


default search action
Yaxi Yang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j9]Ye Dong
, Xudong Chen
, Xiangfu Song
, Yaxi Yang
, Wen-Jie Lu
, Tianwei Zhang
, Jianying Zhou
, Jin Song Dong
:
Alkaid: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy. IEEE Trans. Inf. Forensics Secur. 21: 640-654 (2026)
[i6]Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu:
Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test. IACR Cryptol. ePrint Arch. 2026: 29 (2026)- 2025
[j8]Yaxi Yang, Xiaojian Liang
, Xiangfu Song, Ye Dong, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou:
Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF. Proc. Priv. Enhancing Technol. 2025(2): 680-696 (2025)
[c5]Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jinsong Dong:
Mizar: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration. ACSAC 2025: 905-921
[c4]Yaxi Yang
, Ivan Christian
, Zeyu Yang
, Jiaqi Yang
, Huibin Wang
, Zheng Yang
, Jianying Zhou
:
AuthPLC: Authenticating PLC Communication Using ST-based Extended Cryptographic Library. CPSS@AsiaCCS 2025: 19-30
[c3]Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu:
VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching. TrustCom 2025: 1895-1904
[i5]Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jin-Song Dong:
MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration. IACR Cryptol. ePrint Arch. 2025: 1063 (2025)
[i4]Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu:
VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching. IACR Cryptol. ePrint Arch. 2025: 1114 (2025)
[i3]Ye Dong, Xiangfu Song, W. j Lu, Xudong Chen, Yaxi Yang, Ruonan Chen, Tianwei Zhang, Jin-Song Dong:
ALIOTH: An Efficient and Secure Weight-of-Evidence Framework for Privacy-Preserving Data Processing. IACR Cryptol. ePrint Arch. 2025: 2188 (2025)
[i2]Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jinsong Dong:
ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy. IACR Cryptol. ePrint Arch. 2025: 2298 (2025)- 2024
[j7]Yaxi Yang
, Jian Weng
, Yao Tong
, Jia-Nan Liu
, Zhenghao Wu
, Leo Yu Zhang
, Anjia Yang
:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. IEEE Trans. Dependable Secur. Comput. 21(2): 961-974 (2024)
[i1]Yaxi Yang, Xiaojian Liang, Xiangfu Song, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou:
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF. IACR Cryptol. ePrint Arch. 2024: 789 (2024)- 2023
[j6]Yaxi Yang
, Yao Tong, Jian Weng
, Yufeng Yi, Yandong Zheng
, Leo Yu Zhang
, Rongxing Lu
:
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data. IEEE Trans. Cloud Comput. 11(3): 2379-2391 (2023)
[j5]Caiqin Dong
, Jian Weng
, Jia-Nan Liu
, Anjia Yang
, Zhiquan Liu
, Yaxi Yang, Jianfeng Ma
:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 20(2): 1243-1257 (2023)
[j4]Lulu Han
, Weiqi Luo
, Yaxi Yang
, Anjia Yang
, Rongxing Lu
, Junzuo Lai, Yandong Zheng
:
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments. IEEE Trans. Serv. Comput. 16(5): 3564-3577 (2023)
[c2]Yaxi Yang, Jian Weng
, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. ACNS 2023: 143-166- 2022
[j3]Yufeng Yi, Wuzheng Tan, Yaxi Yang
:
Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search of large-scale databases. J. Inf. Secur. Appl. 70: 103335 (2022)- 2021
[c1]Yaxi Yang, Hailin Wang, Haiquan Qiu, Jianjun Wang, Yao Wang:
Non-Convex Sparse Deviation Modeling Via Generative Models. ICASSP 2021: 2345-2349
2010 – 2019
- 2019
[j2]Xiaoqian Zhang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yaxi Yang, Min-Rong Chen, Xiaoqing Tan:
A hybrid universal blind quantum computation. Inf. Sci. 498: 135-143 (2019)- 2018
[j1]Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang:
Notes on a provably-secure certificate-based encryption against malicious CA attacks. Inf. Sci. 463-464: 86-91 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-10 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







