Federated learning for 6G communications: Challenges, methods, and future directions Y Liu, X Yuan, Z Xiong, J Kang, X Wang, D Niyato China Communications 17 (9), 105-118, 2020 | 390 | 2020 |
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 218 | 2018 |
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021 | 118* | 2021 |
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining Y Liu, L Xu, X Yuan, C Wang, B Li IEEE Conference on Computer Communications (INFOCOM), 1749--1758, 2022 | 102 | 2022 |
Privacy-aware and efficient mobile crowdsensing with truth discovery Y Zheng, H Duan, X Yuan, C Wang IEEE Transactions on Dependable and Secure Computing 17 (1), 121-133, 2017 | 102 | 2017 |
Enabling reliable keyword search in encrypted decentralized storage with fairness C Cai, J Weng, X Yuan, C Wang IEEE Transactions on Dependable and Secure Computing 18 (1), 131-144, 2018 | 93 | 2018 |
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed D Huayi, W Cong, X Yuan, Y Zhou, Q Wang, K Ren 26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019 | 90* | 2019 |
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services J Zhu, Q Li, C Wang, X Yuan, Q Wang, K Ren IEEE Transactions on Parallel and Distributed Systems 29 (8), 1721-1735, 2018 | 89 | 2018 |
Aggregation service for federated learning: An efficient, secure, and more resilient realization Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang IEEE Transactions on Dependable and Secure Computing 20 (2), 988-1001, 2022 | 88 | 2022 |
Trustworthy Graph Neural Networks: Aspects, Methods, and Trends H Zhang, B Wu, X Yuan, S Pan, H Tong, J Pei Proceedings of the IEEE, 2024 | 84 | 2024 |
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy SF Sun, R Steinfeld, S Lai, X Yuan, A Sakzad, JK Liu, S Nepal, D Gu The Network and Distributed System Security Symposium (NDSS), 2021 | 83 | 2021 |
Privacy-preserving deep packet inspection in outsourced middleboxes X Yuan, X Wang, J Lin, C Wang IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 82 | 2016 |
Towards trustworthy and private keyword search in encrypted decentralized storage C Cai, X Yuan, C Wang 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 79 | 2017 |
Servedb: Secure, verifiable, and efficient range queries on outsourced database S Wu, Q Li, G Li, D Yuan, X Yuan, C Wang 2019 IEEE 35th International Conference on Data Engineering (ICDE), 626-637, 2019 | 71 | 2019 |
Non-interactive privacy-preserving truth discovery in crowd sensing applications X Tang, C Wang, X Yuan, Q Wang IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1988-1996, 2018 | 69 | 2018 |
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation B Wu, X Yang, S Pan, X Yuan Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 68 | 2022 |
DeFiRanger: Detecting DeFi Price Manipulation Attacks S Wu, Z Yu, D Wang, Y Zhou, L Wu, H Wang, X Yuan IEEE Transactions on Dependable and Secure Computing, 2023 | 67* | 2023 |
Toward Encrypted Cloud Media Center With Secure Deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui IEEE Transactions on Multimedia 19 (2), 251-265, 2017 | 65 | 2017 |
Enabling privacy-preserving image-centric social discovery X Yuan, X Wang, C Wang, A Squicciarini, K Ren 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 61 | 2014 |
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications B Wu, X Yang, S Pan, X Yuan IEEE International Conference on Data Mining (ICDM), 2021 | 59 | 2021 |