Privacy preservation for machine learning training and classification based on homomorphic encryption schemes J Li, X Kuang, S Lin, X Ma, Y Tang Information Sciences 526, 166-179, 2020 | 123 | 2020 |
Privacy preserving multi-party computation delegation for deep learning in cloud computing X Ma, F Zhang, X Chen, J Shen Information Sciences 459, 103-116, 2018 | 116 | 2018 |
Outsourcing computation of modular exponentiations in cloud computing X Ma, J Li, F Zhang Cluster computing 16, 787-796, 2013 | 66 | 2013 |
Non-interactive privacy-preserving neural network prediction X Ma, X Chen, X Zhang Information Sciences 481, 507-519, 2019 | 63 | 2019 |
AEMDA: inferring miRNA–disease associations based on deep autoencoder C Ji, Z Gao, X Ma, Q Wu, J Ni, C Zheng Bioinformatics 37 (1), 66-72, 2021 | 62 | 2021 |
Differentially private byzantine-robust federated learning X Ma, X Sun, Y Wu, Z Liu, X Chen, C Dong IEEE Transactions on Parallel and Distributed Systems 33 (12), 3690-3701, 2022 | 45 | 2022 |
Privacy-preserving Byzantine-robust federated learning X Ma, Y Zhou, L Wang, M Miao Computer Standards & Interfaces 80, 103561, 2022 | 44 | 2022 |
Trusted data sharing with flexible access control based on blockchain X Ma, C Wang, X Chen Computer Standards & Interfaces 78, 103543, 2021 | 33 | 2021 |
Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things XM Qi Liu, Ruichao Mo, Xiaolong Xu Wireless Networks, 2020 | 33* | 2020 |
Secure multiparty learning from the aggregation of locally trained models X Ma, C Ji, X Zhang, J Wang, J Li, KC Li, X Chen Journal of Network and Computer Applications 167, 102754, 2020 | 25 | 2020 |
Efficient computation outsourcing for inverting a class of homomorphic functions F Zhang, X Ma, S Liu Information Sciences 286, 19-28, 2014 | 22 | 2014 |
Misleading attention and classification: an adversarial attack to fool object detection models in the real world H Zhang, X Ma Computers & Security 122, 102876, 2022 | 17 | 2022 |
Oblivious transfer with timed-release receiver’s privacy X Ma, L Xu, F Zhang Journal of Systems and Software 84 (3), 460-464, 2011 | 17 | 2011 |
Efficient and secure batch exponentiations outsourcing in cloud computing X Ma, J Li, F Zhang 2012 Fourth International Conference on Intelligent Networking and …, 2012 | 12 | 2012 |
Quantum‐Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing W Liu, J Chen, Y Wang, P Gao, Z Lei, X Ma Complexity 2020 (1), 8216874, 2020 | 11 | 2020 |
The data sharing scheme based on blockchain X Ma, C Wang, L Wang Proceedings of the 2nd ACM International Symposium on Blockchain and Secure …, 2020 | 6 | 2020 |
Quality assessment for DIBR-synthesized images with local and global distortions L Wang, Y Zhao, X Ma, S Qi, W Yan, H Chen IEEE Access 8, 27938-27948, 2020 | 4 | 2020 |
Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing. X Ma, J Li, F Zhang Int. J. Netw. Secur. 17 (6), 743-753, 2015 | 4 | 2015 |
Verifiable evaluation of private polynomials X Ma, F Zhang, J Li 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 4 | 2013 |
A Survey on Secure Outsourced Deep Learning X Ma, X Zhang, C Dong, X Chen Cyber Security Meets Machine Learning, 129-163, 2021 | 3 | 2021 |