- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0004000001000000
- More
- Availability
-
50
- Author / Contributor
- Filter by Author / Creator
-
-
Tu, Fengbin (5)
-
Xie, Yuan (5)
-
Ding, Yufei (4)
-
Qu, Zheng (4)
-
Liang, Ling (3)
-
Liu, Liu (3)
-
Ahmad, Ishtiyaque (2)
-
Gupta, Trinabh (2)
-
Lin, Jilan (2)
-
Amrouch, Hussam (1)
-
Chakraborty, Indranil (1)
-
Chen, Jian-Jia (1)
-
Chen, Zhaodong (1)
-
Deng, Lei (1)
-
Gu, Zhenyu (1)
-
Hu, Xing (1)
-
Huangfu, Wenqin Huangfu (1)
-
Li, Shuangchen (1)
-
Roy, Kaushik (1)
-
Wang, Cheng (1)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Many relational data in our daily life are represented as graphs, making graph application an important workload. Because of the large scale of graph datasets, moving graph data to the cloud becomes a popular option. To keep the confidential and private graph secure from an untrusted cloud server, many cryptographic techniques are leveraged to hide the content of the data. However, protecting only the data content is not enough for a graph database. Because the structural information of the graph can be revealed through the database accessing track. In this work, we study the graph neural network (GNN), an important graph workload to mine information from a graph database. We find that the server is able to infer which node is processing during the edge retrieving phase and also learn its neighbor indices during GNN's aggregation phase. This leads to the leakage of the information of graph structure data. In this work, we present SPG, a structure-private graph database with SqueezePIR. Our SPG is built on top of Private Information Retrieval (PIR), which securely hides which nodes/neighbors are accessed. In addition, we propose SqueezePIR, a compression technique to overcome the computation overhead of PIR. Based on our evaluation, our SqueezePIR achieves 11.85× speedup on average with less than 2% accuracy loss when compared to the state-of-the-art FastPIR protocol.more » « less
-
Qu, Zheng; Liu, Liu; Tu, Fengbin; Chen, Zhaodong; Ding, Yufei; Xie, Yuan (, Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems)
-
Lin, Jilan; Liang, Ling; Qu, Zheng; Ahmad, Ishtiyaque; Liu, Liu; Tu, Fengbin; Gupta, Trinabh; Ding, Yufei; Xie, Yuan (, Proceedings of the 49th Annual International Symposium on Computer Architecture)
-
Liu, Liu; Qu, Zheng; Deng, Lei; Tu, Fengbin; Li, Shuangchen; Hu, Xing; Gu, Zhenyu; Ding, Yufei; Xie, Yuan (, Proceedings Article published Oct 2020 in 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO))null (Ed.)
-
Amrouch, Hussam; Chen, Jian-Jia; Roy, Kaushik; Xie, Yuan; Chakraborty, Indranil; Huangfu, Wenqin Huangfu; Liang, Ling; Tu, Fengbin; Wang, Cheng; Yayla, Mikail (, 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD))
An official website of the United States government

Full Text Available