Shengmin Xu

Orcid: 0000-0002-9121-0171

According to our database1, Shengmin Xu authored at least 47 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024

A Privacy-Preserving and Redactable Healthcare Blockchain System.
IEEE Trans. Serv. Comput., 2024

2023
Secure Updatable Storage Access Control System for EHRs in the Cloud.
IEEE Trans. Serv. Comput., 2023

Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023

An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Accountable and Fine-Grained Controllable Rewriting in Blockchains.
IEEE Trans. Inf. Forensics Secur., 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

Hercules: Boosting the Performance of Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data.
IEEE Trans. Cloud Comput., 2023

2022
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2022

Redactable Blockchain in Decentralized Setting.
IEEE Trans. Inf. Forensics Secur., 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Federated Deep Learning With Irregular Users.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
CoRR, 2022

Anteater: Malware Injection Detection with Program Network Traffic Behavior.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
K-Time Modifiable and Epoch-Based Redactable Blockchain.
IEEE Trans. Inf. Forensics Secur., 2021

Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021

Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal.
Secur. Commun. Networks, 2021

OIDPR: Optimized insulin dosage via privacy-preserving reinforcement learning.
Trans. Emerg. Telecommun. Technol., 2021

Attribute-based Encryption for Cloud Computing Access Control: A Survey.
ACM Comput. Surv., 2021

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Privacy-Preserving Optimal Insulin Dosing Decision.
Proceedings of the IEEE International Conference on Acoustics, 2021

Revocable Policy-Based Chameleon Hash.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Efficient ciphertext-policy attribute-based encryption with blackbox traceability.
Inf. Sci., 2020

Privacy-enhanced remote data integrity checking with updatable timestamp.
Inf. Sci., 2020

Revocable and certificateless public auditing for cloud storage.
Sci. China Inf. Sci., 2020

OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement Learning.
Proceedings of the 2020 IFIP Networking Conference, 2020

FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability.
Proceedings of the IEEE Global Communications Conference, 2020

Privacy-preserving Intelligent Traffic Light Control.
Proceedings of the IEEE Global Communications Conference, 2020

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020

Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2019

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation.
Inf. Sci., 2019

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019

Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage.
IEEE Access, 2019

Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019

Implementing Security-Enhanced PHR System in the Cloud Using FAME.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Super Payment Channel for Decentralized Cryptocurrencies.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

A New Revocable and Re-Delegable Proxy Signature and Its Application.
J. Comput. Sci. Technol., 2018

Efficient Attribute-Based Encryption with Blackbox Traceability.
Proceedings of the Provable Security, 2018

2017
Mergeable and Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016


  Loading...