluating Decision Trees and Random Forests
DJ Wu, T Feng, M Naehrig, K Lauter
Proceedings on Privacy Enhancing Technologies 2016 (4), 2015
942015
Immunizing Multilinear Maps Against Zeroizing Attacks
D Boneh, DJ Wu, J Zimmerman
862014
Deriving genomic diagnoses without revealing patient genomes
KA Jagadeesh, DJ Wu, JA Birgmeier, D Boneh, G Bejerano
Science 357 (6352), 692-695, 2017
632017
Function-Hiding Inner Product Encryption is Practical
S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
International Conference on Security and Cryptography for Networks (SCN), 2016
552016
Secure genome-wide association analysis using multiparty computation
H Cho, DJ Wu, B Berger
Nature biotechnology 36 (6), 547-551, 2018
542018
Privacy, discovery, and authentication for the Internet of Things
DJ Wu, A Taly, A Shankar, D Boneh
European Symposium on Research in Computer Security, 301-319, 2016
502016
Constraining Pseudorandom Functions Privately
D Boneh, K Lewi, DJ Wu
Public-Key Cryptography – PKC 2017, 2015
472015
Lattice-based SNARGs and their application to more efficient obfuscation
D Boneh, Y Ishai, A Sahai, DJ Wu
Annual International Conference on the Theory and Applications of …, 2017
422017
Privacy-Preserving Shortest Path Computation
DJ Wu, J Zimmerman, J Planul, JC Mitchell
arXiv preprint arXiv:1601.02281, 2016
422016
Multi-theorem preprocessing NIZKs from lattices
S Kim, DJ Wu
Journal of Cryptology, 1-84, 2019
352019
Watermarking cryptographic functionalities from standard lattice assumptions
S Kim, DJ Wu
Annual International Cryptology Conference, 503-536, 2017
312017
Using homomorphic encryption for large scale statistical analysis
D Wu, J Haven
282012
Quasi-optimal snargs via linear multi-prover interactive proofs
D Boneh, Y Ishai, A Sahai, DJ Wu
Annual International Conference on the Theory and Applications of …, 2018
222018
New Constructions of Reusable Designated-Verifier NIZKs
A Lombardi, W Quach, RD Rothblum, D Wichs, DJ Wu
182019
The system can't perform the operation now. Try again later.
Articles 1–20