Publications
Some slides are in keynote format.
Articles in refereed conferences
- Large-Scale Private Set Intersection in the Client-Server Setting
Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2024
Report - Leakage-Resilient Circuit Garbling
Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2024
Report - Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, and Xiao Wang
In IEEE Symposium on Security and Privacy (S&P), 2024
Report - Scalable Mixed-Mode MPC
Radhika, Kang Yang, Jonathan Katz, and Xiao Wang
In IEEE Symposium on Security and Privacy (S&P), 2024
Report - ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, and Ning Luo
In USENIX Security, 2024
Report - Lightweight Authentication of Web Data via Garble-Then-Prove
Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu
In USENIX Security, 2024
Report - The Hardness of LPN over Any Integer Ring and Field for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang, and Yu Yu
In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2024
Report - Nimbus: Secure and Efficient Two-Party Inference for Transformers
Zhengyi Li, Kang Yang, Jin Tan, Wen-jie Lu, Haoqi Wu, Xiao Wang, Yu Yu, Derun Zhao, Yancheng Zheng, Minyi Guo, and Jingwen Leng
In Conference on Neural Information Processing Systems (NeurIPS), 2024
Report - TrustLLM: Trustworthiness in Large Language Models
Lichao Sun, Yue Huang, Haoran Wang, et al.
In International Conference on Machine Learning (ICML), 2024
Report - Confidential-DPproof: Confidential Proof of Differentially Private Training
Ali Shahin Shamsabadi, Gefei Tan, Tudor Ioan Cebere, Aurelien Bellet, Hamed Haddadi, Nicolas Papernot, Xiao Wang, and Adrian Weller
In International Conference on Learning Representations (ICLR), 2024
Report
spotlight (5%) - Ou: Automating the Parallelization of Zero-Knowledge Protocols
Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, and Zhong Shao
In ACM Conference on Computer and Communications Security (CCS), 2023
Report - Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
Hongrui Cui, Xiao Wang, Kang Yang, and Yu Yu
In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2023
Report - Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2023
Report - Confidential-PROFITT: Confidential PROof of FaIr Training of Trees
Ali Shahin Shamsabadi, Sierra Calanda Wyllie, Olive Franzese, Natalie Dullerud, Sébastien Gambs, Nicolas Papernot, Xiao Wang, and Adrian Weller
In International Conference on Learning Representations (ICLR), 2023
Report
notable-top-5% - Deja Vu: Continual Model Generalization for Unseen Domains
Chenxi Liu, Lixu Wang, Lingjuan Lyu, Chen Sun, Xiao Wang, and Qi Zhu
In International Conference on Learning Representations (ICLR), 2023
Report - Robust and Actively Secure Serverless Collaborative Learning
Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, and Xiao Wang
In Conference on Neural Information Processing Systems (NeurIPS), 2023
Report - Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, and Xiao Wang
International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2023
Report - Proving UNSAT in Zero Knowledge
Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2022
Report Code
CCS Distinguished Paper Award - AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2022
Report - Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
Kang Yang and Xiao Wang
In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2022
Report - Triply Adaptive UC NIZK
Ran Canetti, Pratik Sarkar, and Xiao Wang
In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2022
Report - ppSAT: Towards Two-Party Private SAT Solving
Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, and Xiao Wang
In USENIX Security, 2022
Report Code - Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang, Shichao Xu, Ruiqi Xu, Xiao Wang, and Qi Zhu
In International Conference on Learning Representations (ICLR), 2022
Report Code
oral presentation - Federated Class-Incremental Learning
Jiahua Dong, Lixu Wang, Zhen Fang, Gan Sun, Shichao Xu, Xiao Wang, and Qi Zhu
In the Conference on Computer Vision and Pattern Recognition (CVPR), 2022
Report - Constant-Overhead Zero-Knowledge for RAM Programs
Olive Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, and Chenkai Weng
In ACM Conference on Computer and Communications Security (CCS), 2021
Report Code - Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang
In USENIX Security, 2021
Report Code - QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang, Pratik Sarkar, Chenkai Weng, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2021
Report Code
CCS Best Paper Award runner up - Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng, Kang Yang, Jonathan Katz, and Xiao Wang
In IEEE Symposium on Security and Privacy (S&P), 2021
Report - CaPC Learning: Confidential and Private Collaborative Learning
Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, and Xiao Wang
In International Conference on Learning Representations (ICLR), 2021
Report Code - Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification
Xiao Dong, David Randolph, Chenkai Weng, Abel Kho, Jennie Rogers, and Xiao Wang
In American Medical Informatics Association Informatics Summit (AMIA), 2021
Report - Addressing Class Imbalance in Federated Learning
Lixu Wang, Shichao Xu, Xiao Wang, and Qi Zhu
In AAAI Conference on Artificial Intelligence (AAAI), 2021
Report - Ferret: Fast Extension for coRRElated oT with small communication
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2020
Report Code - More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang, Xiao Wang, and Jiang Zhang
In ACM Conference on Computer and Communications Security (CCS), 2020
Report - Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti, Pratik Sarkar, and Xiao Wang
In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2020
Report - Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, and Yu Yu
In International Cryptology Conference (CRYPTO), 2020
Report Code - Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo, Jonathan Katz, Xiao Wang, and Yu Yu
In IEEE Symposium on Security and Privacy (S&P), 2020
Report Code - Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti, Pratik Sarkar, and Xiao Wang
In Public-Key Cryptography (PKC), 2020
Report - Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, and Xiao Wang
In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2019
Report Code - Covert Security with Public Verifiability: Faster, Leaner, and Simpler
Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, and Xiao Wang
In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
Report Code - Secure Computation with Low Communication from Cross-checking
S. Dov Gordon, Samuel Ranellucci, and Xiao Wang
In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2018
Report - Simple and Efficient Two-Server ORAM
Dov Gordon, Jonathan Katz, and Xiao Wang
In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2018
Report - Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Jonathan Katz, Vladimir Kolesnikov, and Xiao Wang
In ACM Conference on Computer and Communications Security (CCS), 2018
Report - Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
Jonathan Katz, Samuel Ranellucci, Mike Rosulek, and Xiao Wang
In International Cryptology Conference (CRYPTO), 2018
Report - Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Xiao Wang, Samuel Ranellucci, and Jonathan Katz
In ACM Conference on Computer and Communications Security (CCS), 2017
Report Code Slides
CCS Best Paper Award - Global-Scale Secure Multi-Party Computation
Xiao Wang, Samuel Ranellucci, and Jonathan Katz
In ACM Conference on Computer and Communications Security (CCS), 2017
Report Code Slides - Faster Secure Two-Party Computation in the Single-Execution Setting
Xiao Wang, Alex J. Malozemoff, and Jonathan Katz
In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
Report Code Slides - Secure Computation of MIPS Machine Code
Xiao Wang, S. Dov Gordon, Allen McIntosh, and Jonathan Katz
In European Symposium on Research in Computer Security (ESORICS), 2016
Report Code Slides - Revisiting Square Root ORAM: Efficient Random Access in Multi-Party Computation
Samee Zahur, Xiao Wang, Mariana Raykova, Adria Gascon, Jack Doerner, David Evans, and Jonathan Katz
In IEEE Symposium on Security and Privacy (S&P), 2016
Report Code - Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance
Xiao Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, and Diyue Bu
In ACM Conference on Computer and Communications Security (CCS), 2015
Report Code Slides - Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang, T-H. Hubert Chan, and Elaine Shi
In ACM Conference on Computer and Communications Security (CCS), 2015
Report Code Slides - ObliVM: A Programming Framework for Secure Computation
Chang Liu, Xiao Wang, Kartik Nayak, Yan Huang, and Elaine Shi
In IEEE Symposium on Security and Privacy (S&P), 2015
Report Backend code Frontend code
1st place in NYU-Poly CSAW Applied Security Research Best Paper Competition - GraphSC: Parallel Secure Computation Made Easy
Kartik Nayak, Xiao Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, and Elaine Shi
In IEEE Symposium on Security and Privacy (S&P), 2015
Report Code - SCORAM: Oblivious RAM for Secure Computation
Xiao Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, and Elaine Shi
In ACM Conference on Computer and Communications Security (CCS), 2014
Report Code Slides - Oblivious Data Structures
Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang
In ACM Conference on Computer and Communications Security (CCS), 2014
Report
Finalist in NYU-Poly CSAW Applied Security Research Best Paper Competition
Journal articles
- OPCA: Enabling Optimistic Concurrent Access for Multiple Users in Oblivious Data Storage
Yuezhi Che, Dazhao Cheng, Xiao Wang, and Rujia Wang
In Transactions on Parallel and Distributed Systems (TPDS), 2024
Report - The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
In ACM Transactions on Privacy and Security, 2023
Report - SoK: Vector OLE-Based Zero-Knowledge Protocols
Carsten Baum, Samuel Dittmer, Peter Scholl, and Xiao Wang
In Designs, Codes and Cryptography, 2023
Report - ZKSQL: Verifiable and Efficient Query Evaluation with Zero-Knowledge Proofs
Xiling Li, Chenkai Weng, Yongxin Xu, Xiao Wang, and Jennie Rogers
In Proceedings of the VLDB Endowment (PLVDB), 2023
Report - Private Multi-Winner Voting for Machine Learning
Adam Dziedzic, Christopher A. Choquette-Choo, Natalie Dullerud, Vinith Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, and Xiao Wang
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2023
Report - Efficient and Secure Quantile Aggregation of Private Data Streams
Xiao Lan, Hongjian Jin, Hui Guo, and Xiao Wang
IEEE Transactions on Information Forensics and Security (TIFS), 2023
Report - Provable Security of SP Networks with Partial Non-Linear Layers
Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, and Yu Yu
In IACR Transactions on Symmetric Cryptology (ToSC), 2021
Report - SAQE: Practical Privacy-Preserving Approximate Query Processing for Data Federations
Johes Bater, Yongjoo Park, Xi He, Xiao Wang, and Jennie Rogers
In Proceedings of the VLDB Endowment (PLVDB), 2020
Report - Privacy-Preserving Microbiome Analysis Using Secure Computation
Justin Wagner, Joseph N. Paulson, Xiao Wang, Bobby Bhattacharjee, and Hector Corrada Bravo
In Bioinformatics, 2016
Report Code
Workshop, Demo, Tutorial, and Book Chapters
- RESCU-SQL: Oblivious Querying for the Zero Trust Cloud
Xiling Li, Gefei Tan, Xiao Wang, Jennie Rogers, and Soamar Homsi
In Proceedings of the VLDB Endowment (PLVDB), 2023
Demo - Oblivious Data Structures
Xiao Wang
In Encyclopedia of Cryptography, Security and Privacy
Book Chapter - VaultDB: Facilitating Secure Analytics over Multiple Private Data Sources
Xiao Wang, Jennie Rogers
Workshop on Privacy Enhancing Technologies for the Homeland Security Enterprise, 2022
Report - Practical Security and Privacy for Database Systems
Xi He, Jennie Rogers, Johes Bater, Ashwin Machanvajjhala, Chenghong Wang, and Xiao Wang.
In ACM International Conference on Management of Data (SIGMOD), 2021
Tutorial - Privacy Changes Everything
Jennie Rogers, Johes Bater, Xi He, Ashwin Machanavajjhala, Madhav Suresh, and Xiao Wang
In POLY Workshop at VLDB, 2019
Report
Other Manuscripts
- Unmodified Half-Gates is Adaptively Secure
Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu
Report - VaultDB: A Real-World Pilot of Secure Multi-Party Computation within a Clinical Research Network
Jennie Rogers, Elizabeth Adetoro, Johes Bater, Talia Canter, Dong Fu, Andrew Hamilton, Amro Hassan, Ashley Martinez, Erick Michalski, Vesna Mitrovic, Fred Rachman, Raj Shah, Matt Sterling, Kyra VanDoren, Theresa L. Walunas, Xiao Wang, and Abel Kho
Report - Secure Machine Learning over Relational Data
Qiyao Luo, Yilei Wang, Zhenghang Ren, Ke Yi, Kai Chen, and Xiao Wang
Report - Eavesdrop the Composition Proportion of Training Labels in Federated Learning
Lixu Wang, Shichao Xu, Xiao Wang, and Qi Zhu
Report - Efficiently Enforcing Input Validity in Secure Two-party Computation
Jonathan Katz, Alex J. Malozemoff, and Xiao Wang
Report Code