Rui Xue

According to our database1, Rui Xue authored at least 38 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition.
Wireless Personal Communications, 2018

Fast and Sensitive Ellipsometry-Based Biosensing.
Sensors, 2018

Adaptive Coded Modulation Based on Continuous Phase Modulation for Inter-Satellite Links of Global Navigation Satellite Systems.
IEEE Access, 2018

On Constructing Pairing-Free Identity-Based Encryptions.
Proceedings of the Information Security - 21st International Conference, 2018

Identity-Based Functional Encryption for Quadratic Functions from Lattices.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Private Functional Signatures: Definition and Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Data-Aided and Non-Data-Aided SNR Estimators for CPM Signals in Ka-Band Satellite Communications.
Information, 2017

Timely address space rerandomization for resisting code reuse attacks.
Concurrency and Computation: Practice and Experience, 2017

The New Large-Scale RNNLM System Based on Distributed Neuron.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium Workshops, 2017

LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

Improving Cooperation between Systems Engineers and Project Managers in Engineering Projects - Towards the alignment of Systems Engineering and Project Management standards and guides. (Amélioration de la coopération entre les ingénieurs Système et les managers dans les projets d'Ingénierie - Vers un processus intégré obtenu par l'alignement des standards et guides de l'Ingénierie Système et de la Gestion de Projet).
PhD thesis, 2016

An Adaptive INS-Aided PLL Tracking Method for GNSS Receivers in Harsh Environments.
Sensors, 2016

Dynamic proofs of retrievability with square-root oblivious RAM.
J. Ambient Intelligence and Humanized Computing, 2016

A Performance Improvement Method for Low-Cost Land Vehicle GPS/MEMS-INS Attitude Determination.
Sensors, 2015

Compressive-Sensing-Based Video Codec by Autoregressive Prediction and Adaptive Residual Recovery.
IJDSN, 2015

Multi-correlation strategies fusion acquisition method for high data rate global navigation satellite system signals.
IET Signal Processing, 2015

Integrating the ISO/IEC 15288 Systems Engineering Standard with the PMBoK Project Management Guide to Optimize the Management of Engineering Projects.
Proceedings of the Complex Systems Design & Management, 2015

On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives.
Inf. Sci., 2014

Managing systems engineering processes: A multi-standard approach.
Proceedings of the IEEE International Systems Conference, 2014

Managing Requirements: For an Integrated Approach from System Engineering to Project Management.
Proceedings of the Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World, 2014

Aligning systems engineering and project management standards to improve the management of processes.
Proceedings of the Progress in Systems Engineering, 2014

On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives.
IACR Cryptology ePrint Archive, 2012

Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks.
Proceedings of the Trusted Systems - Third International Conference, 2011

Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption.
Proceedings of the Financial Cryptography and Data Security, 2011

Multifactor Identity Verification Using Aggregated Proof of Knowledge.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

A Short Signature Scheme from the RSA Family.
Proceedings of the Information Security - 13th International Conference, 2010

ASM-SPV: A Model Checker for Security Protocols.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Formal Verification of HMQV Using ASM-SPV.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Statistically Hiding Sets.
Proceedings of the Topics in Cryptology, 2009

J. Comput. Sci. Technol., 2008

Algebraic Construction for Zero-Knowledge Sets.
J. Comput. Sci. Technol., 2008

Design of a CIL Connector to Spin.
International Journal of Software Engineering and Knowledge Engineering, 2008

Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Universal Accumulators with Efficient Nonmembership Proofs.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

New Semantic Model for Authentication Protocols in ASMs.
J. Comput. Sci. Technol., 2004

Microarray Gene Expression Profile Data Mining Model for Clinical Cancer Research.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Optimum Detection of MultiplicativeWatermarks for Digital Images in the DWT Domain.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

On decidability and model checking for a first order modal logic for value-passing processes.
Science in China Series F: Information Sciences, 2003