If you made any changes in Pure these will be visible here soon.

Research Output 2010 2019

2019

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling encrypted rich queries in distributed key-value stores

Guo, Y., Yuan, X., Wang, X., Wang, C., Li, B. & Jia, X., Jun 2019, In : IEEE Transactions on Parallel and Distributed Systems. 30, 6, p. 1283-1297 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling reliable keyword search in encrypted decentralized storage with fairness

Cai, C., Weng, J., Yuan, X. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-aware and efficient mobile crowdsensing with truth discovery

Zheng, Y., Duan, H., Yuan, X. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Toward secure and scalable computation in internet of things data applications

Yuan, X., Yuan, X., Li, B. & Wang, C., Apr 2019, In : IEEE Internet of Things Journal. 6, 2, p. 3753-3763 11 p., 8600298.

Research output: Contribution to journalArticleResearchpeer-review

Towards encrypted in-network storage services with secure near-duplicate detection

Cui, H., Yuan, X., Zheng, Y. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Treasure collection on foggy islands: building secure network archives for internet of things

Duan, H., Zheng, Y., Wang, C. & Yuan, X., Apr 2019, In : IEEE Internet of Things Journal. 6, 2, p. 2637-2650 14 p.

Research output: Contribution to journalArticleResearchpeer-review

2018

A bandwidth-efficient middleware for encrypted deduplication

Cui, H., Wang, C., Hua, Y., Du, Y. & Yuan, X., 2018, IEEE 2018 DSC - Kaohsiung Taiwan December 10-13, 2018: The 2018 IEEE Conference on Dependable and Secure Computing. Fan, C-I. & Claesen, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 62-69 8 p. 8625127

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Assuring string pattern matching in outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., Jun 2018, In : IEEE/ACM Transactions on Networking. 26, 3, p. 1362-1375 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling generic, verifiable, and secure data search in cloud services

Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q. & Ren, K., Aug 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 8, p. 1721-1735 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling privacy-preserving header matching for outsourced middleboxes

Guo, Y., Wang, C., Yuan, X. & Jia, X., 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS): IEEE/ACM IWQoS 2018 Banff, Alberta, Canada 4-6 June 2018. Wu, C. & Li, Z. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 10 p. 8624187

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Non-interactive privacy-preserving truth discovery in crowd sensing applications

Tang, X., Wang, C., Yuan, X. & Wang, Q., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. Mao, S., Melodia, T. & Sinha, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1988-1996 9 p. 8486371

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Secure integrated circuit design via hybrid cloud

Yuan, X., Weng, J., Wang, C. & Ren, K., Aug 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 8, p. 1851-1864 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Toward secure outsourced middlebox services: practices, challenges, and beyond

Wang, C., Yuan, X., Cui, Y. & Ren, K., Feb 2018, In : IEEE Network. 32, 1, p. 166-171 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards privacy-preserving and practical image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. C. & Ren, K., Sep 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 5, p. 868-882 15 p., 7568994.

Research output: Contribution to journalArticleResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2017

A generic method for accelerating LSH-based similarity join processing

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 1 Apr 2017, In : IEEE Transactions on Knowledge and Data Engineering. 29, 4, p. 712-726 15 p., 7782356.

Research output: Contribution to journalArticleResearchpeer-review

A generic method for accelerating LSH-based similarity join processing (extended abstract)

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 2017, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017: 19-22 April 2017, San Diego, California, USA. Papakonstantinou, Y. & Diao, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 29-30 2 p. 7929917

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

Enabling privacy-assured mobile advertisement targeting and dissemination

Shi, Z., Liu, X. & Yuan, X., 2 Apr 2017, SCC' 17 - Proceedings of the 5th ACM International Workshop on Security in Cloud Computing. Wang, C. & Kantarcioglu, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 51-57 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

EncKV: an encrypted key-value store with rich queries

Yuan, X., Gao, Y., Wang, X., Wang, C., Li, B. & Jia, X., 2 Apr 2017, ASIA CCS' 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Sadegh, A-R. & Yi, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 423-435 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

EncSIM: an encrypted similarity search service for distributed high-dimensional datasets

Liu, X., Yuan, X. & Wang, C., 5 Jul 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS). Jukan, A. & Wang, J-P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-10 10 p. 7969151

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Hardening distributed and encrypted keyword search via blockchain

Cai, C., Yuan, X. & Wang, C., 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing - PAC 2017: Washington DC, DC, USA 1-3 August 2017. Li, N., Ren, K. & Sadeghi, A-R. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 119-128 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Privacy-Preserving Similarity Joins over Encrypted Data

Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In : IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 13 p., 7961214.

Research output: Contribution to journalArticleResearchpeer-review

Secure multi-client data access with boolean queries in distributed key-value stores

Yuan, X., Yuan, X., Li, B. & Wang, C., 2017, 2017 IEEE Conference on Communications and Network Security (CNS): 9-11 October 2017 in Las Vegas, NV, USA. Yung, M. & Zhang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Toward encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., Feb 2017, In : IEEE Transactions on Multimedia. 19, 2, p. 251-265 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards trustworthy and private keyword search in encrypted decentralized storage

Cai, C., Yuan, X. & Wang, C., 28 Jul 2017, 2017 IEEE International Conference on Communications. Gesbert, D., Debbah, M. & Mellouk, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-7 7 p. 7996810

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016

Bringing execution assurances of pattern matching in outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols, ICNP : 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 171-180 10 p. 7784424

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Building an encrypted, distributed, and searchable key-value store

Yuan, X., Wang, X., Wang, C., Qian, C. & Lin, J., 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 547-558 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Cui, H., Yuan, X., Zheng, Y. & Wang, C., 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 145-154 9 p. 7524346

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and efficient video delivery through encrypted in-network caching

Yuan, X., Wang, X., Wang, J., Chu, Y., Wang, C., Wang, J., Montpetit, M. J. & Liu, S., Aug 2016, In : IEEE Journal on Selected Areas in Communications. 34, 8, p. 2077-2090 14 p., 7485895.

Research output: Contribution to journalArticleResearchpeer-review

Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing

Yuan, X., Wang, X., Wang, C., Weng, J. & Ren, K., 1 Oct 2016, In : IEEE Transactions on Multimedia. 18, 10, p. 2002-2014 13 p., 7552468.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving deep packet inspection in outsourced middleboxes

Yuan, X., Wang, X., Lin, J. & Wang, C., 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1764-1772 9 p. 7524526

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy-preserving ridesharing recommendation in geosocial networks

Chengcheng, D., Yuan, X. & Wang, C., 2016, Computational Social Networks: 5th International Conference, CSoNet 2016, Ho Chi Minh City, Vietnam, August 2–4, 2016, Proceedings. Nguyen, H. T. & Snasel, V. (eds.). Cham Switzerland: Springer, p. 193-205 13 p. (Lecture Notes in Computer Science ; vol. 9795).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Towards secure and accurate targeted mobile coupon delivery

Jiang, J., Zheng, Y., Yuan, X., Shi, Z., Gui, X., Wang, C. & Yao, J., Nov 2016, In : IEEE Access. 4, p. 8116-8126 11 p., 7733121.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Towards verifiable outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP): 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 487-488 2 p. 7784466

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

2015

Enabling encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 63-72 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling IP protection for outsourced integrated circuit design

Yuan, X., Wang, C. & Ren, K., 2015, ASIACCS’15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 237-247 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling privacy-assured similarity retrieval over millions of encrypted records

Yuan, X., Cui, H., Wang, X. & Wang, C., 2015, Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21–25, 2015, Proceedings, Part II . Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 40-60 21 p. (Lecture Notes in Computer Science ; vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices

Cui, H., Yuan, X. & Wang, C., 2015, 2015 IEEE Conference on Computer Communications, INFOCOM 2015: Kowloon, Hong Kong 26 April – 1 May 2015. Fahmy, S., Li, B. & Chi Shing Lui, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2659-2667 9 p. 7218657

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards a scalable, private, and searchable key-value store

Yuan, X., Wang, X., Chu, Y., Wang, C. & Qian, C., 3 Dec 2015, 2015 IEEE Conference on Communications and Network Security (CNS 2015): 28-30 September 2015, Florence, Italy. Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 773-774 2 p. 7346929

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Shi, Z., Yuan, X., Wang, C. & Gui, X., 4 Aug 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Institute of Electrical and Electronics Engineers, p. 79-80 2 p. 7179352

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Gui, X., Shi, Z., Yuan, X. & Wang, C., 2015, Proceedings - 11th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2015: 16–18 December 2015 Shenzhen, China . Du, H., Anastasi, G. & Ren, K. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 79-88 10 p. 7420928

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2014

Enabling privacy-preserving image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. & Ren, K., 2014, Proceedings - 2014 IEEE 34th International Conference on Distributed Computing Systems: 30 June–3 Juy 2014, Madrid, Spain. Jimenez-Peris, R. & Lei, H. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 198-207 10 p. 6888896

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

Statistical timing verification for transparently latched circuits through structural graph traversal

Yuan, X. & Wang, J., 28 Apr 2010, 2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010. p. 663-668 6 p. 5419803

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review