


default search action
Yingjie Xue
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Ritam Ganguly, Yingjie Xue, Aaron Jonckheere, Parker Ljung, Benjamin Schornstein, Borzoo Bonakdarpour, Maurice Herlihy:
Distributed runtime verification of metric temporal properties. J. Parallel Distributed Comput. 185: 104801 (2024) - [j18]Meiqi Li, Xinyi Luo, Kaiping Xue
, Yingjie Xue
, Wentuo Sun, Jian Li
:
A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic Management. IEEE Trans. Inf. Forensics Secur. 19: 5911-5924 (2024) - [i8]Jingyu Liu, Yingjie Xue, Zifan Peng, Chao Lin, Xinyi Huang:
FairRelay: Fair and Cost-Efficient Peer-to-Peer Content Delivery through Payment Channel Networks. CoRR abs/2405.02973 (2024) - [i7]Zifan Peng, Yingjie Xue, Jingyu Liu:
Efficient and Universally Accessible Cross-Chain Options without Upfront Holder Collateral. CoRR abs/2410.15724 (2024) - 2023
- [c8]Yingjie Xue
, Di Jin
, Maurice Herlihy
:
Invited Paper: Fault-tolerant and Expressive Cross-Chain Swaps. ICDCN 2023: 28-37 - 2022
- [c7]Daniel Engel
, Yingjie Xue
:
Transferable Cross-Chain Options. AFT 2022: 161-179 - [c6]Ritam Ganguly, Yingjie Xue, Aaron Jonckheere, Parker Ljung, Benjamin Schornstein, Borzoo Bonakdarpour, Maurice Herlihy:
Distributed Runtime Verification of Metric Temporal Properties for Cross-Chain Protocols. ICDCS 2022: 23-33 - [c5]Yingjie Xue
, Maurice Herlihy
:
Invited Paper: Cross-Chain State Machine Replication. SSS 2022: 51-65 - [i6]Ritam Ganguly, Yingjie Xue, Aaron Jonckheere, Parker Ljung, Benjamin Schornstein, Borzoo Bonakdarpour, Maurice Herlihy:
Distributed Runtime Verification of Metric Temporal Properties for Cross-Chain Protocols. CoRR abs/2204.09796 (2022) - [i5]Daniel Engel, Yingjie Xue:
Transferable Cross-Chain Options. CoRR abs/2205.02971 (2022) - [i4]Yingjie Xue, Maurice Herlihy:
Cross-Chain State Machine Replication. CoRR abs/2206.07042 (2022) - [i3]Yingjie Xue, Di Jin, Maurice Herlihy:
Invited Paper: Fault-tolerant and Expressive Cross-Chain Swaps. CoRR abs/2211.00208 (2022) - 2021
- [j17]Wei Lu
, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang
, Yun Q. Shi:
Secure Halftone Image Steganography Based on Pixel Density Transition. IEEE Trans. Dependable Secur. Comput. 18(3): 1137-1149 (2021) - [c4]Yingjie Xue, Maurice Herlihy:
Hedging Against Sore Loser Attacks in Cross-Chain Transactions. PODC 2021: 155-164 - [c3]Daniel Engel, Maurice Herlihy
, Yingjie Xue:
Failure is (literally) an Option: Atomic Commitment vs Optionality in Decentralized Finance. SSS 2021: 66-77 - [i2]Yingjie Xue, Maurice Herlihy:
Hedging Against Sore Loser Attacks in Cross-Chain Transactions. CoRR abs/2105.06322 (2021) - [i1]Daniel Engel, Maurice Herlihy, Yingjie Xue:
Invited Paper: Failure is (literally) an Option: Atomic Commitment vs Optionality in Decentralized Finance. CoRR abs/2109.12167 (2021) - 2020
- [j16]Xianjin Liu, Wei Lu
, Yingjie Xue, Yuileong Yeung:
Upscaling factor estimation on double JPEG compressed images. Multim. Tools Appl. 79(19-20): 12891-12914 (2020) - [j15]Yuileong Yeung, Wei Lu
, Yingjie Xue, Jiwu Huang
, Yun Qing Shi:
Secure Binary Image Steganography With Distortion Measurement Based on Prediction. IEEE Trans. Circuits Syst. Video Technol. 30(5): 1423-1434 (2020) - [j14]Jianan Hong, Kaiping Xue
, Yingjie Xue, Weikeng Chen
, David S. L. Wei, Nenghai Yu
, Peilin Hong
:
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud. IEEE Trans. Serv. Comput. 13(1): 158-171 (2020)
2010 – 2019
- 2019
- [j13]Yingjie Xue, Wanteng Liu, Wei Lu
, Yuileong Yeung, Xianjin Liu, Hongmei Liu:
Efficient halftone image steganography based on dispersion degree optimization. J. Real Time Image Process. 16(3): 601-609 (2019) - [j12]Xianjin Liu, Wei Lu
, Tao Huang, Hongmei Liu, Yingjie Xue, Yuileong Yeung:
Scaling factor estimation on JPEG compressed images by cyclostationarity analysis. Multim. Tools Appl. 78(7): 7947-7964 (2019) - [j11]Fang Zhang, Wei Lu
, Hongmei Liu, Yuileong Yeung, Yingjie Xue:
Reversible data hiding in binary images based on image magnification. Multim. Tools Appl. 78(15): 21891-21915 (2019) - [j10]Yuileong Yeung, Wei Lu
, Yingjie Xue, Junjia Chen, Ruipeng Li:
Secure binary image steganography based on LTP distortion minimization. Multim. Tools Appl. 78(17): 25079-25100 (2019) - [j9]Ke Liu, Wei Lu
, Cong Lin, Xinchao Huang, Xianjin Liu, Yuileong Yeung, Yingjie Xue:
Copy move forgery detection based on keypoint and patch match. Multim. Tools Appl. 78(22): 31387-31413 (2019) - [j8]Wei Lu
, Liyu He
, Yuileong Yeung
, Yingjie Xue, Hongmei Liu, Bingwen Feng:
Secure Binary Image Steganography Based on Fused Distortion Measurement. IEEE Trans. Circuits Syst. Video Technol. 29(6): 1608-1618 (2019) - [j7]Yingjie Xue, Kaiping Xue
, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong
:
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(11): 2927-2942 (2019) - 2018
- [j6]Zhaozhi Xie, Wei Lu, Xianjin Liu, Yingjie Xue, Yuileong Yeung:
Copy-move detection of digital audio based on multi-feature decision. J. Inf. Secur. Appl. 43: 37-46 (2018) - [j5]Jialiang Chen, Wei Lu
, Yanmei Fang, Xianjin Liu, Yuileong Yeung, Yingjie Xue:
Binary image steganalysis based on local texture pattern. J. Vis. Commun. Image Represent. 55: 149-156 (2018) - 2017
- [j4]Kaiping Xue, Jianan Hong, Yingjie Xue, David S. L. Wei, Nenghai Yu, Peilin Hong:
CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding. IEEE Trans. Computers 66(9): 1491-1503 (2017) - [j3]Kaiping Xue
, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 953-967 (2017) - [j2]Kaiping Xue
, Shaohua Li, Jianan Hong, Yingjie Xue, Nenghai Yu, Peilin Hong:
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. IEEE Trans. Inf. Forensics Secur. 12(7): 1596-1608 (2017) - 2016
- [j1]Wei Li, Kaiping Xue, Yingjie Xue, Jianan Hong:
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage. IEEE Trans. Parallel Distributed Syst. 27(5): 1484-1496 (2016) - [c2]Yingjie Xue, Jianan Hong, Wei Li, Kaiping Xue, Peilin Hong:
LABAC: A Location-Aware Attribute-Based Access Control Scheme for Cloud Storage. GLOBECOM 2016: 1-6 - 2015
- [c1]Jia-An Hong, Kaiping Xue, Wei Li, Yingjie Xue:
TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud. GLOBECOM 2015: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint