关注
Xu Ma
Xu Ma
Qufu Normal University & Xidian University
在 xidian.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes
J Li, X Kuang, S Lin, X Ma, Y Tang
Information Sciences 526, 166-179, 2020
1232020
Privacy preserving multi-party computation delegation for deep learning in cloud computing
X Ma, F Zhang, X Chen, J Shen
Information Sciences 459, 103-116, 2018
1162018
Outsourcing computation of modular exponentiations in cloud computing
X Ma, J Li, F Zhang
Cluster computing 16, 787-796, 2013
662013
Non-interactive privacy-preserving neural network prediction
X Ma, X Chen, X Zhang
Information Sciences 481, 507-519, 2019
632019
AEMDA: inferring miRNA–disease associations based on deep autoencoder
C Ji, Z Gao, X Ma, Q Wu, J Ni, C Zheng
Bioinformatics 37 (1), 66-72, 2021
622021
Differentially private byzantine-robust federated learning
X Ma, X Sun, Y Wu, Z Liu, X Chen, C Dong
IEEE Transactions on Parallel and Distributed Systems 33 (12), 3690-3701, 2022
452022
Privacy-preserving Byzantine-robust federated learning
X Ma, Y Zhou, L Wang, M Miao
Computer Standards & Interfaces 80, 103561, 2022
442022
Trusted data sharing with flexible access control based on blockchain
X Ma, C Wang, X Chen
Computer Standards & Interfaces 78, 103543, 2021
332021
Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things
XM Qi Liu, Ruichao Mo, Xiaolong Xu
Wireless Networks, 2020
33*2020
Secure multiparty learning from the aggregation of locally trained models
X Ma, C Ji, X Zhang, J Wang, J Li, KC Li, X Chen
Journal of Network and Computer Applications 167, 102754, 2020
252020
Efficient computation outsourcing for inverting a class of homomorphic functions
F Zhang, X Ma, S Liu
Information Sciences 286, 19-28, 2014
222014
Misleading attention and classification: an adversarial attack to fool object detection models in the real world
H Zhang, X Ma
Computers & Security 122, 102876, 2022
172022
Oblivious transfer with timed-release receiver’s privacy
X Ma, L Xu, F Zhang
Journal of Systems and Software 84 (3), 460-464, 2011
172011
Efficient and secure batch exponentiations outsourcing in cloud computing
X Ma, J Li, F Zhang
2012 Fourth International Conference on Intelligent Networking and …, 2012
122012
Quantum‐Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing
W Liu, J Chen, Y Wang, P Gao, Z Lei, X Ma
Complexity 2020 (1), 8216874, 2020
112020
The data sharing scheme based on blockchain
X Ma, C Wang, L Wang
Proceedings of the 2nd ACM International Symposium on Blockchain and Secure …, 2020
62020
Quality assessment for DIBR-synthesized images with local and global distortions
L Wang, Y Zhao, X Ma, S Qi, W Yan, H Chen
IEEE Access 8, 27938-27948, 2020
42020
Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing.
X Ma, J Li, F Zhang
Int. J. Netw. Secur. 17 (6), 743-753, 2015
42015
Verifiable evaluation of private polynomials
X Ma, F Zhang, J Li
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
42013
A Survey on Secure Outsourced Deep Learning
X Ma, X Zhang, C Dong, X Chen
Cyber Security Meets Machine Learning, 129-163, 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20