Peng Xu

Orcid: 0000-0003-4268-4976

Affiliations:
  • Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China (PhD 2010)


According to our database1, Peng Xu authored at least 43 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Keyword Search Shareable Encryption for Fast and Secure Data Replication.
IEEE Trans. Inf. Forensics Secur., 2023

High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023

Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
ROSE: Robust Searchable Encryption With Forward and Backward Security.
IEEE Trans. Inf. Forensics Secur., 2022

LaF: Lattice-Based and Communication-Efficient Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022

A Real-Time Scalable Video Distribution Strategy Based on Dynamic Coalition and D2D Broadcast.
Proceedings of the IEEE Global Communications Conference, 2022

DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server.
IEEE Trans. Serv. Comput., 2021

A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT.
IEEE Trans. Ind. Informatics, 2021

Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment.
Future Gener. Comput. Syst., 2021

Milvus: A Purpose-Built Vector Data Management System.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Bestie: Very Practical Searchable Encryption with Forward and Backward Security.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics, 2020

Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage.
IEEE Access, 2020

2019
Differential Privacy Preservation for Smart Meter Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE Trans. Serv. Comput., 2018

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018

Secure Data Collection, Storage and Access in Cloud-Assisted IoT.
IEEE Cloud Comput., 2018

2017
Securely Reinforcing Synchronization for Embedded Online Contests.
ACM Trans. Embed. Comput. Syst., 2017

Scalable influence maximization under independent cascade model.
J. Netw. Comput. Appl., 2017

Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch., 2017

Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT.
IEEE Access, 2017

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016

Taming transitive permission attack via bytecode rewriting on Android application.
Secur. Commun. Networks, 2016

Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Gener. Comput. Syst., 2016

Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015

A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Gener. Comput. Syst., 2015

One-Pass Anonymous Key Distribution in Batch for Secure Real-Time Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

2014
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing.
Comput. J., 2014

A Secure Synchronized Reading system over time-critical online contests.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013

2012
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries.
IEEE Trans. Inf. Forensics Secur., 2012

2011
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS.
IACR Cryptol. ePrint Arch., 2011

2010
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity.
Inf. Sci., 2010

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IACR Cryptol. ePrint Arch., 2010

A more efficient accountable authority IBE scheme under the DL assumption.
Sci. China Inf. Sci., 2010


  Loading...