Xingliang Yuan

According to our database1, Xingliang Yuan authored at least 47 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Enabling Encrypted Rich Queries in Distributed Key-Value Stores.
IEEE Trans. Parallel Distrib. Syst., 2019

Toward Secure and Scalable Computation in Internet of Things Data Applications.
IEEE Internet of Things Journal, 2019

Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet of Things Journal, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distrib. Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distrib. Syst., 2018

Assuring String Pattern Matching in Outsourced Middleboxes.
IEEE/ACM Trans. Netw., 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Sec. Comput., 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Network, 2018

Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Bandwidth-Efficient Middleware for Encrypted Deduplication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multimedia, 2017

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing.
IEEE Trans. Mob. Comput., 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing.
IEEE Trans. Knowl. Data Eng., 2017

Privacy-Preserving Similarity Joins Over Encrypted Data.
IEEE Trans. Information Forensics and Security, 2017

Hardening Distributed and Encrypted Keyword Search via Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Towards trustworthy and private keyword search in encrypted decentralized storage.
Proceedings of the IEEE International Conference on Communications, 2017

Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

EncKV: An Encrypted Key-value Store with Rich Queries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multimedia, 2016

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching.
IEEE Journal on Selected Areas in Communications, 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Privacy-preserving deep packet inspection in outsourced middleboxes.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards verifiable outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Bringing execution assurances of pattern matching in outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Privacy-Preserving Ridesharing Recommendation in Geosocial Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Building an Encrypted, Distributed, and Searchable Key-value Store.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Towards Secure and Practical Targeted Mobile Advertising.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Towards secure and practical targeted mobile advertising.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards a scalable, private, and searchable key-value store.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2010
Statistical timing verification for transparently latched circuits through structural graph traversal.
Proceedings of the 15th Asia South Pacific Design Automation Conference, 2010


  Loading...