Xinxin Fan

Orcid: 0000-0002-4592-6603

According to our database1, Xinxin Fan authored at least 107 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks.
IEEE Trans. Consumer Electron., February, 2024

Private Delegated Computations Using Strong Isolation.
IEEE Trans. Emerg. Top. Comput., 2024

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs.
IACR Cryptol. ePrint Arch., 2024

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity.
CoRR, 2024

Multimodal Information Interaction for Medical Image Segmentation.
CoRR, 2024

QUIZ: An arbitrary volumetric point matching method for medical image registration.
Comput. Medical Imaging Graph., 2024

2023
TAEffect: Quantifying interaction risks in trust-enabled communication systems.
Int. J. Commun. Syst., 2023

Contrastive Prompt Learning-based Code Search based on Interaction Matrix.
CoRR, 2023

TPU as Cryptographic Accelerator.
CoRR, 2023

The 1st International Workshop on Decentralized Physical Infrastructure Networks (DePIN 2023).
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

Privacy-Preserving Object Detection with Veracruz.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Three-Dimensional Medical Image Fusion with Deformable Cross-Attention.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

DHTee: Decentralized Infrastructure for Heterogeneous TEEs.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Connecting Smart Devices to Smart Contracts with W3bstream.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper.
Proceedings of the Fifth ACM International Workshop on Blockchain-enabled Networked Sensor Systems, 2023

2022
Structural Attention Enhanced Continual Meta-Learning for Graph Edge Labeling Based Few-Shot Remote Sensing Scene Classification.
Remote. Sens., 2022

RetCom: Information Retrieval-Enhanced Automatic Source-Code Summarization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

GTAT: Adversarial Training with Generated Triplets.
Proceedings of the International Joint Conference on Neural Networks, 2022

Lightweight Dual-Domain Network for Real-Time Medical Image Segmentation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Insights on Impact of Distributed Ledgers on Provider Networks.
Proceedings of the Blockchain - ICBC 2022, 2022

Contrastive Disentangled Graph Convolutional Network for Weakly-Supervised Classification.
Proceedings of the Database Systems for Advanced Applications, 2022

Can Adversarial Training benefit Trajectory Representation?: An Investigation on Robustness for Trajectory Similarity Computation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Decentralized Trust Management: Risk Analysis and Trust Aggregation.
ACM Comput. Surv., 2021

AdvCGAN: An Elastic and Covert Adversarial Examples Generating Framework.
Proceedings of the International Joint Conference on Neural Networks, 2021

TRANSFAKE: Multi-task Transformer for Multimodal Enhanced Fake News Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

An Effective Implicit Multi-interest Interaction Network for Recommendation.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner.
Proceedings of the Blockchain - ICBC 2021, 2021

Variational Cross-Network Embedding for Anonymized User Identity Linkage.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

TrajCross: Trajecotry Cross-Modal Retrieval with Contrastive Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems.
IEEE Netw., 2020

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices.
IEEE Consumer Electron. Mag., 2020

Decentralized IoT Data Authorization with Pebble Tracker.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System.
Proceedings of the Security and Privacy in Communication Networks, 2020

HGCN: A Heterogeneous Graph Convolutional Network-Based Deep Learning Model Toward Collective Classification.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

EcoBoost: Efficient Bootstrapping for Confidential Transactions.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

MULTAV: A Multi-chain Token Backed Voting Framework for Decentralized Blockchain Governance.
Proceedings of the Blockchain - ICBC 2020, 2020

LRHNE: A Latent-Relation Enhanced Embedding Method for Heterogeneous Information Networks.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

EMS: An Extensible and Modular Staking Architecture for Proof-of-Stake Systems.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2019
A Dynamic Differential Phase Analysis Method for Wireless Sensing.
IEEE Trans. Veh. Technol., 2019

Secure simultaneous bit extraction from Koblitz curves.
Des. Codes Cryptogr., 2019

Cross-Network Embedding for Multi-Network Alignment.
Proceedings of the World Wide Web Conference, 2019

Noise-Aware Network Embedding for Multiplex Network.
Proceedings of the International Joint Conference on Neural Networks, 2019

KCRS: A Blockchain-Based Key Compromise Resilient Signature System.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Device-Free Identification Using Intrinsic CSI Features.
IEEE Trans. Veh. Technol., 2018

Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2018

Loop-Free Rerouting of Multiple Policies With Overlaps.
IEEE Commun. Lett., 2018

Lightweight Verification for Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Characterizing the Effectiveness of Query Optimizer in Spark.
Proceedings of the 2018 IEEE World Congress on Services, 2018

Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

SERL: Semantic-Path Biased Representation Learning of Heterogeneous Information Network.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Update Cost-Aware Cache Replacement for Wildcard Rules in Software-Defined Networking.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Trustworthiness and Untrustworthiness Inference with Group Assignment.
Proceedings of the Web Services - ICWS 2018, 2018

Identification for Strategically Malicious Participants.
Proceedings of the Web Services - ICWS 2018, 2018

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems.
Proceedings of the Blockchain - ICBC 2018, 2018

How Good is Query Optimizer in Spark?
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Scalable practical byzantine fault tolerance with short-lived signature schemes.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
GroupTrust: Dependable Trust Management.
IEEE Trans. Parallel Distributed Syst., 2017

Multiple point compression on elliptic curves.
Des. Codes Cryptogr., 2017

Scheduling loop-free updates for multiple policies with overlaps in software-defined networks.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices.
ACM Trans. Embed. Comput. Syst., 2016

Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Reliable and Resilient Trust Management in Distributed Service Provision Networks.
ACM Trans. Web, 2015

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices.
EAI Endorsed Trans. Security Safety, 2015

2014
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
IACR Cryptol. ePrint Arch., 2014

Optimal parameters for the WG stream cipher family.
Cryptogr. Commun., 2014

Loxin - A solution to password-less universal login.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2013
Attribute-based ring signcryption scheme.
Secur. Commun. Networks, 2013

Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks.
Secur. Commun. Networks, 2013

Hamiltonian Connectedness in Claw-Free Graphs.
Graphs Comb., 2013

Resilience to distinguishing attacks on WG-7 cipher and their generalizations.
Cryptogr. Commun., 2013

Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions.
Proceedings of the Radio Frequency Identification System Security, 2013

On selection of optimal parameters for the WG stream cipher family.
Proceedings of the 13th Canadian Workshop on Information Theory, 2013

Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic.
Proceedings of the TrustED'13, 2013

Securing ZigBee smart energy profile 1.x with OpenECC library.
Proceedings of the SEGS'13, 2013

Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs.
Proceedings of the Workshop on Embedded Systems Security, 2013

ServiceTrust: Trust Management in Service Provision Networks.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Behavior-based reputation management in P2P file-sharing networks.
J. Comput. Syst. Sci., 2012

Accelerating signature-based broadcast authentication for wireless sensor networks.
Ad Hoc Networks, 2012

Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags.
Proceedings of the Radio Frequency Identification System Security, 2012

EigenTrustp<sup>++</sup>: Attack resilient trust management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
A formal separation method of protocols to eliminate parallel attacks in virtual organization.
Secur. Commun. Networks, 2011

An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2.
IACR Cryptol. ePrint Arch., 2011

On the Security of Hummingbird-2 against Side Channel Cube Attacks.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

Remedying the Hummingbird Cryptographic Algorithm.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A lightweight privacy-preserving mutual authentication protocol for RFID systems.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

2010
Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks.
PhD thesis, 2010

Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

FPGA Implementations of the Hummingbird Cryptographic Algorithm.
Proceedings of the HOST 2010, 2010

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
Proceedings of the Pairing-Based Cryptography, 2008

Key revocation based on Dirichlet multinomial model for mobile ad hoc networks.
Proceedings of the LCN 2008, 2008

A Ranking Algorithm via Changing Markov Probability Matrix Based on Distribution Factor.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields.
IET Inf. Secur., 2007

Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2005
Efficient Doubling on Genus 3 Curves over Binary Fields.
IACR Cryptol. ePrint Arch., 2005

Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves.
IACR Cryptol. ePrint Arch., 2004


  Loading...