Xingliang Yuan

Orcid: 0000-0002-3701-4946

According to our database1, Xingliang Yuan authored at least 110 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Trustworthy Graph Neural Networks: Aspects, Methods, and Trends.
Proc. IEEE, February, 2024

Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024

A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024

2023
Projective Ranking-Based GNN Evasion Attacks.
IEEE Trans. Knowl. Data Eng., August, 2023

ShieldDB: An Encrypted Document Database With Padding Countermeasures.
IEEE Trans. Knowl. Data Eng., April, 2023

Towards Efficient Cryptographic Data Validation Service in Edge Computing.
IEEE Trans. Serv. Comput., 2023

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023

Defeating Misclassification Attacks Against Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques.
IEEE Trans. Dependable Secur. Comput., 2023

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
CoRR, 2023

GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks.
CoRR, 2023

A Survey on Federated Unlearning: Challenges, Methods, and Future Directions.
CoRR, 2023

On the Interaction between Node Fairness and Edge Privacy in Graph Neural Networks.
CoRR, 2023

Training-free Lexical Backdoor Attacks on Language Models.
Proceedings of the ACM Web Conference 2023, 2023

RAI4IoE: Responsible AI for Enabling the Internet of Energy.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Practical Earphone Eavesdropping with Built-in Motion Sensors.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks.
Proceedings of the International Conference on Machine Learning, 2023

TimeClave: Oblivious In-Enclave Time Series Processing System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

FaLA: Fast Linear Adaptation for Replacing Backbone Models on Edge Devices.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Semi-Supervised Federated Learning for Travel Mode Identification From GPS Trajectories.
IEEE Trans. Intell. Transp. Syst., 2022

Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge.
IEEE Trans. Inf. Forensics Secur., 2022

Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization.
IACR Cryptol. ePrint Arch., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining.
Proceedings of the IEEE INFOCOM 2022, 2022

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.
IEEE Trans. Serv. Comput., 2021

Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Enabling Authorized Encrypted Search for Multi-Authority Medical Databases.
IEEE Trans. Emerg. Top. Comput., 2021

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications.
CoRR, 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications.
Proceedings of the IEEE International Conference on Data Mining, 2021

[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Proceedings of the Computer Security - ESORICS 2021, 2021

Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021

Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

Towards Extracting Graph Neural Network Models via Prediction Queries (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
A Practical System for Privacy-Aware Targeted Mobile Advertising Services.
IEEE Trans. Serv. Comput., 2020

Enabling Encrypted Boolean Queries in Geographically Distributed Databases.
IEEE Trans. Parallel Distributed Syst., 2020

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2020

Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020

Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes.
IEEE Internet Things J., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System.
CoRR, 2020

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization.
CoRR, 2020

Towards understanding flash loan and its applications in defi ecosystem.
CoRR, 2020

Federated Learning for 6G Communications: Challenges, Methods, and Future Directions.
CoRR, 2020

A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Enabling Encrypted Rich Queries in Distributed Key-Value Stores.
IEEE Trans. Parallel Distributed Syst., 2019

Toward Secure and Scalable Computation in Internet of Things Data Applications.
IEEE Internet Things J., 2019

Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019

Defending Against Misclassification Attacks in Transfer Learning.
CoRR, 2019

GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distributed Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distributed Syst., 2018

Assuring String Pattern Matching in Outsourced Middleboxes.
IEEE/ACM Trans. Netw., 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Secur. Comput., 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Netw., 2018

Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Bandwidth-Efficient Middleware for Encrypted Deduplication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multim., 2017

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing.
IEEE Trans. Mob. Comput., 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing.
IEEE Trans. Knowl. Data Eng., 2017

Privacy-Preserving Similarity Joins Over Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2017

LightBox: SGX-assisted Secure Network Functions at Near-native Speed.
CoRR, 2017

Hardening Distributed and Encrypted Keyword Search via Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Towards trustworthy and private keyword search in encrypted decentralized storage.
Proceedings of the IEEE International Conference on Communications, 2017

Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

EncKV: An Encrypted Key-value Store with Rich Queries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching.
IEEE J. Sel. Areas Commun., 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Privacy-preserving deep packet inspection in outsourced middleboxes.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards verifiable outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Bringing execution assurances of pattern matching in outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Privacy-Preserving Ridesharing Recommendation in Geosocial Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Building an Encrypted, Distributed, and Searchable Key-value Store.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Towards Secure and Practical Targeted Mobile Advertising.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards a scalable, private, and searchable key-value store.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2010
Statistical timing verification for transparently latched circuits through structural graph traversal.
Proceedings of the 15th Asia South Pacific Design Automation Conference, 2010


  Loading...