ROPecker: A generic and practical approach for defending against ROP attack Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng Internet Society, 2014 | 402 | 2014 |
Private query on encrypted data in multi-user settings F Bao, RH Deng, X Ding, Y Yang International Conference on Information Security Practice and Experience, 71-85, 2008 | 325 | 2008 |
A method for fast revocation of public key certificates and security capabilities D Boneh, X Ding, G Tsudik, CM Wong 10th USENIX Security Symposium (USENIX Security 01), 2001 | 317 | 2001 |
Anomaly based web phishing page detection Y Pan, X Ding 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 381-392, 2006 | 316 | 2006 |
Conditional proxy re-encryption secure against chosen-ciphertext attack J Weng, RH Deng, X Ding, CK Chu, J Lai Proceedings of the 4th international symposium on information, computer, and …, 2009 | 269 | 2009 |
Protecting RFID communications in supply chains Y Li, X Ding Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 148 | 2007 |
Simple identity-based cryptography with mediated RSA X Ding, G Tsudik Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003 | 145 | 2003 |
Fine-grained control of security capabilities D Boneh, X Ding, G Tsudik ACM Transactions on Internet Technology (TOIT) 4 (1), 60-82, 2004 | 121 | 2004 |
Private information retrieval using trusted hardware S Wang, X Ding, RH Deng, F Bao Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 106 | 2006 |
Remote attestation on program execution L Gu, X Ding, RH Deng, B Xie, H Mei Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008 | 104 | 2008 |
Embellishing text search queries to protect user privacy HH Pang, X Ding, X Xiao ACM 3 (1/2), 598, 2010 | 70 | 2010 |
Hardware-assisted fine-grained code-reuse attack detection P Yuan, Q Zeng, X Ding Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 63 | 2015 |
Experimenting with server-aided signatures X Ding, D Mozzacchi, G Tsudik Internet Society, 2002 | 63 | 2002 |
Multiuser private queries over encrypted databases Y Yang, F Bao, X Ding, RH Deng International Journal of Applied Cryptography 1 (4), 309-319, 2009 | 46 | 2009 |
Leak-free group signatures with immediate revocation X Ding, G Tsudik, S Xu 24th International Conference on Distributed Computing Systems, 2004 …, 2004 | 43 | 2004 |
Efficient virtualization-based application protection against untrusted operating system Y Cheng, X Ding, RH Deng Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 42 | 2015 |
Appshield: Protecting applications against untrusted operating system Y Cheng, X Ding, R Deng Singaport Management University Technical Report, SMU-SIS-13 101, 2013 | 38 | 2013 |
Identity-based mediated RSA D Boneh, X Ding, G Tsudik 3rd Workshop on Information Security Application, Jeju Island, Korea 12, 2002 | 34 | 2002 |
Efficient processing of exact top-k queries over disk-resident sorted lists HH Pang, X Ding, B Zheng The VLDB Journal 19, 437-456, 2010 | 33 | 2010 |
A scalable and format-compliant encryption scheme for H. 264/SVC bitstreams Z Wei, Y Wu, X Ding, RH Deng Signal Processing: Image Communication 27 (9), 1011-1024, 2012 | 30 | 2012 |