BibTeX records: Xingliang Yuan

download as .bib file

@article{DBLP:journals/pieee/ZhangWYPTP24,
  author       = {He Zhang and
                  Bang Wu and
                  Xingliang Yuan and
                  Shirui Pan and
                  Hanghang Tong and
                  Jian Pei},
  title        = {Trustworthy Graph Neural Networks: Aspects, Methods, and Trends},
  journal      = {Proc. {IEEE}},
  volume       = {112},
  number       = {2},
  pages        = {97--139},
  year         = {2024},
  url          = {https://doi.org/10.1109/JPROC.2024.3369017},
  doi          = {10.1109/JPROC.2024.3369017},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/ZhangWYPTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MeiXXYL24,
  author       = {Lin Mei and
                  Chungen Xu and
                  Lei Xu and
                  Xingliang Yuan and
                  Joseph K. Liu},
  title        = {Practical Multi-Source Multi-Client Searchable Encryption With Forward
                  Privacy: Refined Security Notion and New Constructions},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {63--77},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3245638},
  doi          = {10.1109/TDSC.2023.3245638},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MeiXXYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-17092,
  author       = {Van Nguyen and
                  Tingmin Wu and
                  Xingliang Yuan and
                  Marthie Grobler and
                  Surya Nepal and
                  Carsten Rudolph},
  title        = {A Pioneering Study and An Innovative Information Theory-based Approach
                  to Enhance The Transparency in Phishing Detection},
  journal      = {CoRR},
  volume       = {abs/2402.17092},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.17092},
  doi          = {10.48550/ARXIV.2402.17092},
  eprinttype    = {arXiv},
  eprint       = {2402.17092},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-17092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuZYY23,
  author       = {Xiaoning Liu and
                  Yifeng Zheng and
                  Xingliang Yuan and
                  Xun Yi},
  title        = {Securely Outsourcing Neural Network Inference to the Cloud With Lightweight
                  Techniques},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {620--636},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3141391},
  doi          = {10.1109/TDSC.2022.3141391},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuZYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWYWRY23,
  author       = {Bang Wu and
                  Shuo Wang and
                  Xingliang Yuan and
                  Cong Wang and
                  Carsten Rudolph and
                  Xiangwen Yang},
  title        = {Defeating Misclassification Attacks Against Transfer Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {886--901},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3144988},
  doi          = {10.1109/TDSC.2022.3144988},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuWYWRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengLLYYW23,
  author       = {Yifeng Zheng and
                  Shangqi Lai and
                  Yi Liu and
                  Xingliang Yuan and
                  Xun Yi and
                  Cong Wang},
  title        = {Aggregation Service for Federated Learning: An Efficient, Secure,
                  and More Resilient Realization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {988--1001},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3146448},
  doi          = {10.1109/TDSC.2022.3146448},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengLLYYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/VoYSLNW23,
  author       = {Viet Vo and
                  Xingliang Yuan and
                  Shi{-}Feng Sun and
                  Joseph K. Liu and
                  Surya Nepal and
                  Cong Wang},
  title        = {ShieldDB: An Encrypted Document Database With Padding Countermeasures},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {4},
  pages        = {4236--4252},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2021.3126607},
  doi          = {10.1109/TKDE.2021.3126607},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/VoYSLNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ZhangYZP23,
  author       = {He Zhang and
                  Xingliang Yuan and
                  Chuan Zhou and
                  Shirui Pan},
  title        = {Projective Ranking-Based {GNN} Evasion Attacks},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {8},
  pages        = {8402--8416},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3219209},
  doi          = {10.1109/TKDE.2022.3219209},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ZhangYZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/XuYZWX23,
  author       = {Lei Xu and
                  Xingliang Yuan and
                  Zhengxiang Zhou and
                  Cong Wang and
                  Chungen Xu},
  title        = {Towards Efficient Cryptographic Data Validation Service in Edge Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {656--669},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2021.3111208},
  doi          = {10.1109/TSC.2021.3111208},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/XuYZWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuZXYW23,
  author       = {Lei Xu and
                  Leqian Zheng and
                  Chengzhi Xu and
                  Xingliang Yuan and
                  Cong Wang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Leakage-Abuse Attacks Against Forward and Backward Private Searchable
                  Symmetric Encryption},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3003--3017},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623085},
  doi          = {10.1145/3576915.3623085},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuZXYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/HuangQYC23,
  author       = {Shuo Huang and
                  Lizhen Qu and
                  Xingliang Yuan and
                  Chunyang Chen},
  editor       = {Houda Bouamor and
                  Juan Pino and
                  Kalika Bali},
  title        = {FaLA: Fast Linear Adaptation for Replacing Backbone Models on Edge
                  Devices},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2023, Singapore, December 6-10, 2023},
  pages        = {4874--4885},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.findings-emnlp.323},
  doi          = {10.18653/V1/2023.FINDINGS-EMNLP.323},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/HuangQYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BagherCYRY23,
  author       = {Kassem Bagher and
                  Shujie Cui and
                  Xingliang Yuan and
                  Carsten Rudolph and
                  Xun Yi},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {TimeClave: Oblivious In-Enclave Time Series Processing System},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {719--737},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_42},
  doi          = {10.1007/978-981-99-7356-9\_42},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/BagherCYRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ZhangWWYXPY23,
  author       = {He Zhang and
                  Bang Wu and
                  Shuo Wang and
                  Xiangwen Yang and
                  Minhui Xue and
                  Shirui Pan and
                  Xingliang Yuan},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Demystifying Uneven Vulnerability of Link Stealing Attacks against
                  Graph Neural Networks},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {41737--41752},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/zhang23aq.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/ZhangWWYXPY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/GaoCXCYGY23,
  author       = {Mengzhen Gao and
                  Helei Cui and
                  Yanze Xie and
                  Yaxing Chen and
                  Zhiwen Yu and
                  Bin Guo and
                  Xingliang Yuan},
  title        = {Practical Earphone Eavesdropping with Built-in Motion Sensors},
  booktitle    = {29th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2023, Ocean Flower Island, China, December 17-21, 2023},
  pages        = {2219--2226},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICPADS60453.2023.00299},
  doi          = {10.1109/ICPADS60453.2023.00299},
  timestamp    = {Sun, 14 Apr 2024 20:48:59 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/GaoCXCYGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/XueNLSYRSE23,
  author       = {Minhui Xue and
                  Surya Nepal and
                  Ling Liu and
                  Subbu Sethuvenkatraman and
                  Xingliang Yuan and
                  Carsten Rudolph and
                  Ruoxi Sun and
                  Greg Eisenhauer},
  title        = {RAI4IoE: Responsible {AI} for Enabling the Internet of Energy},
  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  pages        = {13--22},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00012},
  doi          = {10.1109/TPS-ISA58951.2023.00012},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/XueNLSYRSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/HuangZXHYC23,
  author       = {Yujin Huang and
                  Terry Yue Zhuo and
                  Qiongkai Xu and
                  Han Hu and
                  Xingliang Yuan and
                  Chunyang Chen},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Training-free Lexical Backdoor Attacks on Language Models},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2198--2208},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583348},
  doi          = {10.1145/3543507.3583348},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/HuangZXHYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-12951,
  author       = {He Zhang and
                  Xingliang Yuan and
                  Quoc Viet Hung Nguyen and
                  Shirui Pan},
  title        = {On the Interaction between Node Fairness and Edge Privacy in Graph
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2301.12951},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.12951},
  doi          = {10.48550/ARXIV.2301.12951},
  eprinttype    = {arXiv},
  eprint       = {2301.12951},
  timestamp    = {Wed, 01 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-12951.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04116,
  author       = {Yujin Huang and
                  Terry Yue Zhuo and
                  Qiongkai Xu and
                  Han Hu and
                  Xingliang Yuan and
                  Chunyang Chen},
  title        = {Training-free Lexical Backdoor Attacks on Language Models},
  journal      = {CoRR},
  volume       = {abs/2302.04116},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04116},
  doi          = {10.48550/ARXIV.2302.04116},
  eprinttype    = {arXiv},
  eprint       = {2302.04116},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-16652,
  author       = {Kassem Bagher and
                  Shujie Cui and
                  Xingliang Yuan and
                  Carsten Rudolph and
                  Xun Yi},
  title        = {TimeClave: Oblivious In-enclave Time series Processing System},
  journal      = {CoRR},
  volume       = {abs/2306.16652},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.16652},
  doi          = {10.48550/ARXIV.2306.16652},
  eprinttype    = {arXiv},
  eprint       = {2306.16652},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-16652.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-04697,
  author       = {Lei Xu and
                  Leqian Zheng and
                  Chengzhi Xu and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Leakage-Abuse Attacks Against Forward and Backward Private Searchable
                  Symmetric Encryption},
  journal      = {CoRR},
  volume       = {abs/2309.04697},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.04697},
  doi          = {10.48550/ARXIV.2309.04697},
  eprinttype    = {arXiv},
  eprint       = {2309.04697},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-04697.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-11691,
  author       = {Minhui Xue and
                  Surya Nepal and
                  Ling Liu and
                  Subbu Sethuvenkatraman and
                  Xingliang Yuan and
                  Carsten Rudolph and
                  Ruoxi Sun and
                  Greg Eisenhauer},
  title        = {RAI4IoE: Responsible {AI} for Enabling the Internet of Energy},
  journal      = {CoRR},
  volume       = {abs/2309.11691},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.11691},
  doi          = {10.48550/ARXIV.2309.11691},
  eprinttype    = {arXiv},
  eprint       = {2309.11691},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-11691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-20448,
  author       = {Ziyao Liu and
                  Yu Jiang and
                  Jiyuan Shen and
                  Minyi Peng and
                  Kwok{-}Yan Lam and
                  Xingliang Yuan},
  title        = {A Survey on Federated Unlearning: Challenges, Methods, and Future
                  Directions},
  journal      = {CoRR},
  volume       = {abs/2310.20448},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.20448},
  doi          = {10.48550/ARXIV.2310.20448},
  eprinttype    = {arXiv},
  eprint       = {2310.20448},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-20448.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-07861,
  author       = {Bang Wu and
                  He Zhang and
                  Xiangwen Yang and
                  Shuo Wang and
                  Minhui Xue and
                  Shirui Pan and
                  Xingliang Yuan},
  title        = {GraphGuard: Detecting and Counteracting Training Data Misuse in Graph
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2312.07861},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.07861},
  doi          = {10.48550/ARXIV.2312.07861},
  eprinttype    = {arXiv},
  eprint       = {2312.07861},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-07861.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-07870,
  author       = {Bang Wu and
                  Xingliang Yuan and
                  Shuo Wang and
                  Qi Li and
                  Minhui Xue and
                  Shirui Pan},
  title        = {Securing Graph Neural Networks in MLaaS: {A} Comprehensive Realization
                  of Query-based Integrity Verification},
  journal      = {CoRR},
  volume       = {abs/2312.07870},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.07870},
  doi          = {10.48550/ARXIV.2312.07870},
  eprinttype    = {arXiv},
  eprint       = {2312.07870},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-07870.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GanLWYSHZW22,
  author       = {Qingqing Gan and
                  Joseph K. Liu and
                  Xiaoming Wang and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Daxin Huang and
                  Cong Zuo and
                  Jianfeng Wang},
  title        = {Verifiable searchable symmetric encryption for conjunctive keyword
                  queries in cloud storage},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {6},
  pages        = {166820},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-021-0601-8},
  doi          = {10.1007/S11704-021-0601-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/GanLWYSHZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiuZYY22,
  author       = {Xiaoning Liu and
                  Yifeng Zheng and
                  Xingliang Yuan and
                  Xun Yi},
  title        = {Deep learning-based medical diagnostic services: {A} secure, lightweight,
                  and accurate realization},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {6},
  pages        = {795--827},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-210165},
  doi          = {10.3233/JCS-210165},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/LiuZYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunZLSSYYG22,
  author       = {Shifeng Sun and
                  Cong Zuo and
                  Joseph K. Liu and
                  Amin Sakzad and
                  Ron Steinfeld and
                  Tsz Hon Yuen and
                  Xingliang Yuan and
                  Dawu Gu},
  title        = {Non-Interactive Multi-Client Searchable Encryption: Realization and
                  Implementation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {452--467},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2973633},
  doi          = {10.1109/TDSC.2020.2973633},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SunZLSSYYG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LaiYSLSSL22,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Dongxi Liu},
  title        = {Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2609--2621},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3065652},
  doi          = {10.1109/TDSC.2021.3065652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LaiYSLSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuWYY22,
  author       = {Xiaoning Liu and
                  Bang Wu and
                  Xingliang Yuan and
                  Xun Yi},
  title        = {Leia: {A} Lightweight Cryptographic Neural Network Inference System
                  at the Edge},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {237--252},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2021.3138611},
  doi          = {10.1109/TIFS.2021.3138611},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuWYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhuLYY22,
  author       = {Yuanshao Zhu and
                  Yi Liu and
                  James J. Q. Yu and
                  Xingliang Yuan},
  title        = {Semi-Supervised Federated Learning for Travel Mode Identification
                  From {GPS} Trajectories},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {2380--2391},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3092015},
  doi          = {10.1109/TITS.2021.3092015},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/ZhuLYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WuYPY22,
  author       = {Bang Wu and
                  Xiangwen Yang and
                  Shirui Pan and
                  Xingliang Yuan},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {337--350},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497753},
  doi          = {10.1145/3488932.3497753},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WuYPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuXYWL22,
  author       = {Yi Liu and
                  Lei Xu and
                  Xingliang Yuan and
                  Cong Wang and
                  Bo Li},
  title        = {The Right to be Forgotten in Federated Learning: An Efficient Realization
                  with Rapid Retraining},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications,
                  London, United Kingdom, May 2-5, 2022},
  pages        = {1749--1758},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOM48880.2022.9796721},
  doi          = {10.1109/INFOCOM48880.2022.9796721},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuXYWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShenYLYSLN22,
  author       = {Yanjun Shen and
                  Bin Yu and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Surya Nepal},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {OblivSend: Secure and Ephemeral File Sharing Services with Oblivious
                  Expiration Control},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {269--289},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_17},
  doi          = {10.1007/978-3-031-22390-7\_17},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ShenYLYSLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangFWZ0Y22,
  author       = {Dabao Wang and
                  Hang Feng and
                  Siwei Wu and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan},
  title        = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval
                  of {ERC20} Tokens on Ethereum},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {99--114},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545963},
  doi          = {10.1145/3545948.3545963},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangFWZ0Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/XuYZWX22,
  author       = {Lei Xu and
                  Xingliang Yuan and
                  Zhengxiang Zhou and
                  Cong Wang and
                  Chungen Xu},
  editor       = {Claudio Agostino Ardagna and
                  Carl K. Chang and
                  Rong N. Chang and
                  Ernesto Damiani and
                  Robert Ward and
                  Fatos Xhafa and
                  Jia Zhang},
  title        = {Towards Efficient Cryptographic Data Validation Service in Edge Computing},
  booktitle    = {{IEEE} World Congress on Services, {SERVICES} 2022, Barcelona, Spain,
                  July 10-16, 2022},
  pages        = {14},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SERVICES55459.2022.00027},
  doi          = {10.1109/SERVICES55459.2022.00027},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/services/XuYZWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/adhocnets/2021,
  editor       = {Wei Bao and
                  Xingliang Yuan and
                  Longxiang Gao and
                  Tom H. Luan and
                  David Bong Jun Choi},
  title        = {Ad Hoc Networks and Tools for {IT} - 13th {EAI} International Conference,
                  {ADHOCNETS} 2021, Virtual Event, December 6-7, 2021, and 16th {EAI}
                  International Conference, {TRIDENTCOM} 2021, Virtual Event, November
                  24, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {428},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98005-4},
  doi          = {10.1007/978-3-030-98005-4},
  isbn         = {978-3-030-98004-7},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/adhocnets/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2022,
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2},
  doi          = {10.1007/978-3-031-23020-2},
  isbn         = {978-3-031-23019-6},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-01971,
  author       = {Yifeng Zheng and
                  Shangqi Lai and
                  Yi Liu and
                  Xingliang Yuan and
                  Xun Yi and
                  Cong Wang},
  title        = {Aggregation Service for Federated Learning: An Efficient, Secure,
                  and More Resilient Realization},
  journal      = {CoRR},
  volume       = {abs/2202.01971},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.01971},
  eprinttype    = {arXiv},
  eprint       = {2202.01971},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-01971.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-12993,
  author       = {He Zhang and
                  Xingliang Yuan and
                  Chuan Zhou and
                  Shirui Pan},
  title        = {Projective Ranking-based {GNN} Evasion Attacks},
  journal      = {CoRR},
  volume       = {abs/2202.12993},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.12993},
  eprinttype    = {arXiv},
  eprint       = {2202.12993},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-12993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-07320,
  author       = {Yi Liu and
                  Lei Xu and
                  Xingliang Yuan and
                  Cong Wang and
                  Bo Li},
  title        = {The Right to be Forgotten in Federated Learning: An Efficient Realization
                  with Rapid Retraining},
  journal      = {CoRR},
  volume       = {abs/2203.07320},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.07320},
  doi          = {10.48550/ARXIV.2203.07320},
  eprinttype    = {arXiv},
  eprint       = {2203.07320},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-07320.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-07424,
  author       = {He Zhang and
                  Bang Wu and
                  Xingliang Yuan and
                  Shirui Pan and
                  Hanghang Tong and
                  Jian Pei},
  title        = {Trustworthy Graph Neural Networks: Aspects, Methods and Trends},
  journal      = {CoRR},
  volume       = {abs/2205.07424},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.07424},
  doi          = {10.48550/ARXIV.2205.07424},
  eprinttype    = {arXiv},
  eprint       = {2205.07424},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-07424.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-01790,
  author       = {Dabao Wang and
                  Hang Feng and
                  Siwei Wu and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan},
  title        = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval
                  of {ERC20} Tokens on Ethereum},
  journal      = {CoRR},
  volume       = {abs/2207.01790},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.01790},
  doi          = {10.48550/ARXIV.2207.01790},
  eprinttype    = {arXiv},
  eprint       = {2207.01790},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-01790.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZYY22,
  author       = {Xiaoning Liu and
                  Yifeng Zheng and
                  Xingliang Yuan and
                  Xun Yi},
  title        = {Deep Learning-Based Medical Diagnostic Services: {A} Secure, Lightweight,
                  and Accurate Realization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {899},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/899},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenLSYZ21,
  author       = {Yanli Ren and
                  Xiangyu Li and
                  Shifeng Sun and
                  Xingliang Yuan and
                  Xinpeng Zhang},
  title        = {Privacy-preserving batch verification signature scheme based on blockchain
                  for Vehicular Ad-Hoc Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102698},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102698},
  doi          = {10.1016/J.JISA.2020.102698},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiWYW21,
  author       = {Chengjun Cai and
                  Jian Weng and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Enabling Reliable Keyword Search in Encrypted Decentralized Storage
                  with Fairness},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {131--144},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2877332},
  doi          = {10.1109/TDSC.2018.2877332},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaiWYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/XuSYLZX21,
  author       = {Lei Xu and
                  Shifeng Sun and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Cong Zuo and
                  Chungen Xu},
  title        = {Enabling Authorized Encrypted Search for Multi-Authority Medical Databases},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {534--546},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2019.2905572},
  doi          = {10.1109/TETC.2019.2905572},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/XuSYLZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuDZYW21,
  author       = {Lei Xu and
                  Huayi Duan and
                  Anxin Zhou and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {5310--5325},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3128823},
  doi          = {10.1109/TIFS.2021.3128823},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuDZYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/CuiYZW21,
  author       = {Helei Cui and
                  Xingliang Yuan and
                  Yifeng Zheng and
                  Cong Wang},
  title        = {Towards Encrypted In-Network Storage Services with Secure Near-Duplicate
                  Detection},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {998--1012},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSC.2018.2850333},
  doi          = {10.1109/TSC.2018.2850333},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/CuiYZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/WuPY21,
  author       = {Bang Wu and
                  Shirui Pan and
                  Xingliang Yuan},
  title        = {Towards Extracting Graph Neural Network Models via Prediction Queries
                  (Student Abstract)},
  booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2021, Thirty-Third Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9,
                  2021},
  pages        = {15925--15926},
  publisher    = {{AAAI} Press},
  year         = {2021},
  url          = {https://doi.org/10.1609/aaai.v35i18.17959},
  doi          = {10.1609/AAAI.V35I18.17959},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/WuPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/VoLYNL21,
  author       = {Viet Vo and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Surya Nepal and
                  Joseph K. Liu},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Towards Efficient and Strong Backward Private Searchable Encryption
                  with Secure Enclaves},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12726},
  pages        = {50--75},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78372-3\_3},
  doi          = {10.1007/978-3-030-78372-3\_3},
  timestamp    = {Wed, 09 Jun 2021 10:50:14 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/VoLYNL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/ZhangWY0WYP21,
  author       = {He Zhang and
                  Bang Wu and
                  Xiangwen Yang and
                  Chuan Zhou and
                  Shuo Wang and
                  Xingliang Yuan and
                  Shirui Pan},
  editor       = {Gianluca Demartini and
                  Guido Zuccon and
                  J. Shane Culpepper and
                  Zi Huang and
                  Hanghang Tong},
  title        = {Projective Ranking: {A} Transferable Evasion Attack Method on Graph
                  Neural Networks},
  booktitle    = {{CIKM} '21: The 30th {ACM} International Conference on Information
                  and Knowledge Management, Virtual Event, Queensland, Australia, November
                  1 - 5, 2021},
  pages        = {3617--3621},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459637.3482161},
  doi          = {10.1145/3459637.3482161},
  timestamp    = {Tue, 16 Aug 2022 23:04:38 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/ZhangWY0WYP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuZYY21,
  author       = {Xiaoning Liu and
                  Yifeng Zheng and
                  Xingliang Yuan and
                  Xun Yi},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {[inline-graphic not available: see fulltext] : Towards Secure and
                  Lightweight Deep Learning as a Medical Diagnostic Service},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {519--541},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_25},
  doi          = {10.1007/978-3-030-88418-5\_25},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuZYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/WuYPY21,
  author       = {Bang Wu and
                  Xiangwen Yang and
                  Shirui Pan and
                  Xingliang Yuan},
  editor       = {James Bailey and
                  Pauli Miettinen and
                  Yun Sing Koh and
                  Dacheng Tao and
                  Xindong Wu},
  title        = {Adapting Membership Inference Attacks to {GNN} for Graph Classification:
                  Approaches and Implications},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2021, Auckland,
                  New Zealand, December 7-10, 2021},
  pages        = {1421--1426},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDM51629.2021.00182},
  doi          = {10.1109/ICDM51629.2021.00182},
  timestamp    = {Mon, 31 Jan 2022 08:58:55 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/WuYPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShenYSLN21,
  author       = {Yanjun Shen and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Surya Nepal},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  Guilin Wang and
                  Jian Shen and
                  Mark Ryan and
                  Weizhi Meng and
                  Ding Wang},
  title        = {OblivShare: Towards Privacy-Preserving File Sharing with Oblivious
                  Expiration Control},
  booktitle    = {Information Security Practice and Experience: 16th International Conference,
                  {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13107},
  pages        = {126--146},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93206-0\_9},
  doi          = {10.1007/978-3-030-93206-0\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ShenYSLN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LaiYLY0LN21,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Xun Yi and
                  Qi Li and
                  Dongxi Liu and
                  Surya Nepal},
  title        = {OblivSketch: Oblivious Network Measurement as a Cloud Service},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/oblivsketch-oblivious-network-measurement-as-a-cloud-service/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LaiYLY0LN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SunSLYSLNG21,
  author       = {Shifeng Sun and
                  Ron Steinfeld and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Amin Sakzad and
                  Joseph K. Liu and
                  Surya Nepal and
                  Dawu Gu},
  title        = {Practical Non-Interactive Searchable Encryption with Forward and Backward
                  Privacy},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/practical-non-interactive-searchable-encryption-with-forward-and-backward-privacy/},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SunSLYSLNG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/qshine/2021,
  editor       = {Xingliang Yuan and
                  Wei Bao and
                  Xun Yi and
                  Nguyen Hoang Tran},
  title        = {Quality, Reliability, Security and Robustness in Heterogeneous Systems
                  - 17th {EAI} International Conference, QShine 2021, Virtual Event,
                  November 29-30, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {402},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91424-0},
  doi          = {10.1007/978-3-030-91424-0},
  isbn         = {978-3-030-91423-3},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qshine/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-15068,
  author       = {Siwei Wu and
                  Dabao Wang and
                  Jianting He and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan and
                  Qinming He and
                  Kui Ren},
  title        = {DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications},
  journal      = {CoRR},
  volume       = {abs/2104.15068},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.15068},
  eprinttype    = {arXiv},
  eprint       = {2104.15068},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-15068.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-08760,
  author       = {Bang Wu and
                  Xiangwen Yang and
                  Shirui Pan and
                  Xingliang Yuan},
  title        = {Adapting Membership Inference Attacks to {GNN} for Graph Classification:
                  Approaches and Implications},
  journal      = {CoRR},
  volume       = {abs/2110.08760},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.08760},
  eprinttype    = {arXiv},
  eprint       = {2110.08760},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-08760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZuoLYLSW21,
  author       = {Cong Zuo and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Jun Shao and
                  Huaxiong Wang},
  title        = {Searchable Encryption for Conjunctive Queries with Extended Forward
                  and Backward Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1585},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1585},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZuoLYLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuDZYW21,
  author       = {Lei Xu and
                  Huayi Duan and
                  Anxin Zhou and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1593},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1593},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/XuDZYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccfton/YuanCWW20,
  author       = {Xingliang Yuan and
                  Chengjun Cai and
                  Cong Wang and
                  Qian Wang},
  title        = {A scalable ledger-assisted architecture for secure query processing
                  over distributed IoT data},
  journal      = {{CCF} Trans. Netw.},
  volume       = {3},
  number       = {2},
  pages        = {97--111},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42045-020-00038-7},
  doi          = {10.1007/S42045-020-00038-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccfton/YuanCWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LaiYSSLL20,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Amin Sakzad and
                  Mahsa Salehi and
                  Joseph K. Liu and
                  Dongxi Liu},
  title        = {Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted
                  Incremental Data Sets},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {2651--2662},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2949374},
  doi          = {10.1109/JIOT.2019.2949374},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LaiYSSLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GuoWWYJ20,
  author       = {Yu Guo and
                  Mingyue Wang and
                  Cong Wang and
                  Xingliang Yuan and
                  Xiaohua Jia},
  title        = {Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {6},
  pages        = {5359--5370},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2978261},
  doi          = {10.1109/JIOT.2020.2978261},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GuoWWYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengDY020,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {121--133},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2753245},
  doi          = {10.1109/TDSC.2017.2753245},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/YuanYZLW20,
  author       = {Xu Yuan and
                  Xingliang Yuan and
                  Yihe Zhang and
                  Baochun Li and
                  Cong Wang},
  title        = {Enabling Encrypted Boolean Queries in Geographically Distributed Databases},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {31},
  number       = {3},
  pages        = {634--646},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPDS.2019.2940945},
  doi          = {10.1109/TPDS.2019.2940945},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/YuanYZLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/JiangZSYGW20,
  author       = {Jinghua Jiang and
                  Yifeng Zheng and
                  Zhenkui Shi and
                  Xingliang Yuan and
                  Xiaolin Gui and
                  Cong Wang},
  title        = {A Practical System for Privacy-Aware Targeted Mobile Advertising Services},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {410--424},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSC.2017.2697385},
  doi          = {10.1109/TSC.2017.2697385},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/JiangZSYGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/VoLYSNL20,
  author       = {Viet Vo and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Surya Nepal and
                  Joseph K. Liu},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Accelerating Forward and Backward Private Searchable Encryption Using
                  Trusted Execution},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {83--103},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_5},
  doi          = {10.1007/978-3-030-57878-7\_5},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/VoLYSNL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-01848,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Dongxi Liu},
  title        = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure
                  Middleboxes},
  journal      = {CoRR},
  volume       = {abs/2001.01848},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.01848},
  eprinttype    = {arXiv},
  eprint       = {2001.01848},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-01848.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-03743,
  author       = {Viet Vo and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Surya Nepal and
                  Joseph K. Liu},
  title        = {Accelerating Forward and Backward Private Searchable Encryption Using
                  Trusted Execution},
  journal      = {CoRR},
  volume       = {abs/2001.03743},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.03743},
  eprinttype    = {arXiv},
  eprint       = {2001.03743},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-03743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06103,
  author       = {Viet Vo and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Surya Nepal and
                  Cong Wang},
  title        = {ShieldDB: An Encrypted Document Database with Padding Countermeasures},
  journal      = {CoRR},
  volume       = {abs/2003.06103},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06103},
  eprinttype    = {arXiv},
  eprint       = {2003.06103},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06103.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-02931,
  author       = {Yi Liu and
                  Xingliang Yuan and
                  Zehui Xiong and
                  Jiawen Kang and
                  Xiaofei Wang and
                  Dusit Niyato},
  title        = {Federated Learning for 6G Communications: Challenges, Methods, and
                  Future Directions},
  journal      = {CoRR},
  volume       = {abs/2006.02931},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.02931},
  eprinttype    = {arXiv},
  eprint       = {2006.02931},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-02931.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12252,
  author       = {Dabao Wang and
                  Siwei Wu and
                  Ziling Lin and
                  Lei Wu and
                  Xingliang Yuan and
                  Yajin Zhou and
                  Haoyu Wang and
                  Kui Ren},
  title        = {Towards understanding flash loan and its applications in defi ecosystem},
  journal      = {CoRR},
  volume       = {abs/2010.12252},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12252},
  eprinttype    = {arXiv},
  eprint       = {2010.12252},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12252.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12751,
  author       = {Bang Wu and
                  Xiangwen Yang and
                  Shirui Pan and
                  Xingliang Yuan},
  title        = {Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization},
  journal      = {CoRR},
  volume       = {abs/2010.12751},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12751},
  eprinttype    = {arXiv},
  eprint       = {2010.12751},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12751.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-04432,
  author       = {Yi Liu and
                  Xingliang Yuan and
                  Ruihui Zhao and
                  Yifeng Zheng and
                  Yefeng Zheng},
  title        = {{RC-SSFL:} Towards Robust and Communication-efficient Semi-supervised
                  Federated Learning System},
  journal      = {CoRR},
  volume       = {abs/2012.04432},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.04432},
  eprinttype    = {arXiv},
  eprint       = {2012.04432},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-04432.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiYSLSSL20,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Dongxi Liu},
  title        = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure
                  Middleboxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/020},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiYSLSSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWYY20,
  author       = {Xiaoning Liu and
                  Bang Wu and
                  Xingliang Yuan and
                  Xun Yi},
  title        = {Leia: {A} Lightweight Cryptographic Neural Network Inference System
                  at the Edge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/463},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DuanZWY19,
  author       = {Huayi Duan and
                  Yifeng Zheng and
                  Cong Wang and
                  Xingliang Yuan},
  title        = {Treasure Collection on Foggy Islands: Building Secure Network Archives
                  for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {2637--2650},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2872461},
  doi          = {10.1109/JIOT.2018.2872461},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DuanZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YuanYLW19,
  author       = {Xu Yuan and
                  Xingliang Yuan and
                  Baochun Li and
                  Cong Wang},
  title        = {Toward Secure and Scalable Computation in Internet of Things Data
                  Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {3753--3763},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2890728},
  doi          = {10.1109/JIOT.2018.2890728},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YuanYLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/GuoYWWLJ19,
  author       = {Yu Guo and
                  Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Baochun Li and
                  Xiaohua Jia},
  title        = {Enabling Encrypted Rich Queries in Distributed Key-Value Stores},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {30},
  number       = {6},
  pages        = {1283--1297},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPDS.2018.2885519},
  doi          = {10.1109/TPDS.2018.2885519},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/GuoYWWLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiYSLLL19,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Yuhong Liu and
                  Dongxi Liu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {GraphSE{\({^2}\)}: An Encrypted Graph Database for Privacy-Preserving
                  Social Search},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {41--54},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329803},
  doi          = {10.1145/3321705.3329803},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiYSLLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuYSWX19,
  author       = {Lei Xu and
                  Xingliang Yuan and
                  Ron Steinfeld and
                  Cong Wang and
                  Chungen Xu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {122--133},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329814},
  doi          = {10.1145/3321705.3329814},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuYSWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuanWYZW019,
  author       = {Huayi Duan and
                  Cong Wang and
                  Xingliang Yuan and
                  Yajin Zhou and
                  Qian Wang and
                  Kui Ren},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2351--2367},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339814},
  doi          = {10.1145/3319535.3339814},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DuanWYZW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/YuanCW019,
  author       = {Xingliang Yuan and
                  Chengjun Cai and
                  Qian Wang and
                  Qi Li},
  title        = {Towards a Ledger-Assisted Architecture for Secure Query Processing
                  over Distributed IoT Data},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937714},
  doi          = {10.1109/DSC47296.2019.8937714},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/YuanCW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/WuLLYYW19,
  author       = {Songrui Wu and
                  Qi Li and
                  Guoliang Li and
                  Dong Yuan and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced
                  Database},
  booktitle    = {35th {IEEE} International Conference on Data Engineering, {ICDE} 2019,
                  Macao, China, April 8-11, 2019},
  pages        = {626--637},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDE.2019.00062},
  doi          = {10.1109/ICDE.2019.00062},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/WuLLYYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0015YWWX19,
  author       = {Lei Xu and
                  Xingliang Yuan and
                  Cong Wang and
                  Qian Wang and
                  Chungen Xu},
  title        = {Hardening Database Padding for Searchable Encryption},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2503--2511},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737588},
  doi          = {10.1109/INFOCOM.2019.8737588},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/0015YWWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-04501,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Yuhong Liu and
                  Dongxi Liu},
  title        = {GraphSE\({}^{\mbox{2}}\): An Encrypted Graph Database for Privacy-Preserving
                  Social Search},
  journal      = {CoRR},
  volume       = {abs/1905.04501},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.04501},
  eprinttype    = {arXiv},
  eprint       = {1905.04501},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-04501.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-11230,
  author       = {Bang Wu and
                  Xiangwen Yang and
                  Shuo Wang and
                  Xingliang Yuan and
                  Cong Wang and
                  Carsten Rudolph},
  title        = {Defending Against Misclassification Attacks in Transfer Learning},
  journal      = {CoRR},
  volume       = {abs/1908.11230},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.11230},
  eprinttype    = {arXiv},
  eprint       = {1908.11230},
  timestamp    = {Thu, 23 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-11230.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-05927,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Amin Sakzad and
                  Mahsa Salehi and
                  Joseph K. Liu and
                  Dongxi Liu},
  title        = {Enabling Efficient Privacy-Assured Outlier Detection over Encrypted
                  Incremental Datasets},
  journal      = {CoRR},
  volume       = {abs/1911.05927},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.05927},
  eprinttype    = {arXiv},
  eprint       = {1911.05927},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-05927.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WangYCR18,
  author       = {Cong Wang and
                  Xingliang Yuan and
                  Yong Cui and
                  Kui Ren},
  title        = {Toward Secure Outsourced Middlebox Services: Practices, Challenges,
                  and Beyond},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {1},
  pages        = {166--171},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2017.1700060},
  doi          = {10.1109/MNET.2017.1700060},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/WangYCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuanWWSR18,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Anna Cinzia Squicciarini and
                  Kui Ren},
  title        = {Towards Privacy-Preserving and Practical Image-Centric Social Discovery},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {868--882},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2609930},
  doi          = {10.1109/TDSC.2016.2609930},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YuanWWSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YuanDW18,
  author       = {Xingliang Yuan and
                  Huayi Duan and
                  Cong Wang},
  title        = {Assuring String Pattern Matching in Outsourced Middleboxes},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {26},
  number       = {3},
  pages        = {1362--1375},
  year         = {2018},
  url          = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2822837},
  doi          = {10.1109/TNET.2018.2822837},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YuanDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ZhuLWYWR18,
  author       = {Jie Zhu and
                  Qi Li and
                  Cong Wang and
                  Xingliang Yuan and
                  Qian Wang and
                  Kui Ren},
  title        = {Enabling Generic, Verifiable, and Secure Data Search in Cloud Services},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {29},
  number       = {8},
  pages        = {1721--1735},
  year         = {2018},
  url          = {https://doi.org/10.1109/TPDS.2018.2808283},
  doi          = {10.1109/TPDS.2018.2808283},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ZhuLWYWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/YuanWWR18,
  author       = {Xingliang Yuan and
                  Jian Weng and
                  Cong Wang and
                  Kui Ren},
  title        = {Secure Integrated Circuit Design via Hybrid Cloud},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {29},
  number       = {8},
  pages        = {1851--1864},
  year         = {2018},
  url          = {https://doi.org/10.1109/TPDS.2018.2807844},
  doi          = {10.1109/TPDS.2018.2807844},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/YuanWWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunYLSSVN18,
  author       = {Shifeng Sun and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Viet Vo and
                  Surya Nepal},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Practical Backward-Secure Searchable Encryption from Symmetric Puncturable
                  Encryption},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {763--780},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243782},
  doi          = {10.1145/3243734.3243782},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunYLSSVN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SuiLZYLQ18,
  author       = {Zhimei Sui and
                  Shangqi Lai and
                  Cong Zuo and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Haifeng Qian},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {An Encrypted Database with Enforced Access Control and Blockchain
                  Validation},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {260--273},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_14},
  doi          = {10.1007/978-3-030-14234-6\_14},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/SuiLZYLQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/CuiW0DY18,
  author       = {Helei Cui and
                  Cong Wang and
                  Yu Hua and
                  Yuefeng Du and
                  Xingliang Yuan},
  title        = {A Bandwidth-Efficient Middleware for Encrypted Deduplication},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625127},
  doi          = {10.1109/DESEC.2018.8625127},
  timestamp    = {Thu, 23 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/CuiW0DY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TangWYW18,
  author       = {Xiaoting Tang and
                  Cong Wang and
                  Xingliang Yuan and
                  Qian Wang},
  title        = {Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing
                  Applications},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {1988--1996},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486371},
  doi          = {10.1109/INFOCOM.2018.8486371},
  timestamp    = {Thu, 23 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/TangWYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/GuoWYJ18,
  author       = {Yu Guo and
                  Cong Wang and
                  Xingliang Yuan and
                  Xiaohua Jia},
  title        = {Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes},
  booktitle    = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2018, Banff, AB, Canada, June 4-6, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWQoS.2018.8624187},
  doi          = {10.1109/IWQOS.2018.8624187},
  timestamp    = {Wed, 18 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/GuoWYJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYL18,
  author       = {Xiaoning Liu and
                  Xingliang Yuan and
                  Joseph K. Liu},
  title        = {Towards Privacy-Preserving Forensic Analysis for Time-Series Medical
                  Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1664--1668},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00247},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanWWYN17,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Chenyun Yu and
                  Sarana Nutanong},
  title        = {Privacy-Preserving Similarity Joins Over Encrypted Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2763--2775},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2721221},
  doi          = {10.1109/TIFS.2017.2721221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanWWYN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YuNLWY17,
  author       = {Chenyun Yu and
                  Sarana Nutanong and
                  Hangyu Li and
                  Cong Wang and
                  Xingliang Yuan},
  title        = {A Generic Method for Accelerating LSH-Based Similarity Join Processing},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {29},
  number       = {4},
  pages        = {712--726},
  year         = {2017},
  url          = {https://doi.org/10.1109/TKDE.2016.2638838},
  doi          = {10.1109/TKDE.2016.2638838},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/YuNLWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/CuiYW17,
  author       = {Helei Cui and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile
                  Image Sharing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {1315--1329},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMC.2016.2595573},
  doi          = {10.1109/TMC.2016.2595573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/CuiYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/ZhengYWJWG17,
  author       = {Yifeng Zheng and
                  Xingliang Yuan and
                  Xinyu Wang and
                  Jinghua Jiang and
                  Cong Wang and
                  Xiaolin Gui},
  title        = {Toward Encrypted Cloud Media Center With Secure Deduplication},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {19},
  number       = {2},
  pages        = {251--265},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMM.2016.2612760},
  doi          = {10.1109/TMM.2016.2612760},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/ZhengYWJWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShiLY17,
  author       = {Zhenkui Shi and
                  Xiaoning Liu and
                  Xingliang Yuan},
  editor       = {Cong Wang and
                  Murat Kantarcioglu},
  title        = {Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination},
  booktitle    = {Proceedings of the Fifth {ACM} International Workshop on Security
                  in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {51--57},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055259.3055269},
  doi          = {10.1145/3055259.3055269},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShiLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuanGWWLJ17,
  author       = {Xingliang Yuan and
                  Yu Guo and
                  Xinyu Wang and
                  Cong Wang and
                  Baochun Li and
                  Xiaohua Jia},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {EncKV: An Encrypted Key-value Store with Rich Queries},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {423--435},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052977},
  doi          = {10.1145/3052973.3052977},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuanGWWLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanYLW17,
  author       = {Xu Yuan and
                  Xingliang Yuan and
                  Baochun Li and
                  Cong Wang},
  title        = {Secure multi-client data access with boolean queries in distributed
                  key-value stores},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228619},
  doi          = {10.1109/CNS.2017.8228619},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanYLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CaiYW17,
  author       = {Chengjun Cai and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Towards trustworthy and private keyword search in encrypted decentralized
                  storage},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996810},
  doi          = {10.1109/ICC.2017.7996810},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/CaiYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/YuNLWY17,
  author       = {Chenyun Yu and
                  Sarana Nutanong and
                  Hangyu Li and
                  Cong Wang and
                  Xingliang Yuan},
  title        = {A Generic Method for Accelerating LSH-Based Similarity Join Processing
                  (Extended Abstract)},
  booktitle    = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017,
                  San Diego, CA, USA, April 19-22, 2017},
  pages        = {29--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDE.2017.21},
  doi          = {10.1109/ICDE.2017.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/YuNLWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LiuYW17,
  author       = {Xiaoning Liu and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {EncSIM: An encrypted similarity search service for distributed high-dimensional
                  datasets},
  booktitle    = {25th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2017, Vilanova i la Geltr{\'{u}}, Spain, June 14-16, 2017},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IWQoS.2017.7969151},
  doi          = {10.1109/IWQOS.2017.7969151},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/LiuYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/CaiY017,
  author       = {Chengjun Cai and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Hardening Distributed and Encrypted Keyword Search via Blockchain},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {119--128},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.36},
  doi          = {10.1109/PAC.2017.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/CaiY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DuanYW17,
  author       = {Huayi Duan and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {LightBox: SGX-assisted Secure Network Functions at Near-native Speed},
  journal      = {CoRR},
  volume       = {abs/1706.06261},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.06261},
  eprinttype    = {arXiv},
  eprint       = {1706.06261},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DuanYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangZYSGWY16,
  author       = {Jinghua Jiang and
                  Yifeng Zheng and
                  Xingliang Yuan and
                  Zhenkui Shi and
                  Xiaolin Gui and
                  Cong Wang and
                  Jing Yao},
  title        = {Towards Secure and Accurate Targeted Mobile Coupon Delivery},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {8116--8126},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2624779},
  doi          = {10.1109/ACCESS.2016.2624779},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JiangZYSGWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/YuanWWCWWML16,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Jinfan Wang and
                  Yilei Chu and
                  Cong Wang and
                  Jianping Wang and
                  Marie{-}Jos{\'{e}} Montpetit and
                  Shucheng Liu},
  title        = {Enabling Secure and Efficient Video Delivery Through Encrypted In-Network
                  Caching},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {34},
  number       = {8},
  pages        = {2077--2090},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSAC.2016.2577301},
  doi          = {10.1109/JSAC.2016.2577301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/YuanWWCWWML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/YuanWWWR16,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Jian Weng and
                  Kui Ren},
  title        = {Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring
                  via Compressive Sensing},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {18},
  number       = {10},
  pages        = {2002--2014},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMM.2016.2602758},
  doi          = {10.1109/TMM.2016.2602758},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/YuanWWWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuanWWQL16,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Chen Qian and
                  Jianxiong Lin},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Building an Encrypted, Distributed, and Searchable Key-value Store},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {547--558},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897852},
  doi          = {10.1145/2897845.2897852},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuanWWQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/DaiYW16,
  author       = {Chengcheng Dai and
                  Xingliang Yuan and
                  Cong Wang},
  editor       = {Hien T. Nguyen and
                  V{\'{a}}clav Sn{\'{a}}sel},
  title        = {Privacy-Preserving Ridesharing Recommendation in Geosocial Networks},
  booktitle    = {Computational Social Networks - 5th International Conference, CSoNet
                  2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9795},
  pages        = {193--205},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42345-6\_17},
  doi          = {10.1007/978-3-319-42345-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/csonet/DaiYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/YuanDW16,
  author       = {Xingliang Yuan and
                  Huayi Duan and
                  Cong Wang},
  title        = {Bringing execution assurances of pattern matching in outsourced middleboxes},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784424},
  doi          = {10.1109/ICNP.2016.7784424},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/YuanDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/YuanDW16a,
  author       = {Xingliang Yuan and
                  Huayi Duan and
                  Cong Wang},
  title        = {Towards verifiable outsourced middleboxes},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784466},
  doi          = {10.1109/ICNP.2016.7784466},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/YuanDW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CuiYZW16,
  author       = {Helei Cui and
                  Xingliang Yuan and
                  Yifeng Zheng and
                  Cong Wang},
  title        = {Enabling secure and effective near-duplicate detection over encrypted
                  in-network storage},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524346},
  doi          = {10.1109/INFOCOM.2016.7524346},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CuiYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YuanWLW16,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Jianxiong Lin and
                  Cong Wang},
  title        = {Privacy-preserving deep packet inspection in outsourced middleboxes},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524526},
  doi          = {10.1109/INFOCOM.2016.7524526},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/YuanWLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengYWJWG15,
  author       = {Yifeng Zheng and
                  Xingliang Yuan and
                  Xinyu Wang and
                  Jinghua Jiang and
                  Cong Wang and
                  Xiaolin Gui},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Enabling Encrypted Cloud Media Center with Secure Deduplication},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714628},
  doi          = {10.1145/2714576.2714628},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhengYWJWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuanWR15,
  author       = {Xingliang Yuan and
                  Cong Wang and
                  Kui Ren},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Enabling {IP} Protection for Outsourced Integrated Circuit Design},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {237--247},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714601},
  doi          = {10.1145/2714576.2714601},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuanWR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanWCWQ15,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Yilei Chu and
                  Cong Wang and
                  Chen Qian},
  title        = {Towards a scalable, private, and searchable key-value store},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {773--774},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346929},
  doi          = {10.1109/CNS.2015.7346929},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanWCWQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YuanCWW15,
  author       = {Xingliang Yuan and
                  Helei Cui and
                  Xinyu Wang and
                  Cong Wang},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted
                  Records},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {40--60},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_3},
  doi          = {10.1007/978-3-319-24177-7\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YuanCWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiangSYWG15,
  author       = {Jinghua Jiang and
                  Zhenkui Shi and
                  Xingliang Yuan and
                  Cong Wang and
                  Xiaolin Gui},
  title        = {Towards secure and practical targeted mobile advertising},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {79--80},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179352},
  doi          = {10.1109/INFCOMW.2015.7179352},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JiangSYWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CuiYW15,
  author       = {Helei Cui and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Harnessing encrypted data in cloud for secure and efficient image
                  sharing from mobile devices},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {2659--2667},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218657},
  doi          = {10.1109/INFOCOM.2015.7218657},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CuiYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/JiangGSYW15,
  author       = {Jinghua Jiang and
                  Xiaolin Gui and
                  Zhenkui Shi and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Towards Secure and Practical Targeted Mobile Advertising},
  booktitle    = {11th International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2015, Shenzhen, China, December 16-18, 2015},
  pages        = {79--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSN.2015.17},
  doi          = {10.1109/MSN.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/JiangGSYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/YuanWWSR14,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Anna Cinzia Squicciarini and
                  Kui Ren},
  title        = {Enabling Privacy-Preserving Image-Centric Social Discovery},
  booktitle    = {{IEEE} 34th International Conference on Distributed Computing Systems,
                  {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  pages        = {198--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCS.2014.28},
  doi          = {10.1109/ICDCS.2014.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/YuanWWSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/YuanW10,
  author       = {Xingliang Yuan and
                  Jia Wang},
  title        = {Statistical timing verification for transparently latched circuits
                  through structural graph traversal},
  booktitle    = {Proceedings of the 15th Asia South Pacific Design Automation Conference,
                  {ASP-DAC} 2010, Taipei, Taiwan, January 18-21, 2010},
  pages        = {663--668},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ASPDAC.2010.5419803},
  doi          = {10.1109/ASPDAC.2010.5419803},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/YuanW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics