default search action
Xingliang Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j44]Ziyao Liu, Yu Jiang, Jiyuan Shen, Minyi Peng, Kwok-Yan Lam, Xingliang Yuan, Xiaoning Liu:
A Survey on Federated Unlearning: Challenges, Methods, and Future Directions. ACM Comput. Surv. 57(1): 2:1-2:38 (2025) - [j43]Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. Proc. Priv. Enhancing Technol. 2025(1): 440-455 (2025) - 2024
- [j42]He Zhang, Bang Wu, Xingliang Yuan, Shirui Pan, Hanghang Tong, Jian Pei:
Trustworthy Graph Neural Networks: Aspects, Methods, and Trends. Proc. IEEE 112(2): 97-139 (2024) - [j41]Lin Mei, Chungen Xu, Lei Xu, Xingliang Yuan, Joseph K. Liu:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. IEEE Trans. Dependable Secur. Comput. 21(1): 63-77 (2024) - [j40]Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xingliang Yuan:
DeFiRanger: Detecting DeFi Price Manipulation Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 4147-4161 (2024) - [j39]Dabao Wang, Bang Wu, Xingliang Yuan, Lei Wu, Yajin Zhou, Helei Cui:
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks. IEEE Trans. Serv. Comput. 17(6): 3345-3358 (2024) - [c68]Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu:
AegisDB: Scalable Blockchain Database with Secure Decentralised Load Balancing. ACISP (3) 2024: 105-119 - [c67]Yanjun Shen, Joseph K. Liu, Xingliang Yuan, Shifeng Sun, Hui Cui:
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications. ACISP (3) 2024: 213-232 - [c66]Blake Haydon, Shangqi Lai, Xingliang Yuan, Sharif Abuadbba, Carsten Rudolph:
Towards Private Multi-operator Network Slicing. ACISP (3) 2024: 359-379 - [c65]Bo Li, Wenyuan Xu, Jieshan Chen, Yang Zhang, Minhui Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan:
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis. CCS 2024: 4888-4889 - [c64]He Zhang, Xingliang Yuan, Shirui Pan:
Unraveling Privacy Risks of Individual Fairness in Graph Neural Networks. ICDE 2024: 1712-1725 - [c63]Yi Liu, Cong Wang, Xingliang Yuan:
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning. KDD 2024: 1944-1955 - [c62]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. ACM Multimedia 2024: 3578-3586 - [c61]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. NDSS 2024 - [c60]Quan Hong Nguyen, Tingmin Wu, Van Nguyen, Xingliang Yuan, Jason Xue, Carsten Rudolph:
Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails. SecTL@AsiaCCS 2024: 35-46 - [c59]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. SP 2024: 2534-2552 - [c58]Zhibo Xu, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Xingliang Yuan, Xun Yi:
OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural Network. USENIX Security Symposium 2024 - [i41]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph:
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. CoRR abs/2402.17092 (2024) - [i40]Van Nguyen, Xingliang Yuan, Tingmin Wu, Surya Nepal, Marthie Grobler, Carsten Rudolph:
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone? CoRR abs/2404.05964 (2024) - [i39]He Zhang, Bang Wu, Xiangwen Yang, Xingliang Yuan, Chengqi Zhang, Shirui Pan:
Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks. CoRR abs/2405.14407 (2024) - [i38]Shuo Huang, William MacLean, Xiaoxi Kang, Anqi Wu, Lizhen Qu, Qiongkai Xu, Zhuang Li, Xingliang Yuan, Gholamreza Haffari:
NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human. CoRR abs/2406.03749 (2024) - [i37]Dabao Wang, Bang Wu, Xingliang Yuan, Lei Wu, Yajin Zhou, Helei Cui:
DeFiGuard: A Price Manipulation Detection Service in DeFi using Graph Neural Networks. CoRR abs/2406.11157 (2024) - [i36]Yi Liu, Cong Wang, Xingliang Yuan:
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning. CoRR abs/2406.12222 (2024) - [i35]Thusitha Dayaratne, Viet Vo, Shangqi Lai, Sharif Abuadbba, Blake Haydon, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph:
Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp. CoRR abs/2406.12299 (2024) - [i34]Viet Vo, Thusitha Dayaratne, Blake Haydon, Xingliang Yuan, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Carsten Rudolph:
Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing. CoRR abs/2406.12330 (2024) - [i33]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. CoRR abs/2407.15050 (2024) - [i32]Van Nguyen, Surya Nepal, Tingmin Wu, Xingliang Yuan, Carsten Rudolph:
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection. CoRR abs/2409.00882 (2024) - 2023
- [j38]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques. IEEE Trans. Dependable Secur. Comput. 20(1): 620-636 (2023) - [j37]Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [j36]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. IEEE Trans. Dependable Secur. Comput. 20(2): 988-1001 (2023) - [j35]Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng. 35(4): 4236-4252 (2023) - [j34]He Zhang, Xingliang Yuan, Chuan Zhou, Shirui Pan:
Projective Ranking-Based GNN Evasion Attacks. IEEE Trans. Knowl. Data Eng. 35(8): 8402-8416 (2023) - [j33]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. IEEE Trans. Serv. Comput. 16(1): 656-669 (2023) - [c57]Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CCS 2023: 3003-3017 - [c56]Shuo Huang, Lizhen Qu, Xingliang Yuan, Chunyang Chen:
FaLA: Fast Linear Adaptation for Replacing Backbone Models on Edge Devices. EMNLP (Findings) 2023: 4874-4885 - [c55]Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-Enclave Time Series Processing System. ICICS 2023: 719-737 - [c54]He Zhang, Bang Wu, Shuo Wang, Xiangwen Yang, Minhui Xue, Shirui Pan, Xingliang Yuan:
Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks. ICML 2023: 41737-41752 - [c53]Mengzhen Gao, Helei Cui, Yanze Xie, Yaxing Chen, Zhiwen Yu, Bin Guo, Xingliang Yuan:
Practical Earphone Eavesdropping with Built-in Motion Sensors. ICPADS 2023: 2219-2226 - [c52]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. TPS-ISA 2023: 13-22 - [c51]Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo:
Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services. TrustCom 2023: 307-317 - [c50]Yujin Huang, Terry Yue Zhuo, Qiongkai Xu, Han Hu, Xingliang Yuan, Chunyang Chen:
Training-free Lexical Backdoor Attacks on Language Models. WWW 2023: 2198-2208 - [e4]Bo Li, Wenyuan Xu, Jieshan Chen, Yang Zhang, Jason Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan:
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, LAMPS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2023, ISBN 979-8-4007-1209-8 [contents] - [i31]He Zhang, Xingliang Yuan, Quoc Viet Hung Nguyen, Shirui Pan:
On the Interaction between Node Fairness and Edge Privacy in Graph Neural Networks. CoRR abs/2301.12951 (2023) - [i30]Yujin Huang, Terry Yue Zhuo, Qiongkai Xu, Han Hu, Xingliang Yuan, Chunyang Chen:
Training-free Lexical Backdoor Attacks on Language Models. CoRR abs/2302.04116 (2023) - [i29]Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-enclave Time series Processing System. CoRR abs/2306.16652 (2023) - [i28]Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CoRR abs/2309.04697 (2023) - [i27]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. CoRR abs/2309.11691 (2023) - [i26]Ziyao Liu, Yu Jiang, Jiyuan Shen, Minyi Peng, Kwok-Yan Lam, Xingliang Yuan:
A Survey on Federated Unlearning: Challenges, Methods, and Future Directions. CoRR abs/2310.20448 (2023) - [i25]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. CoRR abs/2312.07861 (2023) - [i24]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. CoRR abs/2312.07870 (2023) - 2022
- [j32]Qingqing Gan, Joseph K. Liu, Xiaoming Wang, Xingliang Yuan, Shifeng Sun, Daxin Huang, Cong Zuo, Jianfeng Wang:
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Frontiers Comput. Sci. 16(6): 166820 (2022) - [j31]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. J. Comput. Secur. 30(6): 795-827 (2022) - [j30]Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j29]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IEEE Trans. Dependable Secur. Comput. 19(4): 2609-2621 (2022) - [j28]Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. IEEE Trans. Inf. Forensics Secur. 17: 237-252 (2022) - [j27]Yuanshao Zhu, Yi Liu, James J. Q. Yu, Xingliang Yuan:
Semi-Supervised Federated Learning for Travel Mode Identification From GPS Trajectories. IEEE Trans. Intell. Transp. Syst. 23(3): 2380-2391 (2022) - [c49]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation. AsiaCCS 2022: 337-350 - [c48]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. INFOCOM 2022: 1749-1758 - [c47]Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal:
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. ISC 2022: 269-289 - [c46]Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. RAID 2022: 99-114 - [c45]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. SERVICES 2022: 14 - [e3]Wei Bao, Xingliang Yuan, Longxiang Gao, Tom H. Luan, David Bong Jun Choi:
Ad Hoc Networks and Tools for IT - 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6-7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 428, Springer 2022, ISBN 978-3-030-98004-7 [contents] - [e2]Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar:
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13787, Springer 2022, ISBN 978-3-031-23019-6 [contents] - [i23]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022) - [i22]He Zhang, Xingliang Yuan, Chuan Zhou, Shirui Pan:
Projective Ranking-based GNN Evasion Attacks. CoRR abs/2202.12993 (2022) - [i21]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. CoRR abs/2203.07320 (2022) - [i20]He Zhang, Bang Wu, Xingliang Yuan, Shirui Pan, Hanghang Tong, Jian Pei:
Trustworthy Graph Neural Networks: Aspects, Methods and Trends. CoRR abs/2205.07424 (2022) - [i19]Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. CoRR abs/2207.01790 (2022) - [i18]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization. IACR Cryptol. ePrint Arch. 2022: 899 (2022) - 2021
- [j26]Yanli Ren, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J. Inf. Secur. Appl. 58: 102698 (2021) - [j25]Chengjun Cai, Jian Weng, Xingliang Yuan, Cong Wang:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE Trans. Dependable Secur. Comput. 18(1): 131-144 (2021) - [j24]Lei Xu, Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Cong Zuo, Chungen Xu:
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases. IEEE Trans. Emerg. Top. Comput. 9(1): 534-546 (2021) - [j23]Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 5310-5325 (2021) - [j22]Helei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang:
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection. IEEE Trans. Serv. Comput. 14(4): 998-1012 (2021) - [c44]Bang Wu, Shirui Pan, Xingliang Yuan:
Towards Extracting Graph Neural Network Models via Prediction Queries (Student Abstract). AAAI 2021: 15925-15926 - [c43]Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Joseph K. Liu:
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves. ACNS (1) 2021: 50-75 - [c42]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem. SBC@AsiaCCS 2021: 23-28 - [c41]He Zhang, Bang Wu, Xiangwen Yang, Chuan Zhou, Shuo Wang, Xingliang Yuan, Shirui Pan:
Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks. CIKM 2021: 3617-3621 - [c40]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service. ESORICS (1) 2021: 519-541 - [c39]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications. ICDM 2021: 1421-1426 - [c38]Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal:
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control. ISPEC 2021: 126-146 - [c37]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [c36]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [e1]Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tran:
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 402, Springer 2021, ISBN 978-3-030-91423-3 [contents] - [i17]Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, Kui Ren:
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. CoRR abs/2104.15068 (2021) - [i16]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications. CoRR abs/2110.08760 (2021) - [i15]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - [i14]Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 1593 (2021) - 2020
- [j21]Xingliang Yuan, Chengjun Cai, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - [j20]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets. IEEE Internet Things J. 7(4): 2651-2662 (2020) - [j19]Yu Guo, Mingyue Wang, Cong Wang, Xingliang Yuan, Xiaohua Jia:
Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes. IEEE Internet Things J. 7(6): 5359-5370 (2020) - [j18]Yifeng Zheng, Huayi Duan, Xingliang Yuan, Cong Wang:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. IEEE Trans. Dependable Secur. Comput. 17(1): 121-133 (2020) - [j17]Xu Yuan, Xingliang Yuan, Yihe Zhang, Baochun Li, Cong Wang:
Enabling Encrypted Boolean Queries in Geographically Distributed Databases. IEEE Trans. Parallel Distributed Syst. 31(3): 634-646 (2020) - [j16]Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, Cong Wang:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. IEEE Trans. Serv. Comput. 13(3): 410-424 (2020) - [c35]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. ACNS (2) 2020: 83-103 - [i13]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. CoRR abs/2001.01848 (2020) - [i12]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. CoRR abs/2001.03743 (2020) - [i11]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database with Padding Countermeasures. CoRR abs/2003.06103 (2020) - [i10]Yi Liu, Xingliang Yuan, Zehui Xiong, Jiawen Kang, Xiaofei Wang, Dusit Niyato:
Federated Learning for 6G Communications: Challenges, Methods, and Future Directions. CoRR abs/2006.02931 (2020) - [i9]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i8]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization. CoRR abs/2010.12751 (2020) - [i7]Yi Liu, Xingliang Yuan, Ruihui Zhao, Yifeng Zheng, Yefeng Zheng:
RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System. CoRR abs/2012.04432 (2020) - [i6]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IACR Cryptol. ePrint Arch. 2020: 20 (2020) - [i5]Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. IACR Cryptol. ePrint Arch. 2020: 463 (2020)
2010 – 2019
- 2019
- [j15]Huayi Duan, Yifeng Zheng, Cong Wang, Xingliang Yuan:
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things. IEEE Internet Things J. 6(2): 2637-2650 (2019) - [j14]Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:
Toward Secure and Scalable Computation in Internet of Things Data Applications. IEEE Internet Things J. 6(2): 3753-3763 (2019) - [j13]Yu Guo, Xingliang Yuan, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
Enabling Encrypted Rich Queries in Distributed Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 30(6): 1283-1297 (2019) - [c34]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. AsiaCCS 2019: 41-54 - [c33]Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu:
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. AsiaCCS 2019: 122-133 - [c32]Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. CCS 2019: 2351-2367 - [c31]Xingliang Yuan, Chengjun Cai, Qian Wang, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8 - [c30]Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang:
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. ICDE 2019: 626-637 - [c29]Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang, Chungen Xu:
Hardening Database Padding for Searchable Encryption. INFOCOM 2019: 2503-2511 - [i4]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search. CoRR abs/1905.04501 (2019) - [i3]Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph:
Defending Against Misclassification Attacks in Transfer Learning. CoRR abs/1908.11230 (2019) - [i2]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets. CoRR abs/1911.05927 (2019) - 2018
- [j12]Cong Wang, Xingliang Yuan, Yong Cui, Kui Ren:
Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond. IEEE Netw. 32(1): 166-171 (2018) - [j11]Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. IEEE Trans. Dependable Secur. Comput. 15(5): 868-882 (2018) - [j10]Xingliang Yuan, Huayi Duan, Cong Wang:
Assuring String Pattern Matching in Outsourced Middleboxes. IEEE/ACM Trans. Netw. 26(3): 1362-1375 (2018) - [j9]Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j8]Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren:
Secure Integrated Circuit Design via Hybrid Cloud. IEEE Trans. Parallel Distributed Syst. 29(8): 1851-1864 (2018) - [c28]Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. CCS 2018: 763-780 - [c27]Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. Inscrypt 2018: 260-273 - [c26]Helei Cui, Cong Wang, Yu Hua, Yuefeng Du, Xingliang Yuan:
A Bandwidth-Efficient Middleware for Encrypted Deduplication. DSC 2018: 1-8 - [c25]Xiaoting Tang, Cong Wang, Xingliang Yuan, Qian Wang:
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications. INFOCOM 2018: 1988-1996 - [c24]Yu Guo, Cong Wang, Xingliang Yuan, Xiaohua Jia:
Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes. IWQoS 2018: 1-10 - [c23]Xiaoning Liu, Xingliang Yuan, Joseph K. Liu:
Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data. TrustCom/BigDataSE 2018: 1664-1668 - 2017
- [j7]Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, Sarana Nutanong:
Privacy-Preserving Similarity Joins Over Encrypted Data. IEEE Trans. Inf. Forensics Secur. 12(11): 2763-2775 (2017) - [j6]Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, Xingliang Yuan:
A Generic Method for Accelerating LSH-Based Similarity Join Processing. IEEE Trans. Knowl. Data Eng. 29(4): 712-726 (2017) - [j5]Helei Cui, Xingliang Yuan, Cong Wang:
Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing. IEEE Trans. Mob. Comput. 16(5): 1315-1329 (2017) - [j4]Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui:
Toward Encrypted Cloud Media Center With Secure Deduplication. IEEE Trans. Multim. 19(2): 251-265 (2017) - [c22]Zhenkui Shi, Xiaoning Liu, Xingliang Yuan:
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination. SCC@AsiaCCS 2017: 51-57 - [c21]Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
EncKV: An Encrypted Key-value Store with Rich Queries. AsiaCCS 2017: 423-435 - [c20]Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:
Secure multi-client data access with boolean queries in distributed key-value stores. CNS 2017: 1-9 - [c19]Chengjun Cai, Xingliang Yuan, Cong Wang:
Towards trustworthy and private keyword search in encrypted decentralized storage. ICC 2017: 1-7 - [c18]Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, Xingliang Yuan:
A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract). ICDE 2017: 29-30 - [c17]Xiaoning Liu, Xingliang Yuan, Cong Wang:
EncSIM: An encrypted similarity search service for distributed high-dimensional datasets. IWQoS 2017: 1-10 - [c16]Chengjun Cai, Xingliang Yuan, Cong Wang:
Hardening Distributed and Encrypted Keyword Search via Blockchain. PAC 2017: 119-128 - [i1]Huayi Duan, Xingliang Yuan, Cong Wang:
LightBox: SGX-assisted Secure Network Functions at Near-native Speed. CoRR abs/1706.06261 (2017) - 2016
- [j3]Jinghua Jiang, Yifeng Zheng, Xingliang Yuan, Zhenkui Shi, Xiaolin Gui, Cong Wang, Jing Yao:
Towards Secure and Accurate Targeted Mobile Coupon Delivery. IEEE Access 4: 8116-8126 (2016) - [j2]Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-José Montpetit, Shucheng Liu:
Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching. IEEE J. Sel. Areas Commun. 34(8): 2077-2090 (2016) - [j1]Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, Kui Ren:
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE Trans. Multim. 18(10): 2002-2014 (2016) - [c15]Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin:
Building an Encrypted, Distributed, and Searchable Key-value Store. AsiaCCS 2016: 547-558 - [c14]Chengcheng Dai, Xingliang Yuan, Cong Wang:
Privacy-Preserving Ridesharing Recommendation in Geosocial Networks. CSoNet 2016: 193-205 - [c13]Xingliang Yuan, Huayi Duan, Cong Wang:
Bringing execution assurances of pattern matching in outsourced middleboxes. ICNP 2016: 1-10 - [c12]Xingliang Yuan, Huayi Duan, Cong Wang:
Towards verifiable outsourced middleboxes. ICNP 2016: 1-2 - [c11]Helei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang:
Enabling secure and effective near-duplicate detection over encrypted in-network storage. INFOCOM 2016: 1-9 - [c10]Xingliang Yuan, Xinyu Wang, Jianxiong Lin, Cong Wang:
Privacy-preserving deep packet inspection in outsourced middleboxes. INFOCOM 2016: 1-9 - 2015
- [c9]Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui:
Enabling Encrypted Cloud Media Center with Secure Deduplication. AsiaCCS 2015: 63-72 - [c8]Xingliang Yuan, Cong Wang, Kui Ren:
Enabling IP Protection for Outsourced Integrated Circuit Design. AsiaCCS 2015: 237-247 - [c7]Xingliang Yuan, Xinyu Wang, Yilei Chu, Cong Wang, Chen Qian:
Towards a scalable, private, and searchable key-value store. CNS 2015: 773-774 - [c6]Xingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang:
Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records. ESORICS (2) 2015: 40-60 - [c5]Jinghua Jiang, Zhenkui Shi, Xingliang Yuan, Cong Wang, Xiaolin Gui:
Towards secure and practical targeted mobile advertising. INFOCOM Workshops 2015: 79-80 - [c4]Helei Cui, Xingliang Yuan, Cong Wang:
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices. INFOCOM 2015: 2659-2667 - [c3]Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, Cong Wang:
Towards Secure and Practical Targeted Mobile Advertising. MSN 2015: 79-88 - 2014
- [c2]Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Enabling Privacy-Preserving Image-Centric Social Discovery. ICDCS 2014: 198-207 - 2010
- [c1]Xingliang Yuan, Jia Wang:
Statistical timing verification for transparently latched circuits through structural graph traversal. ASP-DAC 2010: 663-668
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint