BibTeX records: Ximeng Liu

download as .bib file

@article{DBLP:journals/access/AliSL20,
  author    = {Mohammad Ali and
               Mohammad{-}Reza Sadeghi and
               Ximeng Liu},
  title     = {Lightweight Revocable Hierarchical Attribute-Based Encryption for
               Internet of Things},
  journal   = {{IEEE} Access},
  volume    = {8},
  pages     = {23951--23964},
  year      = {2020},
  url       = {https://doi.org/10.1109/ACCESS.2020.2969957},
  doi       = {10.1109/ACCESS.2020.2969957},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/AliSL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangZXSZL20,
  author    = {Can Zhang and
               Liehuang Zhu and
               Chang Xu and
               Kashif Sharif and
               Chuan Zhang and
               Ximeng Liu},
  title     = {{PGAS:} Privacy-preserving graph encryption for accurate constrained
               shortest distance queries},
  journal   = {Inf. Sci.},
  volume    = {506},
  pages     = {325--345},
  year      = {2020},
  url       = {https://doi.org/10.1016/j.ins.2019.07.082},
  doi       = {10.1016/j.ins.2019.07.082},
  timestamp = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/ZhangZXSZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhuZLLWLF20,
  author    = {Dan Zhu and
               Hui Zhu and
               Ximeng Liu and
               Hui Li and
               Fengwei Wang and
               Hao Li and
               Dengguo Feng},
  title     = {{CREDO:} Efficient and privacy-preserving multi-level medical pre-diagnosis
               based on ML-\emph{kNN}},
  journal   = {Inf. Sci.},
  volume    = {514},
  pages     = {244--262},
  year      = {2020},
  url       = {https://doi.org/10.1016/j.ins.2019.11.041},
  doi       = {10.1016/j.ins.2019.11.041},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isci/ZhuZLLWLF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinCHLZ20,
  author    = {Baodong Qin and
               Yu Chen and
               Qiong Huang and
               Ximeng Liu and
               Dong Zheng},
  title     = {Public-key authenticated encryption with keyword search revisited:
               Security model and constructions},
  journal   = {Inf. Sci.},
  volume    = {516},
  pages     = {515--528},
  year      = {2020},
  url       = {https://doi.org/10.1016/j.ins.2019.12.063},
  doi       = {10.1016/j.ins.2019.12.063},
  timestamp = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isci/QinCHLZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0026LDL20,
  author    = {Yang Yang and
               Ximeng Liu and
               Robert H. Deng and
               Yingjiu Li},
  title     = {Lightweight Sharable and Traceable Secure Mobile Health System},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {78--91},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2729556},
  doi       = {10.1109/TDSC.2017.2729556},
  timestamp = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/0026LDL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-03594,
  author    = {Zhuo Ma and
               Haoran Ge and
               Zhuzhu Wang and
               Yang Liu and
               Ximeng Liu},
  title     = {Droidetec: Android Malware Detection and Malicious Code Localization
               through Deep Learning},
  journal   = {CoRR},
  volume    = {abs/2002.03594},
  year      = {2020},
  url       = {https://arxiv.org/abs/2002.03594},
  archivePrefix = {arXiv},
  eprint    = {2002.03594},
  timestamp = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2002-03594.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DongYLYG19,
  author    = {Chen Dong and
               Yin Ye and
               Ximeng Liu and
               Yang Yang and
               Wenzhong Guo},
  title     = {The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial
               IoT},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {16952--16963},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2895502},
  doi       = {10.1109/ACCESS.2019.2895502},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/DongYLYG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DongHLYG19,
  author    = {Chen Dong and
               Guorong He and
               Ximeng Liu and
               Yang Yang and
               Wenzhong Guo},
  title     = {A Multi-Layer Hardware Trojan Protection Framework for IoT Chips},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {23628--23639},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2896479},
  doi       = {10.1109/ACCESS.2019.2896479},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/DongHLYG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DongXLYYG19,
  author    = {Chen Dong and
               Ziqi Xiong and
               Ximeng Liu and
               Yin Ye and
               Yang Yang and
               Wenzhong Guo},
  title     = {Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {24571--24584},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2899743},
  doi       = {10.1109/ACCESS.2019.2899743},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/DongXLYYG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiongZTLY19,
  author    = {Jinbo Xiong and
               Yuanyuan Zhang and
               Shaohua Tang and
               Ximeng Liu and
               Zhiqiang Yao},
  title     = {Secure Encrypted Data With Authorized Deduplication in Cloud},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {75090--75104},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2920998},
  doi       = {10.1109/ACCESS.2019.2920998},
  timestamp = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/XiongZTLY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DongZLHGY19,
  author    = {Chen Dong and
               Fan Zhang and
               Ximeng Liu and
               Xing Huang and
               Wenzhong Guo and
               Yang Yang},
  title     = {A Locating Method for Multi-Purposes HTs Based on the Boundary Network},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {110936--110950},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2932478},
  doi       = {10.1109/ACCESS.2019.2932478},
  timestamp = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/DongZLHGY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangLLGZL19,
  author    = {Yang Yang and
               Hongrui Lin and
               Ximeng Liu and
               Wenzhong Guo and
               Xianghan Zheng and
               Zhiquan Liu},
  title     = {Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted
               Cloud With Fair Payment},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {140818--140832},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2943356},
  doi       = {10.1109/ACCESS.2019.2943356},
  timestamp = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/YangLLGZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangHLCWLC19,
  author    = {Yang Yang and
               Xindi Huang and
               Ximeng Liu and
               Hongju Cheng and
               Jian Weng and
               Xiangyang Luo and
               Victor Chang},
  title     = {A Comprehensive Survey on Secure Outsourced Computation and Its Applications},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {159426--159465},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2949782},
  doi       = {10.1109/ACCESS.2019.2949782},
  timestamp = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/YangHLCWLC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZLLHLL19,
  author    = {Fengwei Wang and
               Hui Zhu and
               Ximeng Liu and
               Rongxing Lu and
               Jiafeng Hua and
               Hui Li and
               Hao Li},
  title     = {Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {166054--166065},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2953495},
  doi       = {10.1109/ACCESS.2019.2953495},
  timestamp = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/WangZLLHLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/XuYML19,
  author    = {Shengmin Xu and
               Guomin Yang and
               Yi Mu and
               Ximeng Liu},
  title     = {A secure IoT cloud storage system with fine-grained access control
               and decryption key exposure resistance},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {97},
  pages     = {284--294},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.future.2019.02.051},
  doi       = {10.1016/j.future.2019.02.051},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/XuYML19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangSLLZ19,
  author    = {Yinghui Zhang and
               Jiangang Shu and
               Ximeng Liu and
               Jin Li and
               Dong Zheng},
  title     = {Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification
               Scheme for Mobile Healthcare Crowd Sensing"},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {1},
  pages     = {1287--1290},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2018.2862381},
  doi       = {10.1109/JIOT.2018.2862381},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/ZhangSLLZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HuaZWLLLZ19,
  author    = {Jiafeng Hua and
               Hui Zhu and
               Fengwei Wang and
               Ximeng Liu and
               Rongxing Lu and
               Hao Li and
               Yeping Zhang},
  title     = {{CINEMA:} Efficient and Privacy-Preserving Online Medical Primary
               Diagnosis With Skyline Query},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {2},
  pages     = {1450--1461},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2018.2834156},
  doi       = {10.1109/JIOT.2018.2834156},
  timestamp = {Fri, 31 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iotj/HuaZWLLLZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShuLYZJD19,
  author    = {Jiangang Shu and
               Ximeng Liu and
               Kan Yang and
               Yinghui Zhang and
               Xiaohua Jia and
               Robert H. Deng},
  title     = {SybSub: Privacy-Preserving Expressive Task Subscription With Sybil
               Detection in Crowdsourcing},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {2},
  pages     = {3003--3013},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2018.2877780},
  doi       = {10.1109/JIOT.2018.2877780},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/ShuLYZJD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaLLMR19,
  author    = {Zhuo Ma and
               Yang Liu and
               Ximeng Liu and
               Jianfeng Ma and
               Kui Ren},
  title     = {Lightweight Privacy-Preserving Ensemble Classification for Face Recognition},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {3},
  pages     = {5778--5790},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2905555},
  doi       = {10.1109/JIOT.2019.2905555},
  timestamp = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iotj/MaLLMR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MiaoLCDWL19,
  author    = {Yinbin Miao and
               Ximeng Liu and
               Kim{-}Kwang Raymond Choo and
               Robert H. Deng and
               Hongjun Wu and
               Hongwei Li},
  title     = {Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet
               of Everything},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {4},
  pages     = {7201--7212},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2915123},
  doi       = {10.1109/JIOT.2019.2915123},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/MiaoLCDWL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DingZMLN19,
  author    = {Ran Ding and
               Hong Zhong and
               Jianfeng Ma and
               Ximeng Liu and
               Jianting Ning},
  title     = {Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based
               Health Storage System},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {5},
  pages     = {8393--8405},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2917546},
  doi       = {10.1109/JIOT.2019.2917546},
  timestamp = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/DingZMLN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaLLML19,
  author    = {Zhuo Ma and
               Yang Liu and
               Ximeng Liu and
               Jianfeng Ma and
               Feifei Li},
  title     = {Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {5},
  pages     = {8406--8420},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2917933},
  doi       = {10.1109/JIOT.2019.2917933},
  timestamp = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/MaLLML19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MiaoTCLDL19,
  author    = {Yinbin Miao and
               Qiuyun Tong and
               Kim{-}Kwang Raymond Choo and
               Ximeng Liu and
               Robert H. Deng and
               Hongwei Li},
  title     = {Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial
               Internet of Things},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {5},
  pages     = {8681--8691},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2923068},
  doi       = {10.1109/JIOT.2019.2923068},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/MiaoTCLDL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
  author    = {Lin Liu and
               Jinshu Su and
               Ximeng Liu and
               Rongmao Chen and
               Kai Huang and
               Robert H. Deng and
               Xiaofeng Wang},
  title     = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
               Outsourced Cloud Data},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {6},
  pages     = {9841--9852},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2932444},
  doi       = {10.1109/JIOT.2019.2932444},
  timestamp = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LwamoZXSLZ19,
  author    = {Nassoro M. R. Lwamo and
               Liehuang Zhu and
               Chang Xu and
               Kashif Sharif and
               Ximeng Liu and
               Chuan Zhang},
  title     = {{SUAA:} {A} Secure User Authentication Scheme with Anonymity for the
               Single {\&} Multi-server Environments},
  journal   = {Inf. Sci.},
  volume    = {477},
  pages     = {369--385},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ins.2018.10.037},
  doi       = {10.1016/j.ins.2018.10.037},
  timestamp = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isci/LwamoZXSLZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangZGLC19,
  author    = {Yang Yang and
               Xianghan Zheng and
               Wenzhong Guo and
               Ximeng Liu and
               Victor Chang},
  title     = {Privacy-preserving smart IoT-based healthcare big data storage and
               self-adaptive access control system},
  journal   = {Inf. Sci.},
  volume    = {479},
  pages     = {567--592},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ins.2018.02.005},
  doi       = {10.1016/j.ins.2018.02.005},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/YangZGLC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangZXSL19,
  author    = {Chuan Zhang and
               Liehuang Zhu and
               Chang Xu and
               Kashif Sharif and
               Ximeng Liu},
  title     = {{PPTDS:} {A} privacy-preserving truth discovery scheme in crowd sensing
               systems},
  journal   = {Inf. Sci.},
  volume    = {484},
  pages     = {183--196},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ins.2019.01.068},
  doi       = {10.1016/j.ins.2019.01.068},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/ZhangZXSL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MaMML19,
  author    = {Zhuoran Ma and
               Jianfeng Ma and
               Yinbin Miao and
               Ximeng Liu},
  title     = {Privacy-preserving and high-accurate outsourced disease predictor
               on random forest},
  journal   = {Inf. Sci.},
  volume    = {496},
  pages     = {225--241},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ins.2019.05.025},
  doi       = {10.1016/j.ins.2019.05.025},
  timestamp = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/MaMML19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangMMLWM19,
  author    = {Tengfei Yang and
               Jianfeng Ma and
               Yinbin Miao and
               Ximeng Liu and
               Xuan Wang and
               Qian Meng},
  title     = {{PLCOM:} Privacy-preserving outsourcing computation of Legendre circularly
               orthogonal moment over encrypted image data},
  journal   = {Inf. Sci.},
  volume    = {505},
  pages     = {198--214},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ins.2019.07.078},
  doi       = {10.1016/j.ins.2019.07.078},
  timestamp = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/YangMMLWM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FengMMML0019,
  author    = {Xiaoqin Feng and
               Jianfeng Ma and
               Yinbin Miao and
               Qian Meng and
               Ximeng Liu and
               Qi Jiang and
               Hui Li},
  title     = {Pruneable sharding-based blockchain protocol},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {12},
  number    = {4},
  pages     = {934--950},
  year      = {2019},
  url       = {https://doi.org/10.1007/s12083-018-0685-6},
  doi       = {10.1007/s12083-018-0685-6},
  timestamp = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ppna/FengMMML0019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MiaoLDWLLW19,
  author    = {Yinbin Miao and
               Ximeng Liu and
               Robert H. Deng and
               Hongjun Wu and
               Hongwei Li and
               Jiguo Li and
               Dapeng Wu},
  title     = {Hybrid Keyword-Field Search With Efficient Key Management for Industrial
               Internet of Things},
  journal   = {{IEEE} Trans. Industrial Informatics},
  volume    = {15},
  number    = {6},
  pages     = {3206--3217},
  year      = {2019},
  url       = {https://doi.org/10.1109/TII.2018.2877146},
  doi       = {10.1109/TII.2018.2877146},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tii/MiaoLDWLLW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MiaoMLWLL19,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Jian Weng and
               Hongwei Li and
               Hui Li},
  title     = {Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing},
  journal   = {{IEEE} Trans. Services Computing},
  volume    = {12},
  number    = {5},
  pages     = {772--785},
  year      = {2019},
  url       = {https://doi.org/10.1109/TSC.2018.2823309},
  doi       = {10.1109/TSC.2018.2823309},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tsc/MiaoMLWLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/MaZLLR19,
  author    = {Zhuo Ma and
               Tian Zhang and
               Ximeng Liu and
               Xinghua Li and
               Kui Ren},
  title     = {Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory},
  journal   = {{IEEE} Trans. Vehicular Technology},
  volume    = {68},
  number    = {8},
  pages     = {8091--8102},
  year      = {2019},
  url       = {https://doi.org/10.1109/TVT.2019.2924679},
  doi       = {10.1109/TVT.2019.2924679},
  timestamp = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tvt/MaZLLR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhangLHZJ19,
  author    = {Yanhua Zhang and
               Ximeng Liu and
               Yupu Hu and
               Qikun Zhang and
               Huiwen Jia},
  editor    = {Yi Mu and
               Robert H. Deng and
               Xinyi Huang},
  title     = {Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving
               Shorter Key-Sizes and Explicit Traceability with Ease},
  booktitle = {Cryptology and Network Security - 18th International Conference, {CANS}
               2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11829},
  pages     = {120--140},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-31578-8\_7},
  doi       = {10.1007/978-3-030-31578-8\_7},
  timestamp = {Fri, 11 Oct 2019 18:23:24 +0200},
  biburl    = {https://dblp.org/rec/conf/cans/ZhangLHZJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuSDLZW19,
  author    = {Pengfei Wu and
               Qingni Shen and
               Robert H. Deng and
               Ximeng Liu and
               Yinghui Zhang and
               Zhonghai Wu},
  editor    = {Steven D. Galbraith and
               Giovanni Russello and
               Willy Susilo and
               Dieter Gollmann and
               Engin Kirda and
               Zhenkai Liang},
  title     = {ObliDC: An SGX-based Oblivious Distributed Computing Framework with
               Formal Proof},
  booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
               Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages     = {86--99},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3321705.3329822},
  doi       = {10.1145/3321705.3329822},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/WuSDLZW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZhangLHZJ19,
  author    = {Yanhua Zhang and
               Ximeng Liu and
               Yupu Hu and
               Qikun Zhang and
               Huiwen Jia},
  editor    = {Jaideep Vaidya and
               Xiao Zhang and
               Jin Li},
  title     = {Attribute-Based Signatures for Inner-Product Predicate from Lattices},
  booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
               2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11982},
  pages     = {173--185},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-37337-5\_14},
  doi       = {10.1007/978-3-030-37337-5\_14},
  timestamp = {Wed, 08 Jan 2020 15:12:41 +0100},
  biburl    = {https://dblp.org/rec/conf/css/ZhangLHZJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/YingJLM19,
  author    = {Zuobin Ying and
               Wenjie Jiang and
               Ximeng Liu and
               Maode Ma},
  editor    = {Sheng Wen and
               Albert Y. Zomaya and
               Laurence T. Yang},
  title     = {Privacy-Preserving Fine-Grained Outsourcing {PHR} with Efficient Policy
               Updating},
  booktitle = {Algorithms and Architectures for Parallel Processing - 19th International
               Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
               2019, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11945},
  pages     = {512--520},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-38961-1\_44},
  doi       = {10.1007/978-3-030-38961-1\_44},
  timestamp = {Tue, 28 Jan 2020 11:28:52 +0100},
  biburl    = {https://dblp.org/rec/conf/ica3pp/YingJLM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/YingCZZL19,
  author    = {Zuobin Ying and
               Shuanglong Cao and
               Peng Zhou and
               Shun Zhang and
               Ximeng Liu},
  editor    = {Sheng Wen and
               Albert Y. Zomaya and
               Laurence T. Yang},
  title     = {Lightweight Outsourced Privacy-Preserving Heart Failure Prediction
               Based on {GRU}},
  booktitle = {Algorithms and Architectures for Parallel Processing - 19th International
               Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
               2019, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11945},
  pages     = {521--536},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-38961-1\_45},
  doi       = {10.1007/978-3-030-38961-1\_45},
  timestamp = {Thu, 30 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ica3pp/YingCZZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuYMMM19,
  author    = {Ximeng Liu and
               Tengfei Yang and
               Zhuoran Ma and
               Jianfeng Ma and
               Yinbin Miao},
  title     = {Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced
               Computation},
  booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
               Shanghai, China, May 20-24, 2019},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/ICC.2019.8761251},
  doi       = {10.1109/ICC.2019.8761251},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/icc/LiuYMMM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangMLM19,
  author    = {Xiangyu Wang and
               Jianfeng Ma and
               Ximeng Liu and
               Yinbin Miao},
  title     = {Search in My Way: Practical Outsourced Image Retrieval Framework Supporting
               Unshared Key},
  booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
               Paris, France, April 29 - May 2, 2019},
  pages     = {2485--2493},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/INFOCOM.2019.8737619},
  doi       = {10.1109/INFOCOM.2019.8737619},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/infocom/WangMLM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04345,
  author    = {Chuan Zhang and
               Liehuang Zhu and
               Chang Xu and
               Kashif Sharif and
               Ximeng Liu and
               Xiaojiang Du and
               Mohsen Guizani},
  title     = {Achieving Trust-Based and Privacy-Preserving Customer Selection in
               Ubiquitous Computing},
  journal   = {CoRR},
  volume    = {abs/1902.04345},
  year      = {2019},
  url       = {http://arxiv.org/abs/1902.04345},
  archivePrefix = {arXiv},
  eprint    = {1902.04345},
  timestamp = {Tue, 21 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1902-04345.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10218,
  author    = {Yang Liu and
               Zhuo Ma and
               Ximeng Liu and
               Siqi Ma and
               Surya Nepal and
               Robert H. Deng},
  title     = {Boosting Privately: Privacy-Preserving Federated Extreme Boosting
               for Mobile Crowdsensing},
  journal   = {CoRR},
  volume    = {abs/1907.10218},
  year      = {2019},
  url       = {http://arxiv.org/abs/1907.10218},
  archivePrefix = {arXiv},
  eprint    = {1907.10218},
  timestamp = {Fri, 02 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1907-10218.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-12540,
  author    = {Ximeng Liu and
               Robert H. Deng and
               Pengfei Wu and
               Yang Yang},
  title     = {Lightning-Fast and Privacy-Preserving Outsourced Computation in the
               Cloud},
  journal   = {CoRR},
  volume    = {abs/1909.12540},
  year      = {2019},
  url       = {http://arxiv.org/abs/1909.12540},
  archivePrefix = {arXiv},
  eprint    = {1909.12540},
  timestamp = {Wed, 02 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1909-12540.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-03242,
  author    = {Yang Liu and
               Zhuo Ma and
               Ximeng Liu and
               Zhuzhu Wang and
               Siqi Ma and
               Ken Ren},
  title     = {Revocable Federated Learning: {A} Benchmark of Federated Forest},
  journal   = {CoRR},
  volume    = {abs/1911.03242},
  year      = {2019},
  url       = {http://arxiv.org/abs/1911.03242},
  archivePrefix = {arXiv},
  eprint    = {1911.03242},
  timestamp = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1911-03242.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhuZXLH18,
  author    = {Liehuang Zhu and
               Chuan Zhang and
               Chang Xu and
               Ximeng Liu and
               Cheng Huang},
  title     = {An Efficient and Privacy-Preserving Biometric Identification Scheme
               in Cloud Computing},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {19025--19033},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2819166},
  doi       = {10.1109/ACCESS.2018.2819166},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/ZhuZXLH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FengMFML18,
  author    = {Xiaoqin Feng and
               Jianfeng Ma and
               Tao Feng and
               Yinbin Miao and
               Ximeng Liu},
  title     = {Consortium Blockchain-Based {SIFT:} Outsourcing Encrypted Feature
               Extraction in the {D2D} Network},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {52248--52260},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2869856},
  doi       = {10.1109/ACCESS.2018.2869856},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/FengMFML18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YingWLLC18,
  author    = {Zuobin Ying and
               Lu Wei and
               Qi Li and
               Ximeng Liu and
               Jie Cui},
  title     = {A Lightweight Policy Preserving {EHR} Sharing Scheme in the Cloud},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {53698--53708},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2871170},
  doi       = {10.1109/ACCESS.2018.2871170},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/YingWLLC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YingJCLC18,
  author    = {Zuobin Ying and
               Wenjie Jang and
               Shuanglong Cao and
               Ximeng Liu and
               Jie Cui},
  title     = {A Lightweight Cloud Sharing {PHR} System With Access Policy Updating},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {64611--64621},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2877981},
  doi       = {10.1109/ACCESS.2018.2877981},
  timestamp = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/YingJCLC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangLML18,
  author    = {Kai Zhang and
               Hui Li and
               Jianfeng Ma and
               Ximeng Liu},
  title     = {Efficient large-universe multi-authority ciphertext-policy attribute-based
               encryption with white-box traceability},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {61},
  number    = {3},
  pages     = {32102},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11432-016-9019-8},
  doi       = {10.1007/s11432-016-9019-8},
  timestamp = {Fri, 02 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/chinaf/ZhangLML18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoZLX18,
  author    = {Qingsong Zhao and
               Qingkai Zeng and
               Ximeng Liu and
               Huanliang Xu},
  title     = {Simulation-based security of function-hiding inner product encryption},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {61},
  number    = {4},
  pages     = {048102:1--048102:3},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11432-017-9224-9},
  doi       = {10.1007/s11432-017-9224-9},
  timestamp = {Mon, 28 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/chinaf/ZhaoZLX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuDYTZ18,
  author    = {Ximeng Liu and
               Robert H. Deng and
               Yang Yang and
               Ngoc Hieu Tran and
               Shangping Zhong},
  title     = {Hybrid privacy-preserving clinical decision support system in fog-cloud
               computing},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {78},
  pages     = {825--837},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.future.2017.03.018},
  doi       = {10.1016/j.future.2017.03.018},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/LiuDYTZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/0026ZLZ018,
  author    = {Yang Yang and
               Xianghan Zheng and
               Ximeng Liu and
               Shangping Zhong and
               Victor Chang},
  title     = {Cross-domain dynamic anonymous authenticated group key management
               with symptom-matching for e-health social system},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {84},
  pages     = {160--176},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.future.2017.06.025},
  doi       = {10.1016/j.future.2017.06.025},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/0026ZLZ018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YangZGLC18,
  author    = {Yang Yang and
               Xianghan Zheng and
               Wenzhong Guo and
               Ximeng Liu and
               Victor I. Chang},
  title     = {Privacy-preserving fusion of IoT and big data for e-health},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {86},
  pages     = {1437--1455},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.future.2018.01.003},
  doi       = {10.1016/j.future.2018.01.003},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/YangZGLC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MiaoMLLLL18,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Xinghua Li and
               Zhiquan Liu and
               Hui Li},
  title     = {Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {5},
  number    = {4},
  pages     = {3008--3018},
  year      = {2018},
  url       = {https://doi.org/10.1109/JIOT.2017.2779124},
  doi       = {10.1109/JIOT.2017.2779124},
  timestamp = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iotj/MiaoMLLLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShuLJYD18,
  author    = {Jiangang Shu and
               Ximeng Liu and
               Xiaohua Jia and
               Kan Yang and
               Robert H. Deng},
  title     = {Anonymous Privacy-Preserving Task Matching in Crowdsourcing},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {5},
  number    = {4},
  pages     = {3068--3078},
  year      = {2018},
  url       = {https://doi.org/10.1109/JIOT.2018.2830784},
  doi       = {10.1109/JIOT.2018.2830784},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iotj/ShuLJYD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/0026LD18,
  author    = {Yang Yang and
               Ximeng Liu and
               Robert H. Deng},
  title     = {Expressive query over outsourced encrypted data},
  journal   = {Inf. Sci.},
  volume    = {442-443},
  pages     = {33--53},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.ins.2018.02.017},
  doi       = {10.1016/j.ins.2018.02.017},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/0026LD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangDLZ18,
  author    = {Yinghui Zhang and
               Robert H. Deng and
               Ximeng Liu and
               Dong Zheng},
  title     = {Blockchain based efficient and robust fair payment for outsourcing
               services in cloud computing},
  journal   = {Inf. Sci.},
  volume    = {462},
  pages     = {262--277},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.ins.2018.06.018},
  doi       = {10.1016/j.ins.2018.06.018},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isci/ZhangDLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MiaoWLCLL18,
  author    = {Yinbin Miao and
               Jian Weng and
               Ximeng Liu and
               Kim{-}Kwang Raymond Choo and
               Zhiquan Liu and
               Hongwei Li},
  title     = {Enabling verifiable multiple keywords search over encrypted cloud
               data},
  journal   = {Inf. Sci.},
  volume    = {465},
  pages     = {21--37},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.ins.2018.06.066},
  doi       = {10.1016/j.ins.2018.06.066},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isci/MiaoWLCLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShuLZJD18,
  author    = {Jiangang Shu and
               Ximeng Liu and
               Yinghui Zhang and
               Xiaohua Jia and
               Robert H. Deng},
  title     = {Dual-side privacy-preserving task matching for spatial crowdsourcing},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {123},
  pages     = {101--111},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.jnca.2018.09.007},
  doi       = {10.1016/j.jnca.2018.09.007},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnca/ShuLZJD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMLLSW18,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Zhiquan Liu and
               Limin Shen and
               Fushan Wei},
  title     = {{VMKDO:} Verifiable multi-keyword search over encrypted cloud data
               for dynamic data-owner},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {11},
  number    = {2},
  pages     = {287--297},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12083-016-0487-7},
  doi       = {10.1007/s12083-016-0487-7},
  timestamp = {Fri, 16 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ppna/MiaoMLLSW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMLLZW18,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Zhiquan Liu and
               Junwei Zhang and
               Fushan Wei},
  title     = {{DOAS:} Efficient data owner authorized search over encrypted cloud
               data},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {11},
  number    = {3},
  pages     = {349--360},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12083-016-0523-7},
  doi       = {10.1007/s12083-016-0523-7},
  timestamp = {Thu, 15 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ppna/MiaoMLLZW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MoMLL18,
  author    = {Ruo Mo and
               Jianfeng Ma and
               Ximeng Liu and
               Hai Liu},
  title     = {{EOABS:} expressive outsourced attribute-based signature},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {11},
  number    = {5},
  pages     = {979--988},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12083-017-0626-9},
  doi       = {10.1007/s12083-017-0626-9},
  timestamp = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ppna/MoMLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoZL18,
  author    = {Qingsong Zhao and
               Qingkai Zeng and
               Ximeng Liu},
  title     = {Improved Construction for Inner Product Functional Encryption},
  journal   = {Security and Communication Networks},
  volume    = {2018},
  pages     = {6561418:1--6561418:12},
  year      = {2018},
  url       = {https://doi.org/10.1155/2018/6561418},
  doi       = {10.1155/2018/6561418},
  timestamp = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/scn/ZhaoZL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuCDLW18,
  author    = {Ximeng Liu and
               Kim{-}Kwang Raymond Choo and
               Robert H. Deng and
               Rongxing Lu and
               Jian Weng},
  title     = {Efficient and Privacy-Preserving Outsourced Calculation of Rational
               Numbers},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {27--39},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2536601},
  doi       = {10.1109/TDSC.2016.2536601},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuCDLW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/YangLD18,
  author    = {Yang Yang and
               Ximeng Liu and
               Robert H. Deng},
  title     = {Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things},
  journal   = {{IEEE} Trans. Industrial Informatics},
  volume    = {14},
  number    = {8},
  pages     = {3610--3617},
  year      = {2018},
  url       = {https://doi.org/10.1109/TII.2017.2751640},
  doi       = {10.1109/TII.2017.2751640},
  timestamp = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tii/YangLD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangZLLLLZ18,
  author    = {Fengwei Wang and
               Hui Zhu and
               Ximeng Liu and
               Rongxing Lu and
               Fenghua Li and
               Hui Li and
               Songnian Zhang},
  title     = {Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for
               Ride-Hailing Services},
  journal   = {{IEEE} Trans. Vehicular Technology},
  volume    = {67},
  number    = {11},
  pages     = {11084--11097},
  year      = {2018},
  url       = {https://doi.org/10.1109/TVT.2018.2868869},
  doi       = {10.1109/TVT.2018.2868869},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tvt/WangZLLLLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiuYCW18,
  author    = {Ximeng Liu and
               Yang Yang and
               Kim{-}Kwang Raymond Choo and
               Huaqun Wang},
  title     = {Security and Privacy Challenges for Internet-of-Things and Fog Computing},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {2018},
  pages     = {9373961:1--9373961:3},
  year      = {2018},
  url       = {https://doi.org/10.1155/2018/9373961},
  doi       = {10.1155/2018/9373961},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/wicomm/LiuYCW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author    = {Lin Liu and
               Jinshu Su and
               Rongmao Chen and
               Ximeng Liu and
               Xiaofeng Wang and
               Shuhui Chen and
               Ho{-}fung Leung},
  editor    = {Willy Susilo and
               Guomin Yang},
  title     = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
               Data from Multiple Parties},
  booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10946},
  pages     = {431--451},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi       = {10.1007/978-3-319-93638-3\_25},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/TianLLDS18,
  author    = {Yangguang Tian and
               Yingjiu Li and
               Ximeng Liu and
               Robert H. Deng and
               Binanda Sengupta},
  title     = {PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication},
  booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
               Kaohsiung, Taiwan, December 10-13, 2018},
  pages     = {1--8},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/DESEC.2018.8625169},
  doi       = {10.1109/DESEC.2018.8625169},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/desec/TianLLDS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ShuLYZJD18,
  author    = {Jiangang Shu and
               Ximeng Liu and
               Kan Yang and
               Yinghui Zhang and
               Xiaohua Jia and
               Robert H. Deng},
  title     = {SybMatch: Sybil Detection for Privacy-Preserving Task Matching in
               Crowdsourcing},
  booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
               United Arab Emirates, December 9-13, 2018},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/GLOCOM.2018.8647346},
  doi       = {10.1109/GLOCOM.2018.8647346},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/globecom/ShuLYZJD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenBYL018,
  author    = {Zhili Chen and
               Xianyue Bao and
               Zuobin Ying and
               Ximeng Liu and
               Hong Zhong},
  editor    = {Jaideep Vaidya and
               Jin Li},
  title     = {Differentially Private Location Protection with Continuous Time Stamps
               for VANETs},
  booktitle = {Algorithms and Architectures for Parallel Processing - 18th International
               Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
               Proceedings, Part {IV}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11337},
  pages     = {204--219},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05063-4\_17},
  doi       = {10.1007/978-3-030-05063-4\_17},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/ica3pp/ChenBYL018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/XiaoZSLDL18,
  author    = {Rui Xiao and
               Hui Zhu and
               Chao Song and
               Ximeng Liu and
               Jian Dong and
               Hui Li},
  title     = {Attacking Network Isolation in Software-Defined Networks: New Attacks
               and Countermeasures},
  booktitle = {27th International Conference on Computer Communication and Networks,
               {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages     = {1--9},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/ICCCN.2018.8487340},
  doi       = {10.1109/ICCCN.2018.8487340},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icccn/XiaoZSLDL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ZhuZLLWL18,
  author    = {Dan Zhu and
               Hui Zhu and
               Ximeng Liu and
               Hui Li and
               Fengwei Wang and
               Hao Li},
  title     = {Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis
               Based on kNN},
  booktitle = {27th International Conference on Computer Communication and Networks,
               {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages     = {1--9},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/ICCCN.2018.8487422},
  doi       = {10.1109/ICCCN.2018.8487422},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icccn/ZhuZLLWL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/YangZLLL18,
  author    = {Xiaopeng Yang and
               Hui Zhu and
               Rongxing Lu and
               Ximeng Liu and
               Hui Li},
  title     = {Efficient and Privacy-Preserving Online Face Recognition Over Encrypted
               Outsourced Data},
  booktitle = {{IEEE} International Conference on Internet of Things (iThings) and
               {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
               Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
               iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
               30 - August 3, 2018},
  pages     = {366--373},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/Cybermatics\_2018.2018.00089},
  doi       = {10.1109/Cybermatics\_2018.2018.00089},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/ithings/YangZLLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XuY0L18,
  author    = {Shengmin Xu and
               Guomin Yang and
               Yi Mu and
               Ximeng Liu},
  editor    = {Joonsang Baek and
               Willy Susilo and
               Jongkil Kim},
  title     = {Efficient Attribute-Based Encryption with Blackbox Traceability},
  booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11192},
  pages     = {182--200},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9\_11},
  doi       = {10.1007/978-3-030-01446-9\_11},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/conf/provsec/XuY0L18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianLCLLCY18,
  author    = {Yangguang Tian and
               Yingjiu Li and
               Rongmao Chen and
               Nan Li and
               Ximeng Liu and
               Bing Chang and
               Xingjie Yu},
  editor    = {Raheem Beyah and
               Bing Chang and
               Yingjiu Li and
               Sencun Zhu},
  title     = {Privacy-Preserving Biometric-Based Remote User Authentication with
               Leakage Resilience},
  booktitle = {Security and Privacy in Communication Networks - 14th International
               Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
               Part {I}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {254},
  pages     = {112--132},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01701-9\_7},
  doi       = {10.1007/978-3-030-01701-9\_7},
  timestamp = {Fri, 11 Jan 2019 16:12:16 +0100},
  biburl    = {https://dblp.org/rec/conf/securecomm/TianLCLLCY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuCD0Z18,
  author    = {Ximeng Liu and
               Kim{-}Kwang Raymond Choo and
               Robert H. Deng and
               Yang Yang and
               Yinghui Zhang},
  title     = {{PUSC:} Privacy-Preserving User-Centric Skyline Computation Over Multiple
               Encrypted Domains},
  booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy
               In Computing And Communications / 12th {IEEE} International Conference
               On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
               York, NY, USA, August 1-3, 2018},
  pages     = {958--963},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00135},
  doi       = {10.1109/TrustCom/BigDataSE.2018.00135},
  timestamp = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/trustcom/LiuCD0Z18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/MiaoMLZL17,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Junwei Zhang and
               Zhiquan Liu},
  title     = {{VKSE-MO:} verifiable keyword search over encrypted data in multi-owner
               settings},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {60},
  number    = {12},
  pages     = {122105:1--122105:15},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11432-016-0540-x},
  doi       = {10.1007/s11432-016-0540-x},
  timestamp = {Tue, 16 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/chinaf/MiaoMLZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenMLWM17,
  author    = {Limin Shen and
               Jianfeng Ma and
               Ximeng Liu and
               Fushan Wei and
               Meixia Miao},
  title     = {A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless
               Sensor Networks},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {4},
  number    = {2},
  pages     = {546--554},
  year      = {2017},
  url       = {https://doi.org/10.1109/JIOT.2016.2557487},
  doi       = {10.1109/JIOT.2016.2557487},
  timestamp = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iotj/ShenMLWM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HongXSL17,
  author    = {Hanshu Hong and
               Yunhao Xia and
               Zhixin Sun and
               Ximeng Liu},
  title     = {Provably secure attribute based signcryption with delegated computation
               and efficient key updating},
  journal   = {{TIIS}},
  volume    = {11},
  number    = {5},
  pages     = {2646--2659},
  year      = {2017},
  url       = {https://doi.org/10.3837/tiis.2017.05.019},
  doi       = {10.3837/tiis.2017.05.019},
  timestamp = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/itiis/HongXSL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MiaoMLJZSL17,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Qi Jiang and
               Junwei Zhang and
               Limin Shen and
               Zhiquan Liu},
  title     = {{VCKSM:} Verifiable conjunctive keyword search over mobile e-health
               cloud in shared multi-owner settings},
  journal   = {Pervasive Mob. Comput.},
  volume    = {40},
  pages     = {205--219},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.pmcj.2017.06.016},
  doi       = {10.1016/j.pmcj.2017.06.016},
  timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/percom/MiaoMLJZSL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/LiuQDL17,
  author    = {Ximeng Liu and
               Baodong Qin and
               Robert H. Deng and
               Yingjiu Li},
  title     = {An Efficient Privacy-Preserving Outsourced Computation over Public
               Data},
  journal   = {{IEEE} Trans. Services Computing},
  volume    = {10},
  number    = {5},
  pages     = {756--770},
  year      = {2017},
  url       = {https://doi.org/10.1109/TSC.2015.2511008},
  doi       = {10.1109/TSC.2015.2511008},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tsc/LiuQDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MoMLL17,
  author    = {Ruo Mo and
               Jianfeng Ma and
               Ximeng Liu and
               Qi Li},
  editor    = {Sihan Qing and
               Chris Mitchell and
               Liqun Chen and
               Dongmei Liu},
  title     = {{FABSS:} Attribute-Based Sanitizable Signature for Flexible Access
               Structure},
  booktitle = {Information and Communications Security - 19th International Conference,
               {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10631},
  pages     = {39--50},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-89500-0\_3},
  doi       = {10.1007/978-3-319-89500-0\_3},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/conf/icics/MoMLL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhaoZL17,
  author    = {Qingsong Zhao and
               Qingkai Zeng and
               Ximeng Liu},
  editor    = {Sihan Qing and
               Chris Mitchell and
               Liqun Chen and
               Dongmei Liu},
  title     = {Efficient Inner Product Encryption with Simulation-Based Security},
  booktitle = {Information and Communications Security - 19th International Conference,
               {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10631},
  pages     = {162--171},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-89500-0\_14},
  doi       = {10.1007/978-3-319-89500-0\_14},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/conf/icics/ZhaoZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiMLLXC16,
  author    = {Qi Li and
               Jianfeng Ma and
               Rui Li and
               Ximeng Liu and
               Jinbo Xiong and
               Danwei Chen},
  title     = {Secure, efficient and revocable multi-authority access control system
               in cloud storage},
  journal   = {Comput. Secur.},
  volume    = {59},
  pages     = {45--59},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.cose.2016.02.002},
  doi       = {10.1016/j.cose.2016.02.002},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/LiMLLXC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuLMCB16,
  author    = {Ximeng Liu and
               Rongxing Lu and
               Jianfeng Ma and
               Le Chen and
               Haiyong Bao},
  title     = {Efficient and privacy-preserving skyline computation framework across
               domains},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {62},
  pages     = {161--174},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.future.2015.10.005},
  doi       = {10.1016/j.future.2015.10.005},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/LiuLMCB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhuHL016,
  author    = {Hui Zhu and
               Xiaoying He and
               Ximeng Liu and
               Hui Li},
  title     = {{PTFA:} a secure and privacy-preserving traffic flow analysis scheme
               for intelligent transportation system},
  journal   = {{IJES}},
  volume    = {8},
  number    = {1},
  pages     = {78--86},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJES.2016.073749},
  doi       = {10.1504/IJES.2016.073749},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijes/ZhuHL016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HongSL16,
  author    = {Hanshu Hong and
               Zhixin Sun and
               Ximeng Liu},
  title     = {A key-insulated {CP-ABE} with key exposure accountability for secure
               data sharing in the cloud},
  journal   = {{TIIS}},
  volume    = {10},
  number    = {5},
  pages     = {2394--2406},
  year      = {2016},
  url       = {https://doi.org/10.3837/tiis.2016.05.024},
  doi       = {10.3837/tiis.2016.05.024},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itiis/HongSL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ShenMLM16,
  author    = {Limin Shen and
               Jianfeng Ma and
               Ximeng Liu and
               Meixia Miao},
  title     = {A Provably Secure Aggregate Signature Scheme for Healthcare Wireless
               Sensor Networks},
  journal   = {J. Medical Systems},
  volume    = {40},
  number    = {11},
  pages     = {244:1--244:10},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10916-016-0613-3},
  doi       = {10.1007/s10916-016-0613-3},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jms/ShenMLM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MiaoMLWLW16,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Fushan Wei and
               Zhiquan Liu and
               Xu An Wang},
  title     = {m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal
               Health Records in Multi-Owner Setting},
  journal   = {J. Medical Systems},
  volume    = {40},
  number    = {11},
  pages     = {246:1--246:12},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10916-016-0617-z},
  doi       = {10.1007/s10916-016-0617-z},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jms/MiaoMLWLW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiuQDLM16,
  author    = {Ximeng Liu and
               Baodong Qin and
               Robert H. Deng and
               Rongxing Lu and
               Jianfeng Ma},
  title     = {A Privacy-Preserving Outsourced Functional Computation Framework Across
               Large-Scale Multiple Encrypted Domains},
  journal   = {{IEEE} Trans. Computers},
  volume    = {65},
  number    = {12},
  pages     = {3567--3579},
  year      = {2016},
  url       = {https://doi.org/10.1109/TC.2016.2543220},
  doi       = {10.1109/TC.2016.2543220},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tc/LiuQDLM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDCW16,
  author    = {Ximeng Liu and
               Robert H. Deng and
               Kim{-}Kwang Raymond Choo and
               Jian Weng},
  title     = {An Efficient Privacy-Preserving Outsourced Calculation Toolkit With
               Multiple Keys},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {11},
  pages     = {2401--2414},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2016.2573770},
  doi       = {10.1109/TIFS.2016.2573770},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuDCW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDDLQ16,
  author    = {Ximeng Liu and
               Robert H. Deng and
               Wenxiu Ding and
               Rongxing Lu and
               Baodong Qin},
  title     = {Privacy-Preserving Outsourced Calculation on Floating Point Numbers},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {11},
  pages     = {2513--2527},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2016.2585121},
  doi       = {10.1109/TIFS.2016.2585121},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuDDLQ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/LiuLMCQ16,
  author    = {Ximeng Liu and
               Rongxing Lu and
               Jianfeng Ma and
               Le Chen and
               Baodong Qin},
  title     = {Privacy-Preserving Patient-Centric Clinical Decision Support System
               on Na{\"{\i}}ve Bayesian Classification},
  journal   = {{IEEE} J. Biomedical and Health Informatics},
  volume    = {20},
  number    = {2},
  pages     = {655--668},
  year      = {2016},
  url       = {https://doi.org/10.1109/JBHI.2015.2407157},
  doi       = {10.1109/JBHI.2015.2407157},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/titb/LiuLMCQ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/LiuZMLX15,
  author    = {Ximeng Liu and
               Hui Zhu and
               Jianfeng Ma and
               Qi Li and
               Jinbo Xiong},
  title     = {Attribute Based Multisignature Scheme for Wireless Communications},
  journal   = {Mobile Information Systems},
  volume    = {2015},
  pages     = {827320:1--827320:11},
  year      = {2015},
  url       = {https://doi.org/10.1155/2015/827320},
  doi       = {10.1155/2015/827320},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mis/LiuZMLX15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/XiongLMLYC15,
  author    = {Jinbo Xiong and
               Fenghua Li and
               Jianfeng Ma and
               Ximeng Liu and
               Zhiqiang Yao and
               Patrick S. Chen},
  title     = {A full lifecycle privacy protection scheme for sensitive data in cloud
               computing},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {8},
  number    = {6},
  pages     = {1025--1037},
  year      = {2015},
  url       = {https://doi.org/10.1007/s12083-014-0295-x},
  doi       = {10.1007/s12083-014-0295-x},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ppna/XiongLMLYC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMLXL15,
  author    = {Qi Li and
               Jianfeng Ma and
               Rui Li and
               Jinbo Xiong and
               Ximeng Liu},
  title     = {Large universe decentralized key-policy attribute-based encryption},
  journal   = {Security and Communication Networks},
  volume    = {8},
  number    = {3},
  pages     = {501--509},
  year      = {2015},
  url       = {https://doi.org/10.1002/sec.997},
  doi       = {10.1002/sec.997},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/LiMLXL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMLXL15a,
  author    = {Qi Li and
               Jianfeng Ma and
               Rui Li and
               Jinbo Xiong and
               Ximeng Liu},
  title     = {Provably secure unbounded multi-authority ciphertext-policy attribute-based
               encryption},
  journal   = {Security and Communication Networks},
  volume    = {8},
  number    = {18},
  pages     = {4098--4109},
  year      = {2015},
  url       = {https://doi.org/10.1002/sec.1326},
  doi       = {10.1002/sec.1326},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/LiMLXL15a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiuMXLZZ14,
  author    = {Ximeng Liu and
               Jianfeng Ma and
               Jinbo Xiong and
               Qi Li and
               Tao Zhang and
               Hui Zhu},
  title     = {Threshold attribute-based encryption with attribute hierarchy for
               lattices in the standard model},
  journal   = {{IET} Information Security},
  volume    = {8},
  number    = {4},
  pages     = {217--223},
  year      = {2014},
  url       = {https://doi.org/10.1049/iet-ifs.2013.0111},
  doi       = {10.1049/iet-ifs.2013.0111},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-ifs/LiuMXLZZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuMXL14a,
  author    = {Ximeng Liu and
               Jianfeng Ma and
               Jinbo Xiong and
               Guangjun Liu},
  title     = {Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained
               Access Control of Encryption Data},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {6},
  pages     = {437--443},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n6/ijns-2014-v16-n6-p437-443.pdf},
  timestamp = {Mon, 24 Nov 2014 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LiuMXL14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/LiuZMLX14,
  author    = {Ximeng Liu and
               Hui Zhu and
               Jianfeng Ma and
               Qi Li and
               Jinbo Xiong},
  title     = {Efficient attribute based sequential aggregate signature for wireless
               sensor networks},
  journal   = {IJSNet},
  volume    = {16},
  number    = {3},
  pages     = {172--184},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJSNET.2014.066808},
  doi       = {10.1504/IJSNET.2014.066808},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsnet/LiuZMLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/XiongYMLLM14,
  author    = {Jinbo Xiong and
               Zhiqiang Yao and
               Jianfeng Ma and
               Ximeng Liu and
               Qi Li and
               Jun Ma},
  title     = {{PRIAM:} Privacy Preserving Identity and Access Management Scheme
               in Cloud},
  journal   = {{TIIS}},
  volume    = {8},
  number    = {1},
  pages     = {282--304},
  year      = {2014},
  url       = {https://doi.org/10.3837/tiis.2014.01.017},
  doi       = {10.3837/tiis.2014.01.017},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itiis/XiongYMLLM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LuZLLS14,
  author    = {Rongxing Lu and
               Hui Zhu and
               Ximeng Liu and
               Joseph K. Liu and
               Jun Shao},
  title     = {Toward efficient and privacy-preserving computing in big data era},
  journal   = {{IEEE} Network},
  volume    = {28},
  number    = {4},
  pages     = {46--50},
  year      = {2014},
  url       = {https://doi.org/10.1109/MNET.2014.6863131},
  doi       = {10.1109/MNET.2014.6863131},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/network/LuZLLS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiongLYMLGC14,
  author    = {Jinbo Xiong and
               Ximeng Liu and
               Zhiqiang Yao and
               Jianfeng Ma and
               Qi Li and
               Kui Geng and
               Patrick S. Chen},
  title     = {A Secure Data Self-Destructing Scheme in Cloud Computing},
  journal   = {{IEEE} Trans. Cloud Computing},
  volume    = {2},
  number    = {4},
  pages     = {448--458},
  year      = {2014},
  url       = {https://doi.org/10.1109/TCC.2014.2372758},
  doi       = {10.1109/TCC.2014.2372758},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tcc/XiongLYMLGC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuZMMM14,
  author    = {Ximeng Liu and
               Hui Zhu and
               Jianfeng Ma and
               Jun Ma and
               Siqi Ma},
  title     = {Key-Policy Weighted Attribute based Encryption for fine-grained access
               control},
  booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
               Australia, June 10-14, 2014, Workshops Proceedings},
  pages     = {694--699},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://doi.org/10.1109/ICCW.2014.6881280},
  doi       = {10.1109/ICCW.2014.6881280},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/icc/LiuZMMM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuHLL14,
  author    = {Hui Zhu and
               Rong Huang and
               Ximeng Liu and
               Hui Li},
  title     = {{SPEMR:} {A} new secure personal electronic medical record scheme
               with privilege separation},
  booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
               Australia, June 10-14, 2014, Workshops Proceedings},
  pages     = {700--705},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://doi.org/10.1109/ICCW.2014.6881281},
  doi       = {10.1109/ICCW.2014.6881281},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/icc/ZhuHLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangMXLLX14,
  author    = {Tao Zhang and
               Jianfeng Ma and
               Ning Xi and
               Ximeng Liu and
               Zhiquan Liu and
               Jinbo Xiong},
  title     = {Trustworthy Service Composition in Service-Oriented Mobile Social
               Networks},
  booktitle = {2014 {IEEE} International Conference on Web Services, ICWS, 2014,
               Anchorage, AK, USA, June 27 - July 2, 2014},
  pages     = {684--687},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/ICWS.2014.102},
  doi       = {10.1109/ICWS.2014.102},
  timestamp = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icws/ZhangMXLLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/YaoXMLL13,
  author    = {Zhiqiang Yao and
               Jinbo Xiong and
               Jianfeng Ma and
               Qi Li and
               Ximeng Liu},
  title     = {Access control requirements for structured document in cloud computing},
  journal   = {{IJGUC}},
  volume    = {4},
  number    = {2/3},
  pages     = {95--102},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJGUC.2013.056244},
  doi       = {10.1504/IJGUC.2013.056244},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijguc/YaoXMLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiongYMLLZ13,
  author    = {Jinbo Xiong and
               Zhiqiang Yao and
               Jianfeng Ma and
               Ximeng Liu and
               Qi Li and
               Tao Zhang},
  editor    = {Xingming Sun and
               Elaine Shi and
               Kui Ren},
  title     = {{PRAM:} privacy preserving access management scheme in cloud services},
  booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud
               Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages     = {41--46},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2484402.2484412},
  doi       = {10.1145/2484402.2484412},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/XiongYMLLZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuMLXH13,
  author    = {Ximeng Liu and
               Jianfeng Ma and
               Qi Li and
               Jinbo Xiong and
               Faliang Huang},
  title     = {Attribute Based Multi-signature Scheme in the Standard Model},
  booktitle = {Ninth International Conference on Computational Intelligence and Security,
               {CIS} 2013, Emei Mountain, Sichan Province, China, December 14-15,
               2013},
  pages     = {738--742},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://doi.org/10.1109/CIS.2013.161},
  doi       = {10.1109/CIS.2013.161},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/cis/LiuMLXH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XiongYMLL13,
  author    = {Jinbo Xiong and
               Zhiqiang Yao and
               Jianfeng Ma and
               Ximeng Liu and
               Qi Li},
  title     = {A Secure Document Self-Destruction Scheme: An {ABE} Approach},
  booktitle = {10th {IEEE} International Conference on High Performance Computing
               and Communications {\&} 2013 {IEEE} International Conference on
               Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China,
               November 13-15, 2013},
  pages     = {59--64},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/HPCC.and.EUC.2013.18},
  doi       = {10.1109/HPCC.and.EUC.2013.18},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/hpcc/XiongYMLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/LiuMXZL13,
  author    = {Ximeng Liu and
               Jianfeng Ma and
               Jinbo Xiong and
               Tao Zhang and
               Qi Li},
  editor    = {Mukaddim Pathan and
               Guiyi Wei and
               Giancarlo Fortino},
  title     = {Personal Health Records Integrity Verification Using Attribute Based
               Proxy Signature in Cloud Computing},
  booktitle = {Internet and Distributed Computing Systems - 6th International Conference,
               {IDCS} 2013, Hangzhou, China, October 28-30, 2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8223},
  pages     = {238--251},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41428-2\_19},
  doi       = {10.1007/978-3-642-41428-2\_19},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/conf/idcs/LiuMXZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhuXZ0LL13,
  author    = {Hui Zhu and
               Yingfang Xue and
               Yun Zhang and
               Xiaofeng Chen and
               Hui Li and
               Ximeng Liu},
  title     = {{V-MLR:} {A} Multilevel Security Model for Virtualization},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {9--16},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/INCoS.2013.12},
  doi       = {10.1109/INCoS.2013.12},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/incos/ZhuXZ0LL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiuMXLM13,
  author    = {Ximeng Liu and
               Jianfeng Ma and
               Jinbo Xiong and
               Qi Li and
               Jun Ma},
  title     = {Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained
               Access Control},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {51--57},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/INCoS.2013.18},
  doi       = {10.1109/INCoS.2013.18},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/incos/LiuMXLM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiuZMZC13,
  author    = {Ximeng Liu and
               Tao Zhang and
               Jianfeng Ma and
               Hui Zhu and
               Feng Cai},
  title     = {Efficient Data Integrity Verification Using Attribute Based Multi-signature
               Scheme in Wireless Network},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {173--180},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/INCoS.2013.34},
  doi       = {10.1109/INCoS.2013.34},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/incos/LiuZMZC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiMXZL13,
  author    = {Qi Li and
               Jianfeng Ma and
               Jinbo Xiong and
               Tao Zhang and
               Ximeng Liu},
  title     = {Fully Secure Decentralized Key-Policy Attribute-Based Encryption},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {220--225},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/INCoS.2013.39},
  doi       = {10.1109/INCoS.2013.39},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/incos/LiMXZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/XiongYMLL13,
  author    = {Jinbo Xiong and
               Zhiqiang Yao and
               Jianfeng Ma and
               Ximeng Liu and
               Qi Li},
  title     = {A Secure Document Self-Destruction Scheme with Identity Based Encryption},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {239--243},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/INCoS.2013.42},
  doi       = {10.1109/INCoS.2013.42},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/incos/XiongYMLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics