If you made any changes in Pure these will be visible here soon.

Research Output 2010 2019

2019

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling encrypted rich queries in distributed key-value stores

Guo, Y., Yuan, X., Wang, X., Wang, C., Li, B. & Jia, X., Jun 2019, In : IEEE Transactions on Parallel and Distributed Systems. 30, 6, p. 1283-1297 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling reliable keyword search in encrypted decentralized storage with fairness

Cai, C., Weng, J., Yuan, X. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 14 p.

Research output: Contribution to journalArticleResearchpeer-review

GraphSE2: an encrypted graph database for privacy-preserving social search

Lai, S., Yuan, X., Sun, S-F., Liu, J. K., Liu, Y. & Liu, D., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 41-54 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Hardening database padding for searchable encryption

Xu, L., Yuan, X., Wang, C., Wang, Q. & Xu, C., 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. Lou, W., Pau, G. & Wolf, T. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2503-2511 9 p. 8737588

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Multi-Writer Searchable Encryption: an LWE-based realization and implementation

Xu, L., Yuan, X., Steinfeld, R., Wang, C. & Xu, C., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 122-133 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy-aware and efficient mobile crowdsensing with truth discovery

Zheng, Y., Duan, H., Yuan, X. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 13 p.

Research output: Contribution to journalArticleResearchpeer-review

ServeDB: secure, verifiable, and efficient range queries on outsourced database

Wu, S., Li, Q., Li, G., Yuan, D., Yuan, X. & Wang, C., 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. Fan, W., Lin, X. & Srivastava, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 626-637 12 p. 8731398

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Toward secure and scalable computation in internet of things data applications

Yuan, X., Yuan, X., Li, B. & Wang, C., Apr 2019, In : IEEE Internet of Things Journal. 6, 2, p. 3753-3763 11 p., 8600298.

Research output: Contribution to journalArticleResearchpeer-review

Towards encrypted in-network storage services with secure near-duplicate detection

Cui, H., Yuan, X., Zheng, Y. & Wang, C., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Treasure collection on foggy islands: building secure network archives for internet of things

Duan, H., Zheng, Y., Wang, C. & Yuan, X., Apr 2019, In : IEEE Internet of Things Journal. 6, 2, p. 2637-2650 14 p.

Research output: Contribution to journalArticleResearchpeer-review

2018

A bandwidth-efficient middleware for encrypted deduplication

Cui, H., Wang, C., Hua, Y., Du, Y. & Yuan, X., 2018, IEEE 2018 DSC - Kaohsiung Taiwan December 10-13, 2018: The 2018 IEEE Conference on Dependable and Secure Computing. Fan, C-I. & Claesen, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 62-69 8 p. 8625127

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Assuring string pattern matching in outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., Jun 2018, In : IEEE/ACM Transactions on Networking. 26, 3, p. 1362-1375 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling generic, verifiable, and secure data search in cloud services

Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q. & Ren, K., Aug 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 8, p. 1721-1735 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling privacy-preserving header matching for outsourced middleboxes

Guo, Y., Wang, C., Yuan, X. & Jia, X., 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS): IEEE/ACM IWQoS 2018 Banff, Alberta, Canada 4-6 June 2018. Wu, C. & Li, Z. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 10 p. 8624187

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Non-interactive privacy-preserving truth discovery in crowd sensing applications

Tang, X., Wang, C., Yuan, X. & Wang, Q., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. Mao, S., Melodia, T. & Sinha, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1988-1996 9 p. 8486371

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Secure integrated circuit design via hybrid cloud

Yuan, X., Weng, J., Wang, C. & Ren, K., Aug 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 8, p. 1851-1864 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Toward secure outsourced middlebox services: practices, challenges, and beyond

Wang, C., Yuan, X., Cui, Y. & Ren, K., Feb 2018, In : IEEE Network. 32, 1, p. 166-171 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards privacy-preserving and practical image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. C. & Ren, K., Sep 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 5, p. 868-882 15 p., 7568994.

Research output: Contribution to journalArticleResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2017

A generic method for accelerating LSH-based similarity join processing

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 1 Apr 2017, In : IEEE Transactions on Knowledge and Data Engineering. 29, 4, p. 712-726 15 p., 7782356.

Research output: Contribution to journalArticleResearchpeer-review

A generic method for accelerating LSH-based similarity join processing (extended abstract)

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 2017, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017: 19-22 April 2017, San Diego, California, USA. Papakonstantinou, Y. & Diao, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 29-30 2 p. 7929917

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

Enabling privacy-assured mobile advertisement targeting and dissemination

Shi, Z., Liu, X. & Yuan, X., 2 Apr 2017, SCC' 17 - Proceedings of the 5th ACM International Workshop on Security in Cloud Computing. Wang, C. & Kantarcioglu, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 51-57 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

EncKV: an encrypted key-value store with rich queries

Yuan, X., Gao, Y., Wang, X., Wang, C., Li, B. & Jia, X., 2 Apr 2017, ASIA CCS' 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Sadegh, A-R. & Yi, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 423-435 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

EncSIM: an encrypted similarity search service for distributed high-dimensional datasets

Liu, X., Yuan, X. & Wang, C., 5 Jul 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS). Jukan, A. & Wang, J-P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-10 10 p. 7969151

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Hardening distributed and encrypted keyword search via blockchain

Cai, C., Yuan, X. & Wang, C., 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing - PAC 2017: Washington DC, DC, USA 1-3 August 2017. Li, N., Ren, K. & Sadeghi, A-R. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 119-128 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Privacy-Preserving Similarity Joins over Encrypted Data

Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In : IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 13 p., 7961214.

Research output: Contribution to journalArticleResearchpeer-review

Secure multi-client data access with boolean queries in distributed key-value stores

Yuan, X., Yuan, X., Li, B. & Wang, C., 2017, 2017 IEEE Conference on Communications and Network Security (CNS): 9-11 October 2017 in Las Vegas, NV, USA. Yung, M. & Zhang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Toward encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., Feb 2017, In : IEEE Transactions on Multimedia. 19, 2, p. 251-265 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards trustworthy and private keyword search in encrypted decentralized storage

Cai, C., Yuan, X. & Wang, C., 28 Jul 2017, 2017 IEEE International Conference on Communications. Gesbert, D., Debbah, M. & Mellouk, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-7 7 p. 7996810

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016

Bringing execution assurances of pattern matching in outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols, ICNP : 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 171-180 10 p. 7784424

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Building an encrypted, distributed, and searchable key-value store

Yuan, X., Wang, X., Wang, C., Qian, C. & Lin, J., 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 547-558 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Cui, H., Yuan, X., Zheng, Y. & Wang, C., 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 145-154 9 p. 7524346

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and efficient video delivery through encrypted in-network caching

Yuan, X., Wang, X., Wang, J., Chu, Y., Wang, C., Wang, J., Montpetit, M. J. & Liu, S., Aug 2016, In : IEEE Journal on Selected Areas in Communications. 34, 8, p. 2077-2090 14 p., 7485895.

Research output: Contribution to journalArticleResearchpeer-review

Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing

Yuan, X., Wang, X., Wang, C., Weng, J. & Ren, K., 1 Oct 2016, In : IEEE Transactions on Multimedia. 18, 10, p. 2002-2014 13 p., 7552468.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving deep packet inspection in outsourced middleboxes

Yuan, X., Wang, X., Lin, J. & Wang, C., 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1764-1772 9 p. 7524526

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy-preserving ridesharing recommendation in geosocial networks

Chengcheng, D., Yuan, X. & Wang, C., 2016, Computational Social Networks: 5th International Conference, CSoNet 2016, Ho Chi Minh City, Vietnam, August 2–4, 2016, Proceedings. Nguyen, H. T. & Snasel, V. (eds.). Cham Switzerland: Springer, p. 193-205 13 p. (Lecture Notes in Computer Science ; vol. 9795).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Towards secure and accurate targeted mobile coupon delivery

Jiang, J., Zheng, Y., Yuan, X., Shi, Z., Gui, X., Wang, C. & Yao, J., Nov 2016, In : IEEE Access. 4, p. 8116-8126 11 p., 7733121.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Towards verifiable outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP): 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 487-488 2 p. 7784466

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

2015

Enabling encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 63-72 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling IP protection for outsourced integrated circuit design

Yuan, X., Wang, C. & Ren, K., 2015, ASIACCS’15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 237-247 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling privacy-assured similarity retrieval over millions of encrypted records

Yuan, X., Cui, H., Wang, X. & Wang, C., 2015, Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21–25, 2015, Proceedings, Part II . Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 40-60 21 p. (Lecture Notes in Computer Science ; vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices

Cui, H., Yuan, X. & Wang, C., 2015, 2015 IEEE Conference on Computer Communications, INFOCOM 2015: Kowloon, Hong Kong 26 April – 1 May 2015. Fahmy, S., Li, B. & Chi Shing Lui, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2659-2667 9 p. 7218657

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards a scalable, private, and searchable key-value store

Yuan, X., Wang, X., Chu, Y., Wang, C. & Qian, C., 3 Dec 2015, 2015 IEEE Conference on Communications and Network Security (CNS 2015): 28-30 September 2015, Florence, Italy. Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 773-774 2 p. 7346929

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Shi, Z., Yuan, X., Wang, C. & Gui, X., 4 Aug 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Institute of Electrical and Electronics Engineers, p. 79-80 2 p. 7179352

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Gui, X., Shi, Z., Yuan, X. & Wang, C., 2015, Proceedings - 11th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2015: 16–18 December 2015 Shenzhen, China . Du, H., Anastasi, G. & Ren, K. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 79-88 10 p. 7420928

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2014

Enabling privacy-preserving image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. & Ren, K., 2014, Proceedings - 2014 IEEE 34th International Conference on Distributed Computing Systems: 30 June–3 Juy 2014, Madrid, Spain. Jimenez-Peris, R. & Lei, H. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 198-207 10 p. 6888896

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

Statistical timing verification for transparently latched circuits through structural graph traversal

Yuan, X. & Wang, J., 28 Apr 2010, 2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010. p. 663-668 6 p. 5419803

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review