Xingliang Yuan
Xingliang Yuan
Department of Software Systems and Cybersecurity, Faculty of IT, Monash University
Verified email at monash.edu - Homepage
Title
Cited by
Cited by
Year
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
992018
Federated learning for 6g communications: Challenges, methods, and future directions
Y Liu, X Yuan, Z Xiong, J Kang, X Wang, D Niyato
China Communications 17 (9), 105-118, 2020
642020
Privacy-preserving deep packet inspection in outsourced middleboxes
X Yuan, X Wang, J Lin, C Wang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
572016
Towards trustworthy and private keyword search in encrypted decentralized storage
C Cai, X Yuan, C Wang
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
542017
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
D Huayi, W Cong, X Yuan, Y Zhou, Q Wang, K Ren
26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019
51*2019
Enabling privacy-preserving image-centric social discovery
X Yuan, X Wang, C Wang, A Squicciarini, K Ren
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
512014
Toward Encrypted Cloud Media Center With Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2017
482017
Enabling Encrypted Cloud Media Center with Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
482015
Privacy-aware and efficient mobile crowdsensing with truth discovery
Y Zheng, H Duan, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 121-133, 2017
432017
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
J Zhu, Q Li, C Wang, X Yuan, Q Wang, K Ren
IEEE Transactions on Parallel and Distributed Systems 29 (8), 1721-1735, 2018
372018
Non-interactive privacy-preserving truth discovery in crowd sensing applications
X Tang, C Wang, X Yuan, Q Wang
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1988-1996, 2018
362018
Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records
X Yuan, H Cui, X Wang, C Wang
Computer Security–ESORICS 2015, 40-60, 2015
362015
EncKV: An Encrypted Key-value Store with Rich Queries
X Yuan, Y Guo, X Wang, C Wang, B Li, X Jia
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
342017
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing
X Yuan, X Wang, C Wang, J Weng, K Ren
IEEE Transactions on Multimedia 18 (10), 2002-2014, 2016
342016
Building an Encrypted, Distributed, and Searchable Key-value Store
X Yuan, X Wang, C Wang, C Qian, J Lin
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
302016
Privacy-Preserving Similarity Joins Over Encrypted Data
X Yuan, X Wang, C Wang, C Yu, S Nutanong
IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017
282017
Hardening distributed and encrypted keyword search via blockchain
C Cai, X Yuan, C Wang
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 119-128, 2017
272017
Hardening Database Padding for Searchable Encryption
L Xu, X Yuan, C Wang, Q Wang, C Xu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2503-2511, 2019
262019
Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing
H Cui, X Yuan, C Wang
IEEE Transactions on Mobile Computing 16 (5), 1315-1329, 2017
252017
Enabling secure and effective near-duplicate detection over encrypted in-network storage
H Cui, X Yuan, Y Zheng, C Wang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
242016
The system can't perform the operation now. Try again later.
Articles 1–20