If you made any changes in Pure these will be visible here soon.

Research Output 2010 2019

Filter
Conference Paper
2019

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

GraphSE2: an encrypted graph database for privacy-preserving social search

Lai, S., Yuan, X., Sun, S-F., Liu, J. K., Liu, Y. & Liu, D., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 41-54 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Hardening database padding for searchable encryption

Xu, L., Yuan, X., Wang, C., Wang, Q. & Xu, C., 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. Lou, W., Pau, G. & Wolf, T. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2503-2511 9 p. 8737588

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Multi-Writer Searchable Encryption: an LWE-based realization and implementation

Xu, L., Yuan, X., Steinfeld, R., Wang, C. & Xu, C., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 122-133 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

ServeDB: secure, verifiable, and efficient range queries on outsourced database

Wu, S., Li, Q., Li, G., Yuan, D., Yuan, X. & Wang, C., 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. Fan, W., Lin, X. & Srivastava, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 626-637 12 p. 8731398

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2018

A bandwidth-efficient middleware for encrypted deduplication

Cui, H., Wang, C., Hua, Y., Du, Y. & Yuan, X., 2018, IEEE 2018 DSC - Kaohsiung Taiwan December 10-13, 2018: The 2018 IEEE Conference on Dependable and Secure Computing. Fan, C-I. & Claesen, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 62-69 8 p. 8625127

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling privacy-preserving header matching for outsourced middleboxes

Guo, Y., Wang, C., Yuan, X. & Jia, X., 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS): IEEE/ACM IWQoS 2018 Banff, Alberta, Canada 4-6 June 2018. Wu, C. & Li, Z. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 10 p. 8624187

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Non-interactive privacy-preserving truth discovery in crowd sensing applications

Tang, X., Wang, C., Yuan, X. & Wang, Q., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. Mao, S., Melodia, T. & Sinha, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1988-1996 9 p. 8486371

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2017

A generic method for accelerating LSH-based similarity join processing (extended abstract)

Yu, C., Nutanong, S., Li, H., Wang, C. & Yuan, X., 2017, Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017: 19-22 April 2017, San Diego, California, USA. Papakonstantinou, Y. & Diao, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 29-30 2 p. 7929917

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

Enabling privacy-assured mobile advertisement targeting and dissemination

Shi, Z., Liu, X. & Yuan, X., 2 Apr 2017, SCC' 17 - Proceedings of the 5th ACM International Workshop on Security in Cloud Computing. Wang, C. & Kantarcioglu, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 51-57 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

EncKV: an encrypted key-value store with rich queries

Yuan, X., Gao, Y., Wang, X., Wang, C., Li, B. & Jia, X., 2 Apr 2017, ASIA CCS' 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Sadegh, A-R. & Yi, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 423-435 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

EncSIM: an encrypted similarity search service for distributed high-dimensional datasets

Liu, X., Yuan, X. & Wang, C., 5 Jul 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS). Jukan, A. & Wang, J-P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-10 10 p. 7969151

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Hardening distributed and encrypted keyword search via blockchain

Cai, C., Yuan, X. & Wang, C., 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing - PAC 2017: Washington DC, DC, USA 1-3 August 2017. Li, N., Ren, K. & Sadeghi, A-R. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 119-128 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Secure multi-client data access with boolean queries in distributed key-value stores

Yuan, X., Yuan, X., Li, B. & Wang, C., 2017, 2017 IEEE Conference on Communications and Network Security (CNS): 9-11 October 2017 in Las Vegas, NV, USA. Yung, M. & Zhang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards trustworthy and private keyword search in encrypted decentralized storage

Cai, C., Yuan, X. & Wang, C., 28 Jul 2017, 2017 IEEE International Conference on Communications. Gesbert, D., Debbah, M. & Mellouk, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-7 7 p. 7996810

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016

Bringing execution assurances of pattern matching in outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols, ICNP : 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 171-180 10 p. 7784424

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Building an encrypted, distributed, and searchable key-value store

Yuan, X., Wang, X., Wang, C., Qian, C. & Lin, J., 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 547-558 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Cui, H., Yuan, X., Zheng, Y. & Wang, C., 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 145-154 9 p. 7524346

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy-preserving deep packet inspection in outsourced middleboxes

Yuan, X., Wang, X., Lin, J. & Wang, C., 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications: San Francisco, California, USA 10-14 April 2016. Lee, S-J., Petrioli, C. & Wan, P-J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1764-1772 9 p. 7524526

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy-preserving ridesharing recommendation in geosocial networks

Chengcheng, D., Yuan, X. & Wang, C., 2016, Computational Social Networks: 5th International Conference, CSoNet 2016, Ho Chi Minh City, Vietnam, August 2–4, 2016, Proceedings. Nguyen, H. T. & Snasel, V. (eds.). Cham Switzerland: Springer, p. 193-205 13 p. (Lecture Notes in Computer Science ; vol. 9795).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Towards verifiable outsourced middleboxes

Yuan, X., Duan, H. & Wang, C., 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP): 8-11 November 2016 Singapore. Qiu, L. & Shenoy, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 487-488 2 p. 7784466

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

2015

Enabling encrypted cloud media center with secure deduplication

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C. & Gui, X., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 63-72 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling IP protection for outsourced integrated circuit design

Yuan, X., Wang, C. & Ren, K., 2015, ASIACCS’15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security: April 14–17, 2015 Singapore. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 237-247 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enabling privacy-assured similarity retrieval over millions of encrypted records

Yuan, X., Cui, H., Wang, X. & Wang, C., 2015, Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21–25, 2015, Proceedings, Part II . Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 40-60 21 p. (Lecture Notes in Computer Science ; vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices

Cui, H., Yuan, X. & Wang, C., 2015, 2015 IEEE Conference on Computer Communications, INFOCOM 2015: Kowloon, Hong Kong 26 April – 1 May 2015. Fahmy, S., Li, B. & Chi Shing Lui, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2659-2667 9 p. 7218657

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards a scalable, private, and searchable key-value store

Yuan, X., Wang, X., Chu, Y., Wang, C. & Qian, C., 3 Dec 2015, 2015 IEEE Conference on Communications and Network Security (CNS 2015): 28-30 September 2015, Florence, Italy. Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 773-774 2 p. 7346929

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Shi, Z., Yuan, X., Wang, C. & Gui, X., 4 Aug 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Institute of Electrical and Electronics Engineers, p. 79-80 2 p. 7179352

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

Towards secure and practical targeted mobile advertising

Jiang, J., Gui, X., Shi, Z., Yuan, X. & Wang, C., 2015, Proceedings - 11th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2015: 16–18 December 2015 Shenzhen, China . Du, H., Anastasi, G. & Ren, K. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 79-88 10 p. 7420928

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2014

Enabling privacy-preserving image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. & Ren, K., 2014, Proceedings - 2014 IEEE 34th International Conference on Distributed Computing Systems: 30 June–3 Juy 2014, Madrid, Spain. Jimenez-Peris, R. & Lei, H. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 198-207 10 p. 6888896

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

Statistical timing verification for transparently latched circuits through structural graph traversal

Yuan, X. & Wang, J., 28 Apr 2010, 2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010. p. 663-668 6 p. 5419803

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review