Saiyu Qi

Orcid: 0000-0002-0394-4432

According to our database1, Saiyu Qi authored at least 51 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage.
IEEE Trans. Mob. Comput., April, 2024

Relation-consistency graph convolutional network for image super-resolution.
Vis. Comput., February, 2024

Secure and Lightweight Blockchain-based Truthful Data Trading for Real-Time Vehicular Crowdsensing.
ACM Trans. Embed. Comput. Syst., January, 2024

POMF: A Privacy-preserved On-chain Matching Framework.
Future Gener. Comput. Syst., January, 2024

Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness.
IEEE Trans. Dependable Secur. Comput., 2024

SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search.
CoRR, 2024

2023
FedMCSA: Personalized federated learning via model components self-attention.
Neurocomputing, December, 2023

Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain.
Comput. Networks, December, 2023

Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin.
IEEE J. Sel. Areas Commun., November, 2023

Safety Warning! Decentralised and Automated Incentives for Disqualified Drivers Auditing in Ride-Hailing Services.
IEEE Trans. Mob. Comput., March, 2023

TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support.
IEEE Trans. Dependable Secur. Comput., 2023

Understanding and defending against White-box membership inference attack in deep learning.
Knowl. Based Syst., 2023

2022
Secure and Efficient Item Traceability for Cloud-Aided IIoT.
ACM Trans. Sens. Networks, November, 2022

Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services.
IEEE Trans. Mob. Comput., 2022

Accelerating at the Edge: A Storage-Elastic Blockchain for Latency-Sensitive Vehicular Edge Computing.
IEEE Trans. Intell. Transp. Syst., 2022

Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022

DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution.
IEEE Trans. Dependable Secur. Comput., 2022

Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label.
Knowl. Based Syst., 2022

Dual Class-Aware Contrastive Federated Semi-Supervised Learning.
CoRR, 2022

FLMJR: Improving Robustness of Federated Learning via Model Stability.
Proceedings of the Computer Security - ESORICS 2022, 2022

Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain.
IEEE Trans. Ind. Informatics, 2021

Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation.
IEEE Trans. Inf. Forensics Secur., 2021

Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding.
Knowl. Based Syst., 2021

Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT.
IEEE Internet Things J., 2021

Efficient Multi-client Order-Revealing Encryption and Its Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Pbsx: A practical private boolean search using Intel SGX.
Inf. Sci., 2020

Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

MPTEE: bringing flexible and efficient memory protection to Intel SGX.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

PSM<sup>2</sup>: A Privacy-Preserving Self-sovereign Match-Making Platform.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
LSTM-Based with Deterministic Negative Sampling for API Suggestion.
Int. J. Softw. Eng. Knowl. Eng., 2019

Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Enabling Compressed Encryption for Cloud Based Big Data Stores.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud.
IACR Cryptol. ePrint Arch., 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Scalable Industry Data Access Control in RFID-Enabled Supply Chain.
IEEE/ACM Trans. Netw., 2016

Secure and Private RFID-Enabled Third-Party Supply Chain Systems.
IEEE Trans. Computers, 2016

2015
BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain.
Int. J. Ad Hoc Ubiquitous Comput., 2015

2014
COLLECTOR: A secure RFID-enabled batch recall protocol.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Scalable Data Access Control in RFID-Enabled Supply Chain.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
MAP: Towards Authentication for Multiple Tags.
Int. J. Distributed Sens. Networks, 2013

2012
Achieving Private, Scalable, and Precise Data Collection in Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
MAP: Authenticating Multiple-Tags.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2007
Context-Aware Semantic Web Service Discovery.
Proceedings of the Third International Conference on Semantics, 2007

Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

A Conflict Resolution Method in Context-Aware Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007


  Loading...