Xinyu Lei

Orcid: 0000-0001-8799-7875

According to our database1, Xinyu Lei authored at least 52 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mitigating cross-client GANs-based attack in federated learning.
Multim. Tools Appl., January, 2024

Secure Redactable Blockchain With Dynamic Support.
IEEE Trans. Dependable Secur. Comput., 2024

Handling Data Heterogeneity for IoT Devices in Federated Learning: A Knowledge Fusion Approach.
IEEE Internet Things J., 2024

2023
The improved deep plug-and-play super-resolution with residual-in-residual dense block for arbitrary blur kernels.
Pattern Anal. Appl., November, 2023

RepCo: Replenish sample views with better consistency for contrastive learning.
Neural Networks, November, 2023

Frequency Spectrum Modification Process-Based Anti-Collusion Mechanism for Audio Signals.
IEEE Trans. Cybern., September, 2023

MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems.
IEEE Trans. Mob. Comput., June, 2023

Federated Learning for IoT Devices With Domain Generalization.
IEEE Internet Things J., June, 2023

Privacy-Preserving Federated Learning With Malicious Clients and Honest-but-Curious Servers.
IEEE Trans. Inf. Forensics Secur., 2023

The Security in Optical Wireless Communication: A Survey.
ACM Comput. Surv., 2023

Towards Inference of Original Graph Data Information from Graph Embeddings.
Proceedings of the International Joint Conference on Neural Networks, 2023

Privacy-Preserving Travel Time Prediction for Internet of Vehicles: A Crowdsensing and Federated Learning Approach.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Cross-Layer Patch Alignment and Intra-and-Inter Patch Relations for Knowledge Distillation.
Proceedings of the IEEE International Conference on Image Processing, 2023

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Minable Data Publication Based on Sensitive Association Rule Hiding.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing.
IEEE Trans. Cloud Comput., 2022

Fast identification model for coal and gangue based on the improved tiny YOLO v3.
J. Real Time Image Process., 2022

Hybrid dilated faster RCNN for object detection.
J. Intell. Fuzzy Syst., 2022

Handling Data Heterogeneity in Federated Learning via Knowledge Fusion.
CoRR, 2022

Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Federated Continuous Learning With Broad Network Architecture.
IEEE Trans. Cybern., 2021

The enhanced deep Plug-and-play super-resolution algorithm with residual channel attention networks.
J. Intell. Fuzzy Syst., 2021

Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey.
Int. J. Intell. Syst., 2021

EA-HUFIM: Optimization for Fuzzy-Based High-Utility Itemsets Mining.
Int. J. Fuzzy Syst., 2021

Federated Learning with Domain Generalization.
CoRR, 2021

PTA-SC: Privacy-Preserving Task Allocation for Spatial Crowdsourcing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Supervised Network-Based Fuzzy Learning of EEG Signals for Alzheimer's Disease Identification.
IEEE Trans. Fuzzy Syst., 2020

A closed-loop BMI system design based on the improved SJIT model and the network of Izhikevich neurons.
Neurocomputing, 2020

A closed-loop brain-machine interface framework design for motor rehabilitation.
Biomed. Signal Process. Control., 2020

SecWIR: securing smart home IoT communications via wi-fi routers with embedded intelligence.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

An Inter-blockchain Escrow Approach for Fast Bitcoin Payment.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

CPSO-THCS: An Optimization Algorithm for Emergency Supply Delivery Routing Problem.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

Fast and Secure kNN Query Processing in Cloud Computing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A Dilated CNN Model for Image Classification.
IEEE Access, 2019

Exploring the Insecurity of Google Account Registration Protocol via Model Checking.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

A dilated CNN model for wide-band remote sensing image classification.
Proceedings of the 2019 IEEE International Conference on Real-time Computing and Robotics, 2019

SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study.
CoRR, 2017

Secure KNN Queries over Encrypted Data: Dimensionality Is Not Always a Curse.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2015
Cloud Computing Service: The Caseof Large Matrix Determinant Computation.
IEEE Trans. Serv. Comput., 2015

Securely and efficiently perform large matrix rank decomposition computation via cloud computing.
Clust. Comput., 2015

Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

2014
Highly Efficient Linear Regression Outsourcing to a Cloud.
IEEE Trans. Cloud Comput., 2014

Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud.
Inf. Sci., 2014

2013
Outsourcing Large Matrix Inversion Computation to A Public Cloud.
IEEE Trans. Cloud Comput., 2013

Second-Order Consensus Seeking in Multi-Agent Systems With Nonlinear Dynamics Over Random Switching Directed Networks.
IEEE Trans. Circuits Syst. I Regul. Pap., 2013

NTRU-KE: A Lattice-based Public Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2013

Group Key Agreement Protocol for MANETs Based on HSK Scheme.
CoRR, 2013


  Loading...