Folgen
Xingliang Yuan
Xingliang Yuan
Department of Software Systems and Cybersecurity, Faculty of IT, Monash University
Bestätigte E-Mail-Adresse bei monash.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Federated learning for 6G communications: Challenges, methods, and future directions
Y Liu, X Yuan, Z Xiong, J Kang, X Wang, D Niyato
China Communications 17 (9), 105-118, 2020
3562020
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2132018
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021
110*2021
Privacy-aware and efficient mobile crowdsensing with truth discovery
Y Zheng, H Duan, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 121-133, 2017
952017
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
D Huayi, W Cong, X Yuan, Y Zhou, Q Wang, K Ren
26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019
90*2019
Enabling reliable keyword search in encrypted decentralized storage with fairness
C Cai, J Weng, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 131-144, 2018
902018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
J Zhu, Q Li, C Wang, X Yuan, Q Wang, K Ren
IEEE Transactions on Parallel and Distributed Systems 29 (8), 1721-1735, 2018
832018
Privacy-preserving deep packet inspection in outsourced middleboxes
X Yuan, X Wang, J Lin, C Wang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
832016
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy
SF Sun, R Steinfeld, S Lai, X Yuan, A Sakzad, JK Liu, S Nepal, D Gu
The Network and Distributed System Security Symposium (NDSS), 2021
802021
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining
Y Liu, L Xu, X Yuan, C Wang, B Li
IEEE Conference on Computer Communications (INFOCOM), 1749--1758, 2022
782022
Towards trustworthy and private keyword search in encrypted decentralized storage
C Cai, X Yuan, C Wang
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
782017
Trustworthy Graph Neural Networks: Aspects, Methods, and Trends
H Zhang, B Wu, X Yuan, S Pan, H Tong, J Pei
Proceedings of the IEEE, 2024
752024
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 988-1001, 2022
752022
Toward Encrypted Cloud Media Center With Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2017
672017
Servedb: Secure, verifiable, and efficient range queries on outsourced database
S Wu, Q Li, G Li, D Yuan, X Yuan, C Wang
2019 IEEE 35th International Conference on Data Engineering (ICDE), 626-637, 2019
662019
Non-interactive privacy-preserving truth discovery in crowd sensing applications
X Tang, C Wang, X Yuan, Q Wang
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1988-1996, 2018
632018
Enabling privacy-preserving image-centric social discovery
X Yuan, X Wang, C Wang, A Squicciarini, K Ren
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
612014
DeFiRanger: Detecting DeFi Price Manipulation Attacks
S Wu, Z Yu, D Wang, Y Zhou, L Wu, H Wang, X Yuan
IEEE Transactions on Dependable and Secure Computing, 2023
57*2023
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation
B Wu, X Yang, S Pan, X Yuan
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
572022
Enabling Encrypted Cloud Media Center with Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
552015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20