Xuexian Hu

Orcid: 0000-0001-9778-9463

According to our database1, Xuexian Hu authored at least 53 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
System-widely and fine-grained forward secure identity-based signature scheme.
J. Inf. Secur. Appl., December, 2023

VF-CART: A communication-efficient vertical federated framework for the CART algorithm.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

2022
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

VAEPass: A lightweight passwords guessing model based on variational auto-encoder.
Comput. Secur., 2022

2021
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.
IEEE/ACM Trans. Netw., 2021

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021

PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DApp.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.
IET Inf. Secur., 2020

Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
Forward and backward secure fuzzy encryption for data sharing in cloud computing.
Soft Comput., 2019

TG-SPSR: A Systematic Targeted Password Attacking Model.
KSII Trans. Internet Inf. Syst., 2019

SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm.
IEEE Access, 2019

An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security.
IEEE Access, 2019

Differentially Private Graph Clustering Algorithm Based on Structure Similarity.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
IEEE Trans. Cloud Comput., 2018

Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage.
IEEE Syst. J., 2018

Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018

On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS.
Int. J. Commun. Syst., 2018

A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.
Wirel. Pers. Commun., 2017

PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing.
Secur. Commun. Networks, 2017

Compressed constrained spectral clustering framework for large-scale data sets.
Knowl. Based Syst., 2017

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017

Two-factor authentication scheme using attribute and password.
Int. J. Commun. Syst., 2017

Forward-secure identity-based signature with efficient revocation.
Int. J. Comput. Math., 2017

Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection.
Comput. Intell. Neurosci., 2017

Universally composable anonymous password authenticated key exchange.
Sci. China Inf. Sci., 2017

An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model.
Proceedings of the Social Media Processing - 6th National Conference, 2017

An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

Universally Composable Three-Party Password Authenticated Key Exchange.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Security pitfalls of "ePASS: An expressive attribute-based signature scheme".
J. Inf. Secur. Appl., 2016

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme.
Int. J. Netw. Secur., 2016

Practical Attribute-based Signature: Traceability and Revocability.
Comput. J., 2016

UC-secure Two-Server Password-Based Authentication Protocol and Its Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Universally composable three-party password-authenticated key exchange with contributiveness.
Int. J. Commun. Syst., 2015

Secure control protocol for universal serial bus mass storage devices.
IET Comput. Digit. Tech., 2015

Forward-Secure Threshold Attribute-Based Signature Scheme.
Comput. J., 2015

Revocable Threshold Attribute-Based Signature against Signing Key Exposure.
Proceedings of the Information Security Practice and Experience, 2015

Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2014

Traceable attribute-based signcryption.
Secur. Commun. Networks, 2014

Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

2012
An Improved Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

2009
A New Strongly Secure Authenticated Key Exchange Protocol.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2006
On the Rate of Coincidence of Two Clock-Controlled Combiners.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006


  Loading...