If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am a Lecturer in the Faculty of Information Technology at Monash University, and affiliated with the Monash Cybersecurity Lab. I earned my PhD degree from City University of Hong Kong under the direction of the incomparable Cong Wang in 2016. Prior to that, I received my MS degree and BS degree from Illinois Institute of Technology and Nanjing University of Posts and Telecommunications respectively, both majored in Electrical Engineering. I also worked at Stromasys S.A., developing virtual SPARC and ALPHA servers on the x86 platform. 

My research interests include cloud security and privacy-aware computing. I am always looking for outstanding students; please email me your CV and supporting documents. 

 

Keywords

  • Cloud Security
  • Network Security
  • Privacy-aware Computing
  • Networked System

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2017 2020

UbiSENSE (ubiqutous sensing) for Cities (D61 Challenge: E01)

Yuan, X., Wen, S., Susilo, W., Kim, J., White, S., Tovey, A., Falletta, J., Giurco, D., Zeichner, F., Prakash, M., Taylor, S., Hilton, J. E., Cohen, R. C. Z., Dunstall, S., Bakar, K. S., Woolard, F., Pagendam, D., Liu, D., Jang, S. I., Ahmed, M., Pieprzyk, J., Ma, S., Nepal, S., Grobler, M., Camtepe, S., Sharman, C., Pasanen, J., Hugo, P., Muster, T., Lin, B., Toze, R., Keywood, M. D. & Knight, K.

1/05/1931/10/19

Project: Research

Research Output 2010 2019

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling encrypted rich queries in distributed key-value stores

Guo, Y., Yuan, X., Wang, X., Wang, C., Li, B. & Jia, X., Jun 2019, In : IEEE Transactions on Parallel and Distributed Systems. 30, 6, p. 1283-1297 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling reliable keyword search in encrypted decentralized storage with fairness

Cai, C., Weng, J., Yuan, X. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 14 p.

Research output: Contribution to journalArticleResearchpeer-review

GraphSE2: an encrypted graph database for privacy-preserving social search

Lai, S., Yuan, X., Sun, S-F., Liu, J. K., Liu, Y. & Liu, D., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 41-54 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review