The right to be forgotten in federated learning: An efficient realization with rapid retraining Y Liu, L Xu, X Yuan, C Wang, B Li IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1749-1758, 2022 | 101 | 2022 |
Hardening database padding for searchable encryption L Xu, X Yuan, C Wang, Q Wang, C Xu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2503-2511, 2019 | 47 | 2019 |
Forward and backward private DSSE for range queries C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk, L Xu IEEE Transactions on Dependable and Secure Computing 19 (1), 328-338, 2022 | 36 | 2022 |
Multi-writer searchable encryption: An LWE-based realization and implementation L Xu, X Yuan, R Steinfeld, C Wang, C Xu Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 36 | 2019 |
Building a dynamic searchable encrypted medical database for multi-client L Xu, C Xu, JK Liu, C Zuo, P Zhang Information Sciences 527, 394-405, 2020 | 35 | 2020 |
Enabling authorized encrypted search for multi-authority medical databases L Xu, S Sun, X Yuan, JK Liu, C Zuo, C Xu IEEE Transactions on Emerging Topics in Computing 9 (1), 534 - 546, 2021 | 28 | 2021 |
Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption L Xu, H Duan, A Zhou, X Yuan, C Wang IEEE Transactions on Information Forensics and Security 16, 5310-5325, 2021 | 22 | 2021 |
Enabling comparable search over encrypted data for IoT with privacy-preserving L Xu, C Xu, Z Liu, Y Wang, J Wang Computers, Materials & Continua 60 (2), 675-690, 2019 | 18 | 2019 |
Toward a secure, rich, and fair query service for light clients on public blockchains C Cai, L Xu, A Zhou, C Wang IEEE Transactions on Dependable and Secure Computing 19 (6), 3640-3655, 2021 | 14 | 2021 |
Towards efficient cryptographic data validation service in edge computing L Xu, X Yuan, Z Zhou, C Wang, C Xu IEEE Transactions on Services Computing 16 (1), 656 - 669, 2023 | 13 | 2023 |
Verifiable identity-based encryption with keyword search for IoT from lattice L Mei, C Xu, L Xu, X Yu, C Zuo Comput. Mater. Contin 68, 2299-2314, 2021 | 12 | 2021 |
EncELC: Hardening and enriching ethereum light clients with trusted enclaves C Cai, L Xu, A Zhou, R Wang, C Wang, Q Wang IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1887-1896, 2020 | 10 | 2020 |
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage M Han, P Xu, L Xu, C Xu Peer-to-Peer Networking and Applications 16 (1), 156-169, 2023 | 7 | 2023 |
Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack. X Yu, C Xu, L Xu, Y Wang Computers, Materials & Continua 64 (2), 2020 | 7 | 2020 |
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption L Xu, L Zheng, C Xu, X Yuan, C Wang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 5 | 2023 |
Boomerang:{Metadata-Private} Messaging under Hardware Trust P Jiang, Q Wang, J Cheng, C Wang, L Xu, X Wang, Y Wu, X Li, K Ren 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023 | 5 | 2023 |
A multi-client dynamic searchable symmetric encryption system with physical deletion L Xu, C Xu, JK Liu, C Zuo, P Zhang Information and Communications Security: 19th International Conference …, 2018 | 5 | 2018 |
RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications J Liu, C Chen, Y Qu, S Yang, L Xu ISA transactions 141, 20-29, 2023 | 3 | 2023 |
: Enhancing User Privacy and Coverage of Safe Browsing Services Y Du, H Duan, L Xu, H Cui, C Wang, Q Wang IEEE Transactions on Dependable and Secure Computing 20 (5), 4343-4358, 2022 | 3 | 2022 |
Lattice-based searchable encryption with keywords revocable and bounded trapdoor exposure resistance X Yu, C Xu, L Xu IEEE Access 7, 43179-43189, 2019 | 3 | 2019 |