Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xingliang Yuan
@article{DBLP:journals/pieee/ZhangWYPTP24, author = {He Zhang and Bang Wu and Xingliang Yuan and Shirui Pan and Hanghang Tong and Jian Pei}, title = {Trustworthy Graph Neural Networks: Aspects, Methods, and Trends}, journal = {Proc. {IEEE}}, volume = {112}, number = {2}, pages = {97--139}, year = {2024}, url = {https://doi.org/10.1109/JPROC.2024.3369017}, doi = {10.1109/JPROC.2024.3369017}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/ZhangWYPTP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MeiXXYL24, author = {Lin Mei and Chungen Xu and Lei Xu and Xingliang Yuan and Joseph K. Liu}, title = {Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {63--77}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3245638}, doi = {10.1109/TDSC.2023.3245638}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MeiXXYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-17092, author = {Van Nguyen and Tingmin Wu and Xingliang Yuan and Marthie Grobler and Surya Nepal and Carsten Rudolph}, title = {A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection}, journal = {CoRR}, volume = {abs/2402.17092}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.17092}, doi = {10.48550/ARXIV.2402.17092}, eprinttype = {arXiv}, eprint = {2402.17092}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-17092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuZYY23, author = {Xiaoning Liu and Yifeng Zheng and Xingliang Yuan and Xun Yi}, title = {Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {620--636}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3141391}, doi = {10.1109/TDSC.2022.3141391}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuWYWRY23, author = {Bang Wu and Shuo Wang and Xingliang Yuan and Cong Wang and Carsten Rudolph and Xiangwen Yang}, title = {Defeating Misclassification Attacks Against Transfer Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {886--901}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3144988}, doi = {10.1109/TDSC.2022.3144988}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuWYWRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengLLYYW23, author = {Yifeng Zheng and Shangqi Lai and Yi Liu and Xingliang Yuan and Xun Yi and Cong Wang}, title = {Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {988--1001}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3146448}, doi = {10.1109/TDSC.2022.3146448}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengLLYYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/VoYSLNW23, author = {Viet Vo and Xingliang Yuan and Shi{-}Feng Sun and Joseph K. Liu and Surya Nepal and Cong Wang}, title = {ShieldDB: An Encrypted Document Database With Padding Countermeasures}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {4}, pages = {4236--4252}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3126607}, doi = {10.1109/TKDE.2021.3126607}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/VoYSLNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ZhangYZP23, author = {He Zhang and Xingliang Yuan and Chuan Zhou and Shirui Pan}, title = {Projective Ranking-Based {GNN} Evasion Attacks}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {8}, pages = {8402--8416}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3219209}, doi = {10.1109/TKDE.2022.3219209}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ZhangYZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/XuYZWX23, author = {Lei Xu and Xingliang Yuan and Zhengxiang Zhou and Cong Wang and Chungen Xu}, title = {Towards Efficient Cryptographic Data Validation Service in Edge Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {1}, pages = {656--669}, year = {2023}, url = {https://doi.org/10.1109/TSC.2021.3111208}, doi = {10.1109/TSC.2021.3111208}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/XuYZWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuZXYW23, author = {Lei Xu and Leqian Zheng and Chengzhi Xu and Xingliang Yuan and Cong Wang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3003--3017}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623085}, doi = {10.1145/3576915.3623085}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuZXYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/HuangQYC23, author = {Shuo Huang and Lizhen Qu and Xingliang Yuan and Chunyang Chen}, editor = {Houda Bouamor and Juan Pino and Kalika Bali}, title = {FaLA: Fast Linear Adaptation for Replacing Backbone Models on Edge Devices}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2023, Singapore, December 6-10, 2023}, pages = {4874--4885}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.findings-emnlp.323}, doi = {10.18653/V1/2023.FINDINGS-EMNLP.323}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/HuangQYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BagherCYRY23, author = {Kassem Bagher and Shujie Cui and Xingliang Yuan and Carsten Rudolph and Xun Yi}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {TimeClave: Oblivious In-Enclave Time Series Processing System}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {719--737}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_42}, doi = {10.1007/978-981-99-7356-9\_42}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/BagherCYRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ZhangWWYXPY23, author = {He Zhang and Bang Wu and Shuo Wang and Xiangwen Yang and Minhui Xue and Shirui Pan and Xingliang Yuan}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {41737--41752}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/zhang23aq.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/ZhangWWYXPY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/GaoCXCYGY23, author = {Mengzhen Gao and Helei Cui and Yanze Xie and Yaxing Chen and Zhiwen Yu and Bin Guo and Xingliang Yuan}, title = {Practical Earphone Eavesdropping with Built-in Motion Sensors}, booktitle = {29th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2023, Ocean Flower Island, China, December 17-21, 2023}, pages = {2219--2226}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICPADS60453.2023.00299}, doi = {10.1109/ICPADS60453.2023.00299}, timestamp = {Sun, 14 Apr 2024 20:48:59 +0200}, biburl = {https://dblp.org/rec/conf/icpads/GaoCXCYGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/XueNLSYRSE23, author = {Minhui Xue and Surya Nepal and Ling Liu and Subbu Sethuvenkatraman and Xingliang Yuan and Carsten Rudolph and Ruoxi Sun and Greg Eisenhauer}, title = {RAI4IoE: Responsible {AI} for Enabling the Internet of Energy}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {13--22}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00012}, doi = {10.1109/TPS-ISA58951.2023.00012}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/XueNLSYRSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/HuangZXHYC23, author = {Yujin Huang and Terry Yue Zhuo and Qiongkai Xu and Han Hu and Xingliang Yuan and Chunyang Chen}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Training-free Lexical Backdoor Attacks on Language Models}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2198--2208}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583348}, doi = {10.1145/3543507.3583348}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/HuangZXHYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-12951, author = {He Zhang and Xingliang Yuan and Quoc Viet Hung Nguyen and Shirui Pan}, title = {On the Interaction between Node Fairness and Edge Privacy in Graph Neural Networks}, journal = {CoRR}, volume = {abs/2301.12951}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.12951}, doi = {10.48550/ARXIV.2301.12951}, eprinttype = {arXiv}, eprint = {2301.12951}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-12951.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04116, author = {Yujin Huang and Terry Yue Zhuo and Qiongkai Xu and Han Hu and Xingliang Yuan and Chunyang Chen}, title = {Training-free Lexical Backdoor Attacks on Language Models}, journal = {CoRR}, volume = {abs/2302.04116}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04116}, doi = {10.48550/ARXIV.2302.04116}, eprinttype = {arXiv}, eprint = {2302.04116}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-16652, author = {Kassem Bagher and Shujie Cui and Xingliang Yuan and Carsten Rudolph and Xun Yi}, title = {TimeClave: Oblivious In-enclave Time series Processing System}, journal = {CoRR}, volume = {abs/2306.16652}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.16652}, doi = {10.48550/ARXIV.2306.16652}, eprinttype = {arXiv}, eprint = {2306.16652}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-16652.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04697, author = {Lei Xu and Leqian Zheng and Chengzhi Xu and Xingliang Yuan and Cong Wang}, title = {Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption}, journal = {CoRR}, volume = {abs/2309.04697}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04697}, doi = {10.48550/ARXIV.2309.04697}, eprinttype = {arXiv}, eprint = {2309.04697}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04697.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11691, author = {Minhui Xue and Surya Nepal and Ling Liu and Subbu Sethuvenkatraman and Xingliang Yuan and Carsten Rudolph and Ruoxi Sun and Greg Eisenhauer}, title = {RAI4IoE: Responsible {AI} for Enabling the Internet of Energy}, journal = {CoRR}, volume = {abs/2309.11691}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11691}, doi = {10.48550/ARXIV.2309.11691}, eprinttype = {arXiv}, eprint = {2309.11691}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-20448, author = {Ziyao Liu and Yu Jiang and Jiyuan Shen and Minyi Peng and Kwok{-}Yan Lam and Xingliang Yuan}, title = {A Survey on Federated Unlearning: Challenges, Methods, and Future Directions}, journal = {CoRR}, volume = {abs/2310.20448}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.20448}, doi = {10.48550/ARXIV.2310.20448}, eprinttype = {arXiv}, eprint = {2310.20448}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-20448.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07861, author = {Bang Wu and He Zhang and Xiangwen Yang and Shuo Wang and Minhui Xue and Shirui Pan and Xingliang Yuan}, title = {GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks}, journal = {CoRR}, volume = {abs/2312.07861}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07861}, doi = {10.48550/ARXIV.2312.07861}, eprinttype = {arXiv}, eprint = {2312.07861}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07870, author = {Bang Wu and Xingliang Yuan and Shuo Wang and Qi Li and Minhui Xue and Shirui Pan}, title = {Securing Graph Neural Networks in MLaaS: {A} Comprehensive Realization of Query-based Integrity Verification}, journal = {CoRR}, volume = {abs/2312.07870}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07870}, doi = {10.48550/ARXIV.2312.07870}, eprinttype = {arXiv}, eprint = {2312.07870}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07870.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/GanLWYSHZW22, author = {Qingqing Gan and Joseph K. Liu and Xiaoming Wang and Xingliang Yuan and Shifeng Sun and Daxin Huang and Cong Zuo and Jianfeng Wang}, title = {Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {6}, pages = {166820}, year = {2022}, url = {https://doi.org/10.1007/s11704-021-0601-8}, doi = {10.1007/S11704-021-0601-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/GanLWYSHZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiuZYY22, author = {Xiaoning Liu and Yifeng Zheng and Xingliang Yuan and Xun Yi}, title = {Deep learning-based medical diagnostic services: {A} secure, lightweight, and accurate realization}, journal = {J. Comput. Secur.}, volume = {30}, number = {6}, pages = {795--827}, year = {2022}, url = {https://doi.org/10.3233/JCS-210165}, doi = {10.3233/JCS-210165}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/LiuZYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunZLSSYYG22, author = {Shifeng Sun and Cong Zuo and Joseph K. Liu and Amin Sakzad and Ron Steinfeld and Tsz Hon Yuen and Xingliang Yuan and Dawu Gu}, title = {Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {452--467}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2973633}, doi = {10.1109/TDSC.2020.2973633}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunZLSSYYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LaiYSLSSL22, author = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu}, title = {Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2609--2621}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3065652}, doi = {10.1109/TDSC.2021.3065652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LaiYSLSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuWYY22, author = {Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi}, title = {Leia: {A} Lightweight Cryptographic Neural Network Inference System at the Edge}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {237--252}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2021.3138611}, doi = {10.1109/TIFS.2021.3138611}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuWYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhuLYY22, author = {Yuanshao Zhu and Yi Liu and James J. Q. Yu and Xingliang Yuan}, title = {Semi-Supervised Federated Learning for Travel Mode Identification From {GPS} Trajectories}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {3}, pages = {2380--2391}, year = {2022}, url = {https://doi.org/10.1109/TITS.2021.3092015}, doi = {10.1109/TITS.2021.3092015}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/ZhuLYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WuYPY22, author = {Bang Wu and Xiangwen Yang and Shirui Pan and Xingliang Yuan}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {337--350}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497753}, doi = {10.1145/3488932.3497753}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WuYPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuXYWL22, author = {Yi Liu and Lei Xu and Xingliang Yuan and Cong Wang and Bo Li}, title = {The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}, pages = {1749--1758}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOM48880.2022.9796721}, doi = {10.1109/INFOCOM48880.2022.9796721}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuXYWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShenYLYSLN22, author = {Yanjun Shen and Bin Yu and Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Surya Nepal}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {269--289}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_17}, doi = {10.1007/978-3-031-22390-7\_17}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ShenYLYSLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangFWZ0Y22, author = {Dabao Wang and Hang Feng and Siwei Wu and Yajin Zhou and Lei Wu and Xingliang Yuan}, title = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of {ERC20} Tokens on Ethereum}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {99--114}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545963}, doi = {10.1145/3545948.3545963}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangFWZ0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/XuYZWX22, author = {Lei Xu and Xingliang Yuan and Zhengxiang Zhou and Cong Wang and Chungen Xu}, editor = {Claudio Agostino Ardagna and Carl K. Chang and Rong N. Chang and Ernesto Damiani and Robert Ward and Fatos Xhafa and Jia Zhang}, title = {Towards Efficient Cryptographic Data Validation Service in Edge Computing}, booktitle = {{IEEE} World Congress on Services, {SERVICES} 2022, Barcelona, Spain, July 10-16, 2022}, pages = {14}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SERVICES55459.2022.00027}, doi = {10.1109/SERVICES55459.2022.00027}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/services/XuYZWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/adhocnets/2021, editor = {Wei Bao and Xingliang Yuan and Longxiang Gao and Tom H. Luan and David Bong Jun Choi}, title = {Ad Hoc Networks and Tools for {IT} - 13th {EAI} International Conference, {ADHOCNETS} 2021, Virtual Event, December 6-7, 2021, and 16th {EAI} International Conference, {TRIDENTCOM} 2021, Virtual Event, November 24, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {428}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98005-4}, doi = {10.1007/978-3-030-98005-4}, isbn = {978-3-030-98004-7}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adhocnets/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2022, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2}, doi = {10.1007/978-3-031-23020-2}, isbn = {978-3-031-23019-6}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-01971, author = {Yifeng Zheng and Shangqi Lai and Yi Liu and Xingliang Yuan and Xun Yi and Cong Wang}, title = {Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization}, journal = {CoRR}, volume = {abs/2202.01971}, year = {2022}, url = {https://arxiv.org/abs/2202.01971}, eprinttype = {arXiv}, eprint = {2202.01971}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-01971.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-12993, author = {He Zhang and Xingliang Yuan and Chuan Zhou and Shirui Pan}, title = {Projective Ranking-based {GNN} Evasion Attacks}, journal = {CoRR}, volume = {abs/2202.12993}, year = {2022}, url = {https://arxiv.org/abs/2202.12993}, eprinttype = {arXiv}, eprint = {2202.12993}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-12993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-07320, author = {Yi Liu and Lei Xu and Xingliang Yuan and Cong Wang and Bo Li}, title = {The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining}, journal = {CoRR}, volume = {abs/2203.07320}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.07320}, doi = {10.48550/ARXIV.2203.07320}, eprinttype = {arXiv}, eprint = {2203.07320}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-07320.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-07424, author = {He Zhang and Bang Wu and Xingliang Yuan and Shirui Pan and Hanghang Tong and Jian Pei}, title = {Trustworthy Graph Neural Networks: Aspects, Methods and Trends}, journal = {CoRR}, volume = {abs/2205.07424}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.07424}, doi = {10.48550/ARXIV.2205.07424}, eprinttype = {arXiv}, eprint = {2205.07424}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-07424.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-01790, author = {Dabao Wang and Hang Feng and Siwei Wu and Yajin Zhou and Lei Wu and Xingliang Yuan}, title = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of {ERC20} Tokens on Ethereum}, journal = {CoRR}, volume = {abs/2207.01790}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.01790}, doi = {10.48550/ARXIV.2207.01790}, eprinttype = {arXiv}, eprint = {2207.01790}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-01790.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZYY22, author = {Xiaoning Liu and Yifeng Zheng and Xingliang Yuan and Xun Yi}, title = {Deep Learning-Based Medical Diagnostic Services: {A} Secure, Lightweight, and Accurate Realization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {899}, year = {2022}, url = {https://eprint.iacr.org/2022/899}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuZYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenLSYZ21, author = {Yanli Ren and Xiangyu Li and Shifeng Sun and Xingliang Yuan and Xinpeng Zhang}, title = {Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102698}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102698}, doi = {10.1016/J.JISA.2020.102698}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiWYW21, author = {Chengjun Cai and Jian Weng and Xingliang Yuan and Cong Wang}, title = {Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {131--144}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2877332}, doi = {10.1109/TDSC.2018.2877332}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiWYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/XuSYLZX21, author = {Lei Xu and Shifeng Sun and Xingliang Yuan and Joseph K. Liu and Cong Zuo and Chungen Xu}, title = {Enabling Authorized Encrypted Search for Multi-Authority Medical Databases}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {1}, pages = {534--546}, year = {2021}, url = {https://doi.org/10.1109/TETC.2019.2905572}, doi = {10.1109/TETC.2019.2905572}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/XuSYLZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuDZYW21, author = {Lei Xu and Huayi Duan and Anxin Zhou and Xingliang Yuan and Cong Wang}, title = {Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {5310--5325}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3128823}, doi = {10.1109/TIFS.2021.3128823}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuDZYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/CuiYZW21, author = {Helei Cui and Xingliang Yuan and Yifeng Zheng and Cong Wang}, title = {Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {4}, pages = {998--1012}, year = {2021}, url = {https://doi.org/10.1109/TSC.2018.2850333}, doi = {10.1109/TSC.2018.2850333}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/CuiYZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/WuPY21, author = {Bang Wu and Shirui Pan and Xingliang Yuan}, title = {Towards Extracting Graph Neural Network Models via Prediction Queries (Student Abstract)}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {15925--15926}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i18.17959}, doi = {10.1609/AAAI.V35I18.17959}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/WuPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VoLYNL21, author = {Viet Vo and Shangqi Lai and Xingliang Yuan and Surya Nepal and Joseph K. Liu}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, pages = {50--75}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3\_3}, doi = {10.1007/978-3-030-78372-3\_3}, timestamp = {Wed, 09 Jun 2021 10:50:14 +0200}, biburl = {https://dblp.org/rec/conf/acns/VoLYNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/ZhangWY0WYP21, author = {He Zhang and Bang Wu and Xiangwen Yang and Chuan Zhou and Shuo Wang and Xingliang Yuan and Shirui Pan}, editor = {Gianluca Demartini and Guido Zuccon and J. Shane Culpepper and Zi Huang and Hanghang Tong}, title = {Projective Ranking: {A} Transferable Evasion Attack Method on Graph Neural Networks}, booktitle = {{CIKM} '21: The 30th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021}, pages = {3617--3621}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3459637.3482161}, doi = {10.1145/3459637.3482161}, timestamp = {Tue, 16 Aug 2022 23:04:38 +0200}, biburl = {https://dblp.org/rec/conf/cikm/ZhangWY0WYP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuZYY21, author = {Xiaoning Liu and Yifeng Zheng and Xingliang Yuan and Xun Yi}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {519--541}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_25}, doi = {10.1007/978-3-030-88418-5\_25}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuZYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/WuYPY21, author = {Bang Wu and Xiangwen Yang and Shirui Pan and Xingliang Yuan}, editor = {James Bailey and Pauli Miettinen and Yun Sing Koh and Dacheng Tao and Xindong Wu}, title = {Adapting Membership Inference Attacks to {GNN} for Graph Classification: Approaches and Implications}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2021, Auckland, New Zealand, December 7-10, 2021}, pages = {1421--1426}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDM51629.2021.00182}, doi = {10.1109/ICDM51629.2021.00182}, timestamp = {Mon, 31 Jan 2022 08:58:55 +0100}, biburl = {https://dblp.org/rec/conf/icdm/WuYPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShenYSLN21, author = {Yanjun Shen and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Surya Nepal}, editor = {Robert H. Deng and Feng Bao and Guilin Wang and Jian Shen and Mark Ryan and Weizhi Meng and Ding Wang}, title = {OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control}, booktitle = {Information Security Practice and Experience: 16th International Conference, {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13107}, pages = {126--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93206-0\_9}, doi = {10.1007/978-3-030-93206-0\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShenYSLN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LaiYLY0LN21, author = {Shangqi Lai and Xingliang Yuan and Joseph K. Liu and Xun Yi and Qi Li and Dongxi Liu and Surya Nepal}, title = {OblivSketch: Oblivious Network Measurement as a Cloud Service}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/oblivsketch-oblivious-network-measurement-as-a-cloud-service/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LaiYLY0LN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SunSLYSLNG21, author = {Shifeng Sun and Ron Steinfeld and Shangqi Lai and Xingliang Yuan and Amin Sakzad and Joseph K. Liu and Surya Nepal and Dawu Gu}, title = {Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/practical-non-interactive-searchable-encryption-with-forward-and-backward-privacy/}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SunSLYSLNG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/qshine/2021, editor = {Xingliang Yuan and Wei Bao and Xun Yi and Nguyen Hoang Tran}, title = {Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th {EAI} International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {402}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91424-0}, doi = {10.1007/978-3-030-91424-0}, isbn = {978-3-030-91423-3}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qshine/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-15068, author = {Siwei Wu and Dabao Wang and Jianting He and Yajin Zhou and Lei Wu and Xingliang Yuan and Qinming He and Kui Ren}, title = {DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications}, journal = {CoRR}, volume = {abs/2104.15068}, year = {2021}, url = {https://arxiv.org/abs/2104.15068}, eprinttype = {arXiv}, eprint = {2104.15068}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-15068.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-08760, author = {Bang Wu and Xiangwen Yang and Shirui Pan and Xingliang Yuan}, title = {Adapting Membership Inference Attacks to {GNN} for Graph Classification: Approaches and Implications}, journal = {CoRR}, volume = {abs/2110.08760}, year = {2021}, url = {https://arxiv.org/abs/2110.08760}, eprinttype = {arXiv}, eprint = {2110.08760}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-08760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZuoLYLSW21, author = {Cong Zuo and Shangqi Lai and Xingliang Yuan and Joseph K. Liu and Jun Shao and Huaxiong Wang}, title = {Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1585}, year = {2021}, url = {https://eprint.iacr.org/2021/1585}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZuoLYLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuDZYW21, author = {Lei Xu and Huayi Duan and Anxin Zhou and Xingliang Yuan and Cong Wang}, title = {Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1593}, year = {2021}, url = {https://eprint.iacr.org/2021/1593}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/XuDZYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccfton/YuanCWW20, author = {Xingliang Yuan and Chengjun Cai and Cong Wang and Qian Wang}, title = {A scalable ledger-assisted architecture for secure query processing over distributed IoT data}, journal = {{CCF} Trans. Netw.}, volume = {3}, number = {2}, pages = {97--111}, year = {2020}, url = {https://doi.org/10.1007/s42045-020-00038-7}, doi = {10.1007/S42045-020-00038-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccfton/YuanCWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LaiYSSLL20, author = {Shangqi Lai and Xingliang Yuan and Amin Sakzad and Mahsa Salehi and Joseph K. Liu and Dongxi Liu}, title = {Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {2651--2662}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2949374}, doi = {10.1109/JIOT.2019.2949374}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LaiYSSLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GuoWWYJ20, author = {Yu Guo and Mingyue Wang and Cong Wang and Xingliang Yuan and Xiaohua Jia}, title = {Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {6}, pages = {5359--5370}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2978261}, doi = {10.1109/JIOT.2020.2978261}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GuoWWYJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDY020, author = {Yifeng Zheng and Huayi Duan and Xingliang Yuan and Cong Wang}, title = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {121--133}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2753245}, doi = {10.1109/TDSC.2017.2753245}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YuanYZLW20, author = {Xu Yuan and Xingliang Yuan and Yihe Zhang and Baochun Li and Cong Wang}, title = {Enabling Encrypted Boolean Queries in Geographically Distributed Databases}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {31}, number = {3}, pages = {634--646}, year = {2020}, url = {https://doi.org/10.1109/TPDS.2019.2940945}, doi = {10.1109/TPDS.2019.2940945}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/YuanYZLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/JiangZSYGW20, author = {Jinghua Jiang and Yifeng Zheng and Zhenkui Shi and Xingliang Yuan and Xiaolin Gui and Cong Wang}, title = {A Practical System for Privacy-Aware Targeted Mobile Advertising Services}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {13}, number = {3}, pages = {410--424}, year = {2020}, url = {https://doi.org/10.1109/TSC.2017.2697385}, doi = {10.1109/TSC.2017.2697385}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/JiangZSYGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VoLYSNL20, author = {Viet Vo and Shangqi Lai and Xingliang Yuan and Shifeng Sun and Surya Nepal and Joseph K. Liu}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {83--103}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_5}, doi = {10.1007/978-3-030-57878-7\_5}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/VoLYSNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-01848, author = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu}, title = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes}, journal = {CoRR}, volume = {abs/2001.01848}, year = {2020}, url = {http://arxiv.org/abs/2001.01848}, eprinttype = {arXiv}, eprint = {2001.01848}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-01848.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03743, author = {Viet Vo and Shangqi Lai and Xingliang Yuan and Shifeng Sun and Surya Nepal and Joseph K. Liu}, title = {Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution}, journal = {CoRR}, volume = {abs/2001.03743}, year = {2020}, url = {https://arxiv.org/abs/2001.03743}, eprinttype = {arXiv}, eprint = {2001.03743}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06103, author = {Viet Vo and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Surya Nepal and Cong Wang}, title = {ShieldDB: An Encrypted Document Database with Padding Countermeasures}, journal = {CoRR}, volume = {abs/2003.06103}, year = {2020}, url = {https://arxiv.org/abs/2003.06103}, eprinttype = {arXiv}, eprint = {2003.06103}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-02931, author = {Yi Liu and Xingliang Yuan and Zehui Xiong and Jiawen Kang and Xiaofei Wang and Dusit Niyato}, title = {Federated Learning for 6G Communications: Challenges, Methods, and Future Directions}, journal = {CoRR}, volume = {abs/2006.02931}, year = {2020}, url = {https://arxiv.org/abs/2006.02931}, eprinttype = {arXiv}, eprint = {2006.02931}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-02931.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12252, author = {Dabao Wang and Siwei Wu and Ziling Lin and Lei Wu and Xingliang Yuan and Yajin Zhou and Haoyu Wang and Kui Ren}, title = {Towards understanding flash loan and its applications in defi ecosystem}, journal = {CoRR}, volume = {abs/2010.12252}, year = {2020}, url = {https://arxiv.org/abs/2010.12252}, eprinttype = {arXiv}, eprint = {2010.12252}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12252.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12751, author = {Bang Wu and Xiangwen Yang and Shirui Pan and Xingliang Yuan}, title = {Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization}, journal = {CoRR}, volume = {abs/2010.12751}, year = {2020}, url = {https://arxiv.org/abs/2010.12751}, eprinttype = {arXiv}, eprint = {2010.12751}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12751.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-04432, author = {Yi Liu and Xingliang Yuan and Ruihui Zhao and Yifeng Zheng and Yefeng Zheng}, title = {{RC-SSFL:} Towards Robust and Communication-efficient Semi-supervised Federated Learning System}, journal = {CoRR}, volume = {abs/2012.04432}, year = {2020}, url = {https://arxiv.org/abs/2012.04432}, eprinttype = {arXiv}, eprint = {2012.04432}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-04432.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiYSLSSL20, author = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu}, title = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2020}, url = {https://eprint.iacr.org/2020/020}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LaiYSLSSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWYY20, author = {Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi}, title = {Leia: {A} Lightweight Cryptographic Neural Network Inference System at the Edge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2020}, url = {https://eprint.iacr.org/2020/463}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuWYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DuanZWY19, author = {Huayi Duan and Yifeng Zheng and Cong Wang and Xingliang Yuan}, title = {Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {2637--2650}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2872461}, doi = {10.1109/JIOT.2018.2872461}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DuanZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YuanYLW19, author = {Xu Yuan and Xingliang Yuan and Baochun Li and Cong Wang}, title = {Toward Secure and Scalable Computation in Internet of Things Data Applications}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {3753--3763}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2890728}, doi = {10.1109/JIOT.2018.2890728}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YuanYLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/GuoYWWLJ19, author = {Yu Guo and Xingliang Yuan and Xinyu Wang and Cong Wang and Baochun Li and Xiaohua Jia}, title = {Enabling Encrypted Rich Queries in Distributed Key-Value Stores}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {30}, number = {6}, pages = {1283--1297}, year = {2019}, url = {https://doi.org/10.1109/TPDS.2018.2885519}, doi = {10.1109/TPDS.2018.2885519}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/GuoYWWLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiYSLLL19, author = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Yuhong Liu and Dongxi Liu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {GraphSE{\({^2}\)}: An Encrypted Graph Database for Privacy-Preserving Social Search}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {41--54}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329803}, doi = {10.1145/3321705.3329803}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaiYSLLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuYSWX19, author = {Lei Xu and Xingliang Yuan and Ron Steinfeld and Cong Wang and Chungen Xu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {122--133}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329814}, doi = {10.1145/3321705.3329814}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuYSWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuanWYZW019, author = {Huayi Duan and Cong Wang and Xingliang Yuan and Yajin Zhou and Qian Wang and Kui Ren}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2351--2367}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3339814}, doi = {10.1145/3319535.3339814}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DuanWYZW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YuanCW019, author = {Xingliang Yuan and Chengjun Cai and Qian Wang and Qi Li}, title = {Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937714}, doi = {10.1109/DSC47296.2019.8937714}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YuanCW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/WuLLYYW19, author = {Songrui Wu and Qi Li and Guoliang Li and Dong Yuan and Xingliang Yuan and Cong Wang}, title = {ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database}, booktitle = {35th {IEEE} International Conference on Data Engineering, {ICDE} 2019, Macao, China, April 8-11, 2019}, pages = {626--637}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDE.2019.00062}, doi = {10.1109/ICDE.2019.00062}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icde/WuLLYYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0015YWWX19, author = {Lei Xu and Xingliang Yuan and Cong Wang and Qian Wang and Chungen Xu}, title = {Hardening Database Padding for Searchable Encryption}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {2503--2511}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737588}, doi = {10.1109/INFOCOM.2019.8737588}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/0015YWWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-04501, author = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Yuhong Liu and Dongxi Liu}, title = {GraphSE\({}^{\mbox{2}}\): An Encrypted Graph Database for Privacy-Preserving Social Search}, journal = {CoRR}, volume = {abs/1905.04501}, year = {2019}, url = {http://arxiv.org/abs/1905.04501}, eprinttype = {arXiv}, eprint = {1905.04501}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-04501.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-11230, author = {Bang Wu and Xiangwen Yang and Shuo Wang and Xingliang Yuan and Cong Wang and Carsten Rudolph}, title = {Defending Against Misclassification Attacks in Transfer Learning}, journal = {CoRR}, volume = {abs/1908.11230}, year = {2019}, url = {http://arxiv.org/abs/1908.11230}, eprinttype = {arXiv}, eprint = {1908.11230}, timestamp = {Thu, 23 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-11230.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-05927, author = {Shangqi Lai and Xingliang Yuan and Amin Sakzad and Mahsa Salehi and Joseph K. Liu and Dongxi Liu}, title = {Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets}, journal = {CoRR}, volume = {abs/1911.05927}, year = {2019}, url = {http://arxiv.org/abs/1911.05927}, eprinttype = {arXiv}, eprint = {1911.05927}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-05927.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WangYCR18, author = {Cong Wang and Xingliang Yuan and Yong Cui and Kui Ren}, title = {Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond}, journal = {{IEEE} Netw.}, volume = {32}, number = {1}, pages = {166--171}, year = {2018}, url = {https://doi.org/10.1109/MNET.2017.1700060}, doi = {10.1109/MNET.2017.1700060}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/WangYCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuanWWSR18, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Anna Cinzia Squicciarini and Kui Ren}, title = {Towards Privacy-Preserving and Practical Image-Centric Social Discovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {868--882}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2609930}, doi = {10.1109/TDSC.2016.2609930}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YuanWWSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YuanDW18, author = {Xingliang Yuan and Huayi Duan and Cong Wang}, title = {Assuring String Pattern Matching in Outsourced Middleboxes}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {26}, number = {3}, pages = {1362--1375}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2822837}, doi = {10.1109/TNET.2018.2822837}, timestamp = {Tue, 10 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YuanDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhuLWYWR18, author = {Jie Zhu and Qi Li and Cong Wang and Xingliang Yuan and Qian Wang and Kui Ren}, title = {Enabling Generic, Verifiable, and Secure Data Search in Cloud Services}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {29}, number = {8}, pages = {1721--1735}, year = {2018}, url = {https://doi.org/10.1109/TPDS.2018.2808283}, doi = {10.1109/TPDS.2018.2808283}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ZhuLWYWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YuanWWR18, author = {Xingliang Yuan and Jian Weng and Cong Wang and Kui Ren}, title = {Secure Integrated Circuit Design via Hybrid Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {29}, number = {8}, pages = {1851--1864}, year = {2018}, url = {https://doi.org/10.1109/TPDS.2018.2807844}, doi = {10.1109/TPDS.2018.2807844}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/YuanWWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunYLSSVN18, author = {Shifeng Sun and Xingliang Yuan and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Viet Vo and Surya Nepal}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {763--780}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243782}, doi = {10.1145/3243734.3243782}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunYLSSVN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SuiLZYLQ18, author = {Zhimei Sui and Shangqi Lai and Cong Zuo and Xingliang Yuan and Joseph K. Liu and Haifeng Qian}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {An Encrypted Database with Enforced Access Control and Blockchain Validation}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {260--273}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_14}, doi = {10.1007/978-3-030-14234-6\_14}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/SuiLZYLQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CuiW0DY18, author = {Helei Cui and Cong Wang and Yu Hua and Yuefeng Du and Xingliang Yuan}, title = {A Bandwidth-Efficient Middleware for Encrypted Deduplication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625127}, doi = {10.1109/DESEC.2018.8625127}, timestamp = {Thu, 23 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/CuiW0DY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TangWYW18, author = {Xiaoting Tang and Cong Wang and Xingliang Yuan and Qian Wang}, title = {Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {1988--1996}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486371}, doi = {10.1109/INFOCOM.2018.8486371}, timestamp = {Thu, 23 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/TangWYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/GuoWYJ18, author = {Yu Guo and Cong Wang and Xingliang Yuan and Xiaohua Jia}, title = {Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes}, booktitle = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2018, Banff, AB, Canada, June 4-6, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWQoS.2018.8624187}, doi = {10.1109/IWQOS.2018.8624187}, timestamp = {Wed, 18 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/GuoWYJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYL18, author = {Xiaoning Liu and Xingliang Yuan and Joseph K. Liu}, title = {Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1664--1668}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00247}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanWWYN17, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Chenyun Yu and Sarana Nutanong}, title = {Privacy-Preserving Similarity Joins Over Encrypted Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2763--2775}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2721221}, doi = {10.1109/TIFS.2017.2721221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuanWWYN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/YuNLWY17, author = {Chenyun Yu and Sarana Nutanong and Hangyu Li and Cong Wang and Xingliang Yuan}, title = {A Generic Method for Accelerating LSH-Based Similarity Join Processing}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {29}, number = {4}, pages = {712--726}, year = {2017}, url = {https://doi.org/10.1109/TKDE.2016.2638838}, doi = {10.1109/TKDE.2016.2638838}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/YuNLWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/CuiYW17, author = {Helei Cui and Xingliang Yuan and Cong Wang}, title = {Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {16}, number = {5}, pages = {1315--1329}, year = {2017}, url = {https://doi.org/10.1109/TMC.2016.2595573}, doi = {10.1109/TMC.2016.2595573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/CuiYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhengYWJWG17, author = {Yifeng Zheng and Xingliang Yuan and Xinyu Wang and Jinghua Jiang and Cong Wang and Xiaolin Gui}, title = {Toward Encrypted Cloud Media Center With Secure Deduplication}, journal = {{IEEE} Trans. Multim.}, volume = {19}, number = {2}, pages = {251--265}, year = {2017}, url = {https://doi.org/10.1109/TMM.2016.2612760}, doi = {10.1109/TMM.2016.2612760}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/ZhengYWJWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShiLY17, author = {Zhenkui Shi and Xiaoning Liu and Xingliang Yuan}, editor = {Cong Wang and Murat Kantarcioglu}, title = {Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination}, booktitle = {Proceedings of the Fifth {ACM} International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {51--57}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055259.3055269}, doi = {10.1145/3055259.3055269}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShiLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuanGWWLJ17, author = {Xingliang Yuan and Yu Guo and Xinyu Wang and Cong Wang and Baochun Li and Xiaohua Jia}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {EncKV: An Encrypted Key-value Store with Rich Queries}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {423--435}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052977}, doi = {10.1145/3052973.3052977}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuanGWWLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanYLW17, author = {Xu Yuan and Xingliang Yuan and Baochun Li and Cong Wang}, title = {Secure multi-client data access with boolean queries in distributed key-value stores}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228619}, doi = {10.1109/CNS.2017.8228619}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanYLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaiYW17, author = {Chengjun Cai and Xingliang Yuan and Cong Wang}, title = {Towards trustworthy and private keyword search in encrypted decentralized storage}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996810}, doi = {10.1109/ICC.2017.7996810}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/CaiYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/YuNLWY17, author = {Chenyun Yu and Sarana Nutanong and Hangyu Li and Cong Wang and Xingliang Yuan}, title = {A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract)}, booktitle = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017, San Diego, CA, USA, April 19-22, 2017}, pages = {29--30}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDE.2017.21}, doi = {10.1109/ICDE.2017.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/YuNLWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LiuYW17, author = {Xiaoning Liu and Xingliang Yuan and Cong Wang}, title = {EncSIM: An encrypted similarity search service for distributed high-dimensional datasets}, booktitle = {25th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2017, Vilanova i la Geltr{\'{u}}, Spain, June 14-16, 2017}, pages = {1--10}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IWQoS.2017.7969151}, doi = {10.1109/IWQOS.2017.7969151}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/LiuYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/CaiY017, author = {Chengjun Cai and Xingliang Yuan and Cong Wang}, title = {Hardening Distributed and Encrypted Keyword Search via Blockchain}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {119--128}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.36}, doi = {10.1109/PAC.2017.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/CaiY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DuanYW17, author = {Huayi Duan and Xingliang Yuan and Cong Wang}, title = {LightBox: SGX-assisted Secure Network Functions at Near-native Speed}, journal = {CoRR}, volume = {abs/1706.06261}, year = {2017}, url = {http://arxiv.org/abs/1706.06261}, eprinttype = {arXiv}, eprint = {1706.06261}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DuanYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangZYSGWY16, author = {Jinghua Jiang and Yifeng Zheng and Xingliang Yuan and Zhenkui Shi and Xiaolin Gui and Cong Wang and Jing Yao}, title = {Towards Secure and Accurate Targeted Mobile Coupon Delivery}, journal = {{IEEE} Access}, volume = {4}, pages = {8116--8126}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2624779}, doi = {10.1109/ACCESS.2016.2624779}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JiangZYSGWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/YuanWWCWWML16, author = {Xingliang Yuan and Xinyu Wang and Jinfan Wang and Yilei Chu and Cong Wang and Jianping Wang and Marie{-}Jos{\'{e}} Montpetit and Shucheng Liu}, title = {Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {34}, number = {8}, pages = {2077--2090}, year = {2016}, url = {https://doi.org/10.1109/JSAC.2016.2577301}, doi = {10.1109/JSAC.2016.2577301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/YuanWWCWWML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/YuanWWWR16, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Jian Weng and Kui Ren}, title = {Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing}, journal = {{IEEE} Trans. Multim.}, volume = {18}, number = {10}, pages = {2002--2014}, year = {2016}, url = {https://doi.org/10.1109/TMM.2016.2602758}, doi = {10.1109/TMM.2016.2602758}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/YuanWWWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuanWWQL16, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Chen Qian and Jianxiong Lin}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Building an Encrypted, Distributed, and Searchable Key-value Store}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {547--558}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897852}, doi = {10.1145/2897845.2897852}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuanWWQL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/DaiYW16, author = {Chengcheng Dai and Xingliang Yuan and Cong Wang}, editor = {Hien T. Nguyen and V{\'{a}}clav Sn{\'{a}}sel}, title = {Privacy-Preserving Ridesharing Recommendation in Geosocial Networks}, booktitle = {Computational Social Networks - 5th International Conference, CSoNet 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9795}, pages = {193--205}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42345-6\_17}, doi = {10.1007/978-3-319-42345-6\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/csonet/DaiYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/YuanDW16, author = {Xingliang Yuan and Huayi Duan and Cong Wang}, title = {Bringing execution assurances of pattern matching in outsourced middleboxes}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784424}, doi = {10.1109/ICNP.2016.7784424}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/YuanDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/YuanDW16a, author = {Xingliang Yuan and Huayi Duan and Cong Wang}, title = {Towards verifiable outsourced middleboxes}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784466}, doi = {10.1109/ICNP.2016.7784466}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/YuanDW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CuiYZW16, author = {Helei Cui and Xingliang Yuan and Yifeng Zheng and Cong Wang}, title = {Enabling secure and effective near-duplicate detection over encrypted in-network storage}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524346}, doi = {10.1109/INFOCOM.2016.7524346}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CuiYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/YuanWLW16, author = {Xingliang Yuan and Xinyu Wang and Jianxiong Lin and Cong Wang}, title = {Privacy-preserving deep packet inspection in outsourced middleboxes}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524526}, doi = {10.1109/INFOCOM.2016.7524526}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/YuanWLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhengYWJWG15, author = {Yifeng Zheng and Xingliang Yuan and Xinyu Wang and Jinghua Jiang and Cong Wang and Xiaolin Gui}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Enabling Encrypted Cloud Media Center with Secure Deduplication}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {63--72}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714628}, doi = {10.1145/2714576.2714628}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhengYWJWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuanWR15, author = {Xingliang Yuan and Cong Wang and Kui Ren}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Enabling {IP} Protection for Outsourced Integrated Circuit Design}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {237--247}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714601}, doi = {10.1145/2714576.2714601}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuanWR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanWCWQ15, author = {Xingliang Yuan and Xinyu Wang and Yilei Chu and Cong Wang and Chen Qian}, title = {Towards a scalable, private, and searchable key-value store}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {773--774}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346929}, doi = {10.1109/CNS.2015.7346929}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanWCWQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YuanCWW15, author = {Xingliang Yuan and Helei Cui and Xinyu Wang and Cong Wang}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {40--60}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_3}, doi = {10.1007/978-3-319-24177-7\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YuanCWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiangSYWG15, author = {Jinghua Jiang and Zhenkui Shi and Xingliang Yuan and Cong Wang and Xiaolin Gui}, title = {Towards secure and practical targeted mobile advertising}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {79--80}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179352}, doi = {10.1109/INFCOMW.2015.7179352}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JiangSYWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CuiYW15, author = {Helei Cui and Xingliang Yuan and Cong Wang}, title = {Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {2659--2667}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218657}, doi = {10.1109/INFOCOM.2015.7218657}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CuiYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/JiangGSYW15, author = {Jinghua Jiang and Xiaolin Gui and Zhenkui Shi and Xingliang Yuan and Cong Wang}, title = {Towards Secure and Practical Targeted Mobile Advertising}, booktitle = {11th International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2015, Shenzhen, China, December 16-18, 2015}, pages = {79--88}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MSN.2015.17}, doi = {10.1109/MSN.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/JiangGSYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/YuanWWSR14, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Anna Cinzia Squicciarini and Kui Ren}, title = {Enabling Privacy-Preserving Image-Centric Social Discovery}, booktitle = {{IEEE} 34th International Conference on Distributed Computing Systems, {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014}, pages = {198--207}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCS.2014.28}, doi = {10.1109/ICDCS.2014.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/YuanWWSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/YuanW10, author = {Xingliang Yuan and Jia Wang}, title = {Statistical timing verification for transparently latched circuits through structural graph traversal}, booktitle = {Proceedings of the 15th Asia South Pacific Design Automation Conference, {ASP-DAC} 2010, Taipei, Taiwan, January 18-21, 2010}, pages = {663--668}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ASPDAC.2010.5419803}, doi = {10.1109/ASPDAC.2010.5419803}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/YuanW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.