generated by bibbase.org
  2026 (10)
From Easy to Hard++: Promoting Differentially Private Image Synthesis Through Spatial-Frequency Curriculum. Chen Gong; Kecen Li; Zinan Lin; and Tianhao Wang. In USENIX Security, 2026.
bibtex  
Distributed Synthesis of Differentially Private Tabular Datasets. Yucheng Fu; Tianyao Gu; Elaine Shi; and Tianhao Wang. In USENIX Security, 2026.
bibtex  
HeteroFedSyn: Differentially Private Tabular Data Synthesis for Heterogeneous Federated Settings. Xiaochen Li; Xizixiang Wei; Fengyu Gao; Tianhao Wang; Cong Shen; and Jing Yang. SIGMOD. 2026.
bibtex  
Benchmarking Differentially Private Tabular Data Synthesis [Experiments & Analysis]. Kai Chen; Xiaochen Li; Chen Gong; Ryan McKenna; and Tianhao Wang. SIGMOD. 2026.
bibtex  
PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning. Chen Gong; Kecen Li; Zheng Liu; and Tianhao Wang. In NDSS, 2026.
bibtex  
PrivCode: When Code Synthesis Meets Differential Privacy. Zheng Liu; Chen Gong; Terry Yue Zhuo; Kecen Li; Weichen Yu; Matt Fredrikson; and Tianhao Wang. In NDSS, 2026.
bibtex  
ExpShield: Safeguarding Web Text from Unauthorized Crawling and LLM Exploitation. Ruixuan Liu; Toan Tran; Tianhao Wang; Hongsheng Hu; Shuo Wang; and Li Xiong. In NDSS, 2026.
bibtex  
Revisiting Differentially Private Hyper-parameter Tuning. Zihang Xiang; Tianhao Wang; Chenglong Wang; and Di Wang. In NDSS, 2026.
bibtex  
Paladin: Defending LLM-enabled Phishing Emails with a New Trigger-Tag Paradigm. Yan Pang; Wenlong Meng; Xiaojing Liao; and Tianhao Wang. In NDSS, 2026.
bibtex  
Differentially Private Wireless Federated Learning Using Orthogonal Sequences. Xizixiang Wei; Tianhao Wang; Ruiquan Huang; Cong Shen; Jing Yang; and Vincent Poor. IEEE Transactions on Information Theory. 2026.
bibtex  
  2025 (10)
DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis. Chen Gong; Kecen Li; Zinan Lin; and Tianhao Wang. In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2025.
bibtex  
From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis. Kecen Li; Chen Gong; Xiaochen Li; Yuzhong Zhao; Xinwen Hou; and Tianhao Wang. In 2025 IEEE Symposium on Security and Privacy (SP), 2025. IEEE Computer Society
bibtex  
Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run. Zihang Xiang; Tianhao Wang; and Di Wang. In USENIX Security, 2025.
bibtex  
Data-adaptive Differentially Private Prompt Synthesis for In-Context Learning. Fengyu Gao; Ruida Zhou; Tianhao Wang; Cong Shen; and Jing Yang. In ICLR, 2025.
bibtex  
White-box membership inference attacks against diffusion models. Yan Pang; Tianhao Wang; Xuhui Kang; Mengdi Huai; and Yang Zhang. PETS. 2025.
bibtex  
Revisiting EM-based Estimation for Locally Differentially Private Protocols. Yutong Ye; Tianhao Wang; Min Zhang; and Dengguo Feng. In NDSS, 2025.
bibtex  
TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents. Chen Gong; Kecen Li; Jin Yao; and Tianhao Wang. In NDSS, 2025.
bibtex  
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models. Yan Pang; and Tianhao Wang. In NDSS, 2025.
bibtex  
Towards Understanding Unsafe Video Generation. Yan Pang; Aiping Xiong; Yang Zhang; and Tianhao Wang. In NDSS, 2025.
bibtex  
Delay-allowed Differentially Private Data Stream Release. Xiaochen Li; Zhan Qin; Kui Ren; Chen Gong; Shuya Feng; Yuan Hong; and Tianhao Wang. In NDSS, 2025.
bibtex  
  2024 (12)
SPAS: Continuous Release of Data Streams under w-Event Differential Privacy. Xiaochen Li; Tianyu Li; Yitian Cheng; Chen Gong; Zhan Qin; Kui Ren; and Tianhao Wang. In SIGMOD, 2024.
bibtex  
NetDPSyn: Synthesizing Network Traces under Differential Privacy. Danyu Sun; Joann Qiongna Chen; Chen Gong; Tianhao Wang; and Zhou Li. In Proceedings of the ACM Internet Measurement Conference (IMC), 2024.
bibtex  
Handbook of Sharing Confidential Data: Differential Privacy, Secure Multiparty Computation, and Synthetic Data. Jörg Drechsler; Daniel Kifer; Jerome Reiter; and Aleksandra Slavković. CRC Press, 2024.
bibtex  
Machine Unlearning of Pre-trained Large Language Models. Jin Yao; Eli Chien; Minxin Du; Xinyao Niu; Tianhao Wang; Zezhou Cheng; and Xiang Yue. In ACL, 2024.
bibtex  
Benchmarking Secure Sampling Protocols for Differential Privacy. Yucheng Fu; and Tianhao Wang. In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2024.
bibtex  
PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps. Ruixuan Liu; Tianhao Wang; Yang Cao; and Li Xiong. In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2024.
bibtex  
Towards Certified Unlearning for Deep Neural Networks. Binchi Zhang; Yushun Dong; Tianhao Wang; and Jundong Li. In Forty-first International Conference on Machine Learning, 2024.
bibtex  
Backdoor attacks via machine unlearning. Zihao Liu; Tianhao Wang; Mengdi Huai; and Chenglin Miao. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 38, pages 14115–14123, 2024.
bibtex  
PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining. Kecen Li; Chen Gong; Zhixiang Li; Yuzhong Zhao; Xinwen Hou; and Tianhao Wang. In USENIX Security, 2024.
bibtex  
Preserving Node-level Privacy in Graph Neural Networks. Zihang Xiang; Tianhao Wang; and Di Wang. In 2024 IEEE Symposium on Security and Privacy (SP), 2024. IEEE Computer Society
bibtex  
BAFFLE: Hiding Backdoors in Offline Reinforcement Learning Datasets. Chen Gong; Zhou Yang; Yunpeng Bai; Jieke Shi; Junda He; Kecen Li; Bowen Xu; Sinha Arunesh; Xinwen Hou; David Lo; and others. In 2024 IEEE Symposium on Security and Privacy (SP), 2024. IEEE Computer Society
bibtex  
Edge-Protected Triangle Count Estimation under Relationship Local Differential Privacy. Yuhan Liu; Tianhao Wang; Yixuan Liu; Hong Chen; and Cuiping Li. IEEE Transactions on Knowledge and Data Engineering. 2024.
bibtex  
  2023 (12)
Does Differential Privacy Impact Bias in Pretrained Language Models?. Md Khairul Islam; Andrew Wang; Tianhao Wang; Yangfeng Ji; Judy Fox; and Jieyu Zhao. Data Engineering,125. 2023.
bibtex  
GlucoSynth: Generating Differentially-Private Synthetic Glucose Traces. Josephine Lamp; Mark Derdzinski; Christopher Hannemann; Joost Linden; Lu Feng; Tianhao Wang; and David Evans. Advances in neural information processing systems. 2023.
bibtex  
Differentially Private Resource Allocation. Joann Qiongna Chen; Tianhao Wang; Zhikun Zhang; Yang Zhang; Somesh Jha; and Zhou Li. In Proceedings of the 39th Annual Computer Security Applications Conference, 2023.
bibtex   26 downloads  
Mitigating Membership Inference Attacks via Weighted Smoothing. Mingtian Tan; Xiaofei Xie; Jun Sun; and Tianhao Wang. In Proceedings of the 39th Annual Computer Security Applications Conference, 2023.
bibtex   15 downloads  
Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. Chengkun Wei; Ruijing Yu; Yuan Fan; Wenzhi Chen; and Tianhao Wang. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023.
bibtex   26 downloads  
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. Minxin Du; Xiang Yue; Sherman Chow; Tianhao Wang; Chenyu Huang; and Huan Sun. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023.
bibtex  
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. Boyang Zhang; Xinlei He; Yun Shen; Tianhao Wang; and Yang Zhang. In USENIX Security, 2023.
bibtex  
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. Haiming Wang; Zhikun Zhang; Tianhao Wang; Shibo He; Michael Backes; Jiming Chen; and Yang Zhang. In USENIX Security, 2023.
bibtex  
FACE-AUDITOR: Data Auditing in Facial Recognition Systems. Min Chen; Zhikun Zhang; Tianhao Wang; Michael Backes; and Yang Zhang. In USENIX Security, 2023.
bibtex  
Practical Differentially Private and Byzantine-resilient Federated Learning. Zihang Xiang; Tianhao Wang; Wanyu Lin; and Di Wang. Proceedings of the ACM on Management of Data, 1(2): 1–26. 2023.
bibtex  
Differentially Private Vertical Federated Clustering. Zitao Li; Tianhao Wang; and Ninghui Li. Proceedings of the VLDB Endowment, 16(6): 1277–1290. 2023.
bibtex  
Exploring Use of Explanative Illustrations to Communicate Differential Privacy Models. Aiping Xiong; Chuhao Wu; Tianhao Wang; Robert W Proctor; Jeremiah Blocki; Ninghui Li; and Somesh Jha. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 67, pages 226–232, 2023. SAGE Publications Sage CA: Los Angeles, CA
bibtex  
  2022 (6)
An Empirical Analysis of Memorization in Fine-tuned Autoregressive Language Models. Fatemehsadat Mireshghallah; Archit Uniyal; Tianhao Wang; David Evans; and Taylor Berg-Kirkpatrick. In Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022.
bibtex  
Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?. Rui Wen; Zhengyu Zhao; Zhuoran Liu; Michael Backes; Tianhao Wang; and Yang Zhang. In The Eleventh International Conference on Learning Representations, 2022.
bibtex  
Federated boosted decision trees with differential privacy. Samuel Maddock; Graham Cormode; Tianhao Wang; Carsten Maple; and Somesh Jha. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pages 2249–2263, 2022.
bibtex  
Graph Unlearning. Min Chen; Zhikun Zhang; Tianhao Wang; Michael Backes; Mathias Humbert; and Yang Zhang. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022.
bibtex  
Drivers and Passengers May be the Weakest Link in the CAV Data Privacy Defenses. Aiping Xiong; Zekun Cai; and Tianhao Wang. . 2022.
bibtex  
Locally differentially private sparse vector aggregation. Mingxun Zhou; Tianhao Wang; TH Hubert Chan; Giulia Fanti; and Elaine Shi. In 2022 IEEE Symposium on Security and Privacy (SP), pages 422–439, 2022. IEEE
bibtex  
  2021 (10)
Communicating Differential Privacy Models by Illustrations: A Survey and In-Depth Interview Study. Chuhao Wu; Tianhao Wang; Robert W Proctor; Ninghui Li; Jeremiah Blocki; and Aiping Xiong. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 65, pages 1494–1494, 2021. SAGE Publications Sage CA: Los Angeles, CA
bibtex  
MGD: A Utility Metric for Private Data Publication. Zitao Li; Trung Dang; Tianhao Wang; and Ninghui Li. In 8th International Conference on Networking, Systems and Security, pages 106–119, 2021.
bibtex  
Analyzing Sensitive Data with Local Differential Privacy. Tianhao Wang. Ph.D. Thesis, Purdue University Graduate School, 2021.
bibtex  
Pure: A framework for analyzing proximity-based contact tracing protocols. Fabrizio Cicala; Weicheng Wang; Tianhao Wang; Ninghui Li; Elisa Bertino; Faming Liang; and Yang. ACM Computing Surveys (CSUR), 55(1): 1–36. 2021.
bibtex  
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. Tianhao Wang; Ninghui Li; and Zhikun Zhang. Journal of Privacy and Confidentiality, 11(2). 2021.
bibtex  
Differential Privacy for Text Analytics via Natural Text Sanitization. Xiang Yue; Minxin Du; Tianhao Wang; Yaliang Li; Huan Sun; and Sherman SM Chow. In Findings, ACL-IJCNLP 2021, 2021.
bibtex  
Continuous release of data streams under both centralized and local differential privacy. Tianhao Wang; Joann Qiongna Chen; Zhikun Zhang; Dong Su; Yueqiang Cheng; Zhou Li; Ninghui Li; and Somesh Jha. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages 1237–1253, 2021.
bibtex  
When machine unlearning jeopardizes privacy. Min Chen; Zhikun Zhang; Tianhao Wang; Michael Backes; Mathias Humbert; and Yang Zhang. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages 896–911, 2021.
bibtex  
PrivSyn: Differentially private data synthesis. Zhikun Zhang; Tianhao Wang; Ninghui Li; Jean Honorio; Michael Backes; Shibo He; Jiming Chen; and Yang Zhang. In USENIX Security, 2021.
bibtex  
2020 Differential Privacy Temporal Map Challenge. NIST. Available at ˘rlhttps://www.nist.gov/ctl/pscr/open-innovation-prize-challenges/current-and-upcoming-prize-challenges/2020-differential, 2021.
bibtex  
  2020 (8)
Answering multi-dimensional range queries under local differential privacy. Jianyu Yang; Tianhao Wang; Ninghui Li; Xiang Cheng; and Sen Su. Proceedings of the VLDB Endowment, 14(3): 378–390. 2020.
bibtex  
Improving Utility and Security of the Shuffler-based Differential Privacy. Tianhao Wang; Bolin Ding; Min Xu; Zhicong Huang; Cheng Hong; Jingren Zhou; Ninghui Li; and Somesh Jha. Proceedings of the VLDB Endowment, 13(13): 3545 - 3558. 2020.
bibtex  
Collecting and analyzing data jointly from multiple services under local differential privacy. Min Xu; Bolin Ding; Tianhao Wang; and Jingren Zhou. Proceedings of the VLDB Endowment, 13(12): 2760–2772. 2020.
bibtex   3 downloads  
Towards effective differential privacy communication for users’ data sharing decision and comprehension. Aiping Xiong; Tianhao Wang; Ninghui Li; and Somesh Jha. In 2020 IEEE Symposium on Security and Privacy (SP), pages 392–410, 2020. IEEE
bibtex   1 download  
Estimating numerical distributions under local differential privacy. Zitao Li; Tianhao Wang; Milan Lopuhaä-Zwakenberg; Ninghui Li; and Boris Škoric. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, pages 621–635, 2020.
bibtex  
Consistent and accurate frequency oracles under local differential privacy. Tianhao Wang; Zitao Li; Ninghui Li; Milan Lopuhaä-Zwakenberg; and Boris Skoric. In NDSS, 2020.
bibtex  
A List of LDP Protocols. Tianhao Wang. Available at ˘rlhttps://github.com/vvv214/LDP_Protocols, 2020.
bibtex  
Open Source Code for NIST Challenge. Ninghui Li; Zitao Li; Anqi Chen; and Tianhao Wang. Available at ˘rlhttps://github.com/agl-c/deid2_dpsyn, 2020.
bibtex  
  2019 (4)
Locally differentially private heavy hitter identification. Tianhao Wang; Ninghui Li; and Somesh Jha. IEEE Transactions on Dependable and Secure Computing. 2019.
bibtex  
Answering multi-dimensional analytical queries under local differential privacy. Tianhao Wang; Bolin Ding; Jingren Zhou; Cheng Hong; Zhicong Huang; Ninghui Li; and Somesh Jha. In Proceedings of the 2019 International Conference on Management of Data, pages 159–176, 2019.
bibtex   2 downloads  
Koinonia: verifiable e-voting with long-term privacy. Huangyi Ge; Sze Yiu Chau; Victor E Gonsalves; Huian Li; Tianhao Wang; Xukai Zou; and Ninghui Li. In Proceedings of the 35th Annual Computer Security Applications Conference, pages 270–285, 2019.
bibtex   1 download  
2018 Differential Privacy Synthetic Data Challenge. NIST. Available at ˘rlhttps://www.nist.gov/ctl/pscr/open-innovation-prize-challenges/past-prize-challenges/2018-differential-privacy-synthetic, 2019.
bibtex  
  2018 (5)
CALM: Consistent adaptive local marginal for marginal release under local differential privacy. Zhikun Zhang; Tianhao Wang; Ninghui Li; Shibo He; and Jiming Chen. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 212–229, 2018.
bibtex   1 download  
Privacy at scale: Local differential privacy in practice. Graham Cormode; Somesh Jha; Tejas Kulkarni; Ninghui Li; Divesh Srivastava; and Tianhao Wang. In Proceedings of the 2018 International Conference on Management of Data, pages 1655–1658, 2018.
bibtex   2 downloads  
Locally differentially private frequent itemset mining. Tianhao Wang; Ninghui Li; and Somesh Jha. In 2018 IEEE Symposium on Security and Privacy (SP), pages 127–143, 2018. IEEE
bibtex   4 downloads  
Open Source Code for NIST Challenge. Ninghui Li; Zhikun Zhang; and Tianhao Wang. Available at ˘rlhttps://github.com/usnistgov/PrivacyEngCollabSpace/tree/master/tools/de-identification/Differential-Privacy-Synthetic-Data-Challenge-Algorithms/DPSyn, 2018.
bibtex  
The Unlinkable Data Challenge. NIST. Available at ˘rlhttps://www.nist.gov/ctl/pscr/funding-opportunities/prizes-challenges/2018-unlinkable-data-challenge, 2018.
bibtex  
  2017 (1)
Locally differentially private protocols for frequency estimation. Tianhao Wang; Jeremiah Blocki; Ninghui Li; and Somesh Jha. In USENIX Security, pages 729–745, 2017.
bibtex   3 downloads  
  2016 (2)
On the security and usability of segment-based visual cryptographic authentication protocols. Tianhao Wang; Huangyi Ge; Omar Chowdhury; Hemanta K Maji; and Ninghui Li. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 603–615, 2016.
bibtex  
Secure dynamic SSE via access indistinguishable storage. Tianhao Wang; and Yunlei Zhao. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 535–546, 2016.
bibtex  
  2015 (1)
A simple algorithm for finding all k-edge-connected components. Tianhao Wang; Yong Zhang; Francis YL Chin; Hing-Fung Ting; Yung H Tsin; and Sheung-Hung Poon. Plos one. 2015.
bibtex  
  2014 (1)
Weight balancing on boundaries and skeletons. Luis Barba; Otfried Cheong; Jean-Lou De Carufel; Michael Gene Dobbins; Rudolf Fleischer; Akitoshi Kawamura; Matias Korman; Yoshio Okamoto; János Pach; Yuan Tang; Sander Verdonschot; and Tianhao Wang. In Proceedings of the thirtieth annual symposium on Computational geometry, pages 436–443, 2014.
bibtex