default search action
Peng Xu 0003
Person information
- affiliation (PhD 2010): Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
Other persons with the same name
- Peng Xu (aka: Xu Peng) — disambiguation page
- Peng Xu 0001 — University of Electronic Science and Technology of China, Center for Information in Medicine, Chengdu, China (and 2 more)
- Peng Xu 0002 — Chongqing University of Posts and Telecommunications, China (and 1 more)
- Peng Xu 0004 — Southeast University, State Key Laboratory of Bioelectronics, School of Biological Science and Medical Engineering, Nanjing, China (and 1 more)
- Peng Xu 0005 — Beijing University of Posts and Telecommunications, Pattern Recognition and Intelligent System Laboratory, China
- Peng Xu 0006 — Tsinghua University, Department of Precision Instrument, Beijing, China
- Peng Xu 0007 — Hubei University of Technology, School of Science, Wuhan, China (and 3 more)
- Peng Xu 0008 — The Hong Kong University of Science and Technology
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Haochen Dou, Zhenwu Dan, Peng Xu, Wei Wang, Shuning Xu, Tianyang Chen, Hai Jin:
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness. IEEE Trans. Inf. Forensics Secur. 19: 2370-2384 (2024) - [j27]Wei Wang, Dongli Liu, Zilin Zheng, Peng Xu, Laurence Tianruo Yang:
Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack. IEEE Trans. Inf. Forensics Secur. 19: 8023-8036 (2024) - [j26]Yubo Zheng, Peng Xu, Miao Wang, Wanying Xu, Wei Wang, Tianyang Chen, Hai Jin:
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 19: 8802-8816 (2024) - [c22]Zhaojun Lu, Weizong Yu, Peng Xu, Wei Wang, Jiliang Zhang, Dengguo Feng:
An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE. DAC 2024: 158:1-158:6 - [c21]Haoqin Huang, Pengcheng Yao, Zhaozeng An, Yufei Sun, Ao Hu, Peng Xu, Long Zheng, Xiaofei Liao, Hai Jin:
SpaHet: A Software/Hardware Co-design for Accelerating Heterogeneous-Sparsity based Sparse Matrix Multiplication. DAC 2024: 202:1-202:6 - [c20]Xianlong Wang, Minghui Li, Peng Xu, Wei Liu, Leo Yu Zhang, Shengshan Hu, Yanjun Zhang:
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds. ESORICS (1) 2024: 125-145 - [c19]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification. ESORICS (1) 2024: 146-166 - [c18]Zhaojun Lu, Qidong Chen, Peng Xu, Jiliang Zhang, Gang Qu:
A Cryptographic Hardware Engineering Course based on FPGA and Security Analysis Equipment. ACM Great Lakes Symposium on VLSI 2024: 706-711 - [c17]Luying Li, Wei Yu, Peng Xu:
Fast and Simple Point Operations on Edwards448 and E448. Public Key Cryptography (4) 2024: 389-411 - [c16]Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang:
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. USENIX Security Symposium 2024 - [c15]Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang:
Query Recovery from Easy to Hard: Jigsaw Attack against SSE. USENIX Security Symposium 2024 - [i9]Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang:
Query Recovery from Easy to Hard: Jigsaw Attack against SSE. CoRR abs/2403.01155 (2024) - [i8]Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang:
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. CoRR abs/2403.01182 (2024) - [i7]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i6]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification. CoRR abs/2406.15093 (2024) - 2023
- [j25]Wei Wang, Dongli Liu, Peng Xu, Laurence Tianruo Yang, Kaitai Liang:
Keyword Search Shareable Encryption for Fast and Secure Data Replication. IEEE Trans. Inf. Forensics Secur. 18: 5537-5552 (2023) - [c14]Tingting Rao, Yixin Su, Peng Xu, Yubo Zheng, Wei Wang, Hai Jin:
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults. ESORICS (3) 2023: 141-161 - [c13]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c12]Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang:
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. NDSS 2023 - [c11]Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang:
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. USENIX Security Symposium 2023: 5953-5970 - [i5]Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang:
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. CoRR abs/2302.05628 (2023) - 2022
- [j24]Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, Hai Jin:
ROSE: Robust Searchable Encryption With Forward and Backward Security. IEEE Trans. Inf. Forensics Secur. 17: 1115-1130 (2022) - [j23]Peng Xu, Manqing Hu, Tianyang Chen, Wei Wang, Hai Jin:
LaF: Lattice-Based and Communication-Efficient Federated Learning. IEEE Trans. Inf. Forensics Secur. 17: 2483-2496 (2022) - [c10]Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. ESORICS (2) 2022: 86-104 - [c9]Chenyan Liu, Wei Wang, Rui Dai, Hao Nie, Peng Xu:
A Real-Time Scalable Video Distribution Strategy Based on Dynamic Coalition and D2D Broadcast. GLOBECOM 2022: 19-24 - 2021
- [j22]Peng Xu, Ruijie Sun, Wei Wang, Tianyang Chen, Yubo Zheng, Hai Jin:
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment. Future Gener. Comput. Syst. 125: 32-40 (2021) - [j21]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Qian Chen, Peng Xu:
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2820-2834 (2021) - [j20]Wei Wang, Cheng Fang, Laurence Tianruo Yang, Hongrui Duan, Peng Xu:
A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT. IEEE Trans. Ind. Informatics 17(11): 7860-7870 (2021) - [j19]Peiming Xu, Shaohua Tang, Peng Xu, Qianhong Wu, Honggang Hu, Willy Susilo:
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server. IEEE Trans. Serv. Comput. 14(6): 1877-1889 (2021) - [c8]Tianyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, Hai Jin:
Bestie: Very Practical Searchable Encryption with Forward and Backward Security. ESORICS (2) 2021: 3-23 - [c7]Jianguo Wang, Xiaomeng Yi, Rentong Guo, Hai Jin, Peng Xu, Shengjun Li, Xiangyu Wang, Xiangzhou Guo, Chengming Li, Xiaohai Xu, Kun Yu, Yuxing Yuan, Yinghao Zou, Jiquan Long, Yudong Cai, Zhenxiang Li, Zhifeng Zhang, Yihua Mo, Jun Gu, Ruiyi Jiang, Yi Wei, Charles Xie:
Milvus: A Purpose-Built Vector Data Management System. SIGMOD Conference 2021: 2614-2627 - 2020
- [j18]Ye Tao, Peng Xu, Hai Jin:
Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage. IEEE Access 8: 15963-15972 (2020) - [j17]Wei Wang, Peng Xu, Dongli Liu, Laurence Tianruo Yang, Zheng Yan:
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices. IEEE Trans. Ind. Informatics 16(6): 4221-4230 (2020)
2010 – 2019
- 2019
- [c6]Junfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin, Peng Xu, Sheng Shen:
Differential Privacy Preservation for Smart Meter Systems. ICA3PP (1) 2019: 669-685 - 2018
- [j16]Wei Wang, Peng Xu, Laurence T. Yang:
Secure Data Collection, Storage and Access in Cloud-Assisted IoT. IEEE Cloud Comput. 5(4): 77-88 (2018) - [j15]Peng Xu, Shuanghong He, Wei Wang, Willy Susilo, Hai Jin:
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks. IEEE Trans. Ind. Informatics 14(8): 3712-3723 (2018) - [j14]Wei Wang, Peng Xu, Laurence Tianruo Yang, Jinjun Chen:
Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services. IEEE Trans. Serv. Comput. 11(5): 850-863 (2018) - 2017
- [j13]Peng Xu, Xiaolan Tang, Wei Wang, Hai Jin, Laurence T. Yang:
Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT. IEEE Access 5: 24775-24784 (2017) - [j12]Feng Lu, Weikang Zhang, Liwen Shao, Xunfei Jiang, Peng Xu, Hai Jin:
Scalable influence maximization under independent cascade model. J. Netw. Comput. Appl. 86: 15-23 (2017) - [j11]Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo, Jinjun Chen:
Securely Reinforcing Synchronization for Embedded Online Contests. ACM Trans. Embed. Comput. Syst. 16(2): 58:1-58:21 (2017) - [c5]Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. ACISP (1) 2017: 207-226 - [i4]Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. IACR Cryptol. ePrint Arch. 2017: 741 (2017) - 2016
- [j10]Wei Wang, Peng Xu, Hui Li, Laurence Tianruo Yang:
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts. Future Gener. Comput. Syst. 55: 353-361 (2016) - [j9]Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu, Gang Chen:
Taming transitive permission attack via bytecode rewriting on Android application. Secur. Commun. Networks 9(13): 2100-2114 (2016) - [j8]Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, Hai Jin:
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans. Computers 65(1): 66-79 (2016) - [c4]Peng Xu, Jingnan Li, Wei Wang, Hai Jin:
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security. AsiaCCS 2016: 223-233 - [c3]Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou:
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. AsiaCCS 2016: 913-918 - 2015
- [j7]Wei Wang, Peng Xu, Laurence Tianruo Yang, Hui Li:
A design for cloud-assisted Fair-Play Management System of online contests with provable security. Future Gener. Comput. Syst. 52: 137-146 (2015) - [j6]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search. IEEE Trans. Inf. Forensics Secur. 10(9): 1993-2006 (2015) - [c2]Wei Wang, Peng Xu, Laurence Tianruo Yang:
One-Pass Anonymous Key Distribution in Batch for Secure Real-Time Mobile Services. IEEE MS 2015: 158-165 - [i3]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search. CoRR abs/1512.06581 (2015) - 2014
- [j5]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou, Peng Xu:
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing. Comput. J. 57(2): 241-254 (2014) - [c1]Wei Wang, Peng Xu, Hui Li, Laurence Tianruo Yang:
A Secure Synchronized Reading system over time-critical online contests. ICC 2014: 821-826 - 2013
- [j4]Peng Xu, Hai Jin, Qianhong Wu, Wei Wang:
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. IEEE Trans. Computers 62(11): 2266-2277 (2013) - 2012
- [j3]Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing, Xueming Tang:
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries. IEEE Trans. Inf. Forensics Secur. 7(2): 465-479 (2012) - 2011
- [i2]Peng Xu, Hai Jin:
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS. IACR Cryptol. ePrint Arch. 2011: 190 (2011) - 2010
- [j2]Peng Xu, Guohua Cui, Cai Fu, Xueming Tang:
A more efficient accountable authority IBE scheme under the DL assumption. Sci. China Inf. Sci. 53(3): 581-592 (2010) - [j1]Peng Xu, Guohua Cui, Feng-Yu Lei, Jing-Fang Xu:
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity. Inf. Sci. 180(22): 4420-4429 (2010) - [i1]Peng Xu, Hai Jin:
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. IACR Cryptol. ePrint Arch. 2010: 626 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint