If you made any changes in Pure these will be visible here soon.

Research Output 2010 2018

2018

Enabling generic, verifiable, and secure data search in cloud services

Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q. & Ren, K., Aug 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 8, p. 1721-1735 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Toward secure outsourced middlebox services: practices, challenges, and beyond

Wang, C., Yuan, X., Cui, Y. & Ren, K., Feb 2018, In : IEEE Network. 32, 1, p. 166-171 6 p.

Research output: Contribution to journalArticleResearchpeer-review

2017

A generic method for accelerating LSH-based similarity join processing

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 1 Apr 2017, In : IEEE Transactions on Knowledge and Data Engineering. 29, 4, p. 712-726 15 p., 7782356.

Research output: Contribution to journalArticleResearchpeer-review

A generic method for accelerating LSH-based similarity join processing (extended abstract)

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 2017, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017: 19-22 April 2017, San Diego, California, USA. Papakonstantinou, Y. & Diao, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 29-30 2 p. 7929917

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

Enabling privacy-assured mobile advertisement targeting and dissemination

Shi, Z., Liu, X. & Yuan, X., 2 Apr 2017, SCC' 17 - Proceedings of the 5th ACM International Workshop on Security in Cloud Computing. Wang, C. & Kantarcioglu, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 51-57 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

EncKV: an encrypted key-value store with rich queries

Yuan, X., Gao, Y., Wang, X., Wang, C., Li, B. & Jia, X., 2 Apr 2017, ASIA CCS' 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Sadegh, A-R. & Yi, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 423-435 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

EncSIM: an encrypted similarity search service for distributed high-dimensional datasets

Liu, X., Yuan, X. & Wang, C., 5 Jul 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS). Jukan, A. & Wang, J-P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-10 10 p. 7969151

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery

Zheng, Y., Duan, H., Yuan, X. & Wang, C., 15 Sep 2017, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-Preserving Similarity Joins over Encrypted Data

Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In : IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 13 p., 7961214.

Research output: Contribution to journalArticleResearchpeer-review

Toward encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., Feb 2017, In : IEEE Transactions on Multimedia. 19, 2, p. 251-265 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards trustworthy and private keyword search in encrypted decentralized storage

Cai, C., Yuan, X. & Wang, C., 28 Jul 2017, 2017 IEEE International Conference on Communications. Gesbert, D., Debbah, M. & Mellouk, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-7 7 p. 7996810

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016

Bringing execution assurances of pattern matching in outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols, ICNP : 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 171-180 10 p. 7784424

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Building an encrypted, distributed, and searchable key-value store

Yuan, X., Wang, X., Wang, C., Qian, C. & Lin, J., 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 547-558 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Cui, H., Yuan, X., Zheng, Y. & Wang, C., 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 145-154 9 p. 7524346

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and efficient video delivery through encrypted in-network caching

Yuan, X., Wang, X., Wang, J., Chu, Y., Wang, C., Wang, J., Montpetit, M. J. & Liu, S., Aug 2016, In : IEEE Journal on Selected Areas in Communications. 34, 8, p. 2077-2090 14 p., 7485895.

Research output: Contribution to journalArticleResearchpeer-review

Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing

Yuan, X., Wang, X., Wang, C., Weng, J. & Ren, K., 1 Oct 2016, In : IEEE Transactions on Multimedia. 18, 10, p. 2002-2014 13 p., 7552468.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving deep packet inspection in outsourced middleboxes

Yuan, X., Wang, X., Lin, J. & Wang, C., 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1764-1772 9 p. 7524526

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards secure and accurate targeted mobile coupon delivery

Jiang, J., Zheng, Y., Yuan, X., Shi, Z., Gui, X., Wang, C. & Yao, J., Nov 2016, In : IEEE Access. 4, p. 8116-8126 11 p., 7733121.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Towards verifiable outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP): 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 487-488 2 p. 7784466

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

2015

Enabling encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 63-72 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling IP protection for outsourced integrated circuit design

Yuan, X., Wang, C. & Ren, K., 2015, ASIACCS’15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 237-247 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling privacy-assured similarity retrieval over millions of encrypted records

Yuan, X., Cui, H., Wang, X. & Wang, C., 2015, Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21–25, 2015, Proceedings, Part II . Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 40-60 21 p. (Lecture Notes in Computer Science ; vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices

Cui, H., Yuan, X. & Wang, C., 2015, 2015 IEEE Conference on Computer Communications, INFOCOM 2015: Kowloon, Hong Kong 26 April – 1 May 2015. Fahmy, S., Li, B. & Chi Shing Lui, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2659-2667 9 p. 7218657

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards a scalable, private, and searchable key-value store

Yuan, X., Wang, X., Chu, Y., Wang, C. & Qian, C., 3 Dec 2015, 2015 IEEE Conference on Communications and Network Security (CNS 2015): 28-30 September 2015, Florence, Italy. Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 773-774 2 p. 7346929

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Gui, X., Shi, Z., Yuan, X. & Wang, C., 2015, Proceedings - 11th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2015: 16–18 December 2015 Shenzhen, China . Du, H., Anastasi, G. & Ren, K. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 79-88 10 p. 7420928

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Towards secure and practical targeted mobile advertising

Jiang, J., Shi, Z., Yuan, X., Wang, C. & Gui, X., 4 Aug 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Institute of Electrical and Electronics Engineers, p. 79-80 2 p. 7179352

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

2014

Enabling privacy-preserving image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. & Ren, K., 2014, Proceedings - 2014 IEEE 34th International Conference on Distributed Computing Systems: 30 June–3 Juy 2014, Madrid, Spain. Jimenez-Peris, R. & Lei, H. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 198-207 10 p. 6888896

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

Statistical timing verification for transparently latched circuits through structural graph traversal

Yuan, X. & Wang, J., 28 Apr 2010, 2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010. p. 663-668 6 p. 5419803

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review