Guowen Xu

Orcid: 0000-0002-9764-9345

According to our database1, Guowen Xu authored at least 110 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
It's All in the Touch: Authenticating Users With HOST Gestures on Multi-Touch Screen Devices.
IEEE Trans. Mob. Comput., October, 2024

FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings.
IEEE Trans. Knowl. Data Eng., April, 2024

Privacy-Preserving and Poisoning-Defending Federated Learning in Fog Computing.
IEEE Internet Things J., February, 2024

Efficient and Privacy-Preserving Outsourcing of Gradient Boosting Decision Tree Inference.
IEEE Trans. Serv. Comput., 2024

An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption.
IEEE Trans. Serv. Comput., 2024

Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models.
IEEE Trans. Inf. Forensics Secur., 2024

Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur., 2024

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
IEEE Trans. Dependable Secur. Comput., 2024

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
IEEE Trans. Dependable Secur. Comput., 2024

Incremental Learning, Incremental Backdoor Threats.
IEEE Trans. Dependable Secur. Comput., 2024

A Comprehensive Defense Framework Against Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

Channel-Aware Throughput Maximization for Cooperative Data Fusion in CAV.
CoRR, 2024

OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud.
CoRR, 2024

ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition.
CoRR, 2024

Secure Traffic Sign Recognition: An Attention-Enabled Universal Image Inpainting Mechanism against Light Patch Attacks.
CoRR, 2024

Backdoor Attacks against Image-to-Image Networks.
CoRR, 2024

CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024

Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks.
CoRR, 2024

Backdooring Multimodal Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Privacy-Preserving Data Evaluation via Functional Encryption, Revisited.
Proceedings of the IEEE INFOCOM 2024, 2024

SmartCooper: Vehicular Collaborative Perception with Adaptive Fusion and Judger Mechanism.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

SecSCS: A User-Centric Secure Smart Camera System Based on Blockchain.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Fingerprinting Image-to-Image Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Secure Decentralized Image Classification With Multiparty Homomorphic Encryption.
IEEE Trans. Circuits Syst. Video Technol., July, 2023

Physical Black-Box Adversarial Attacks Through Transformations.
IEEE Trans. Big Data, June, 2023

Secure Updatable Storage Access Control System for EHRs in the Cloud.
IEEE Trans. Serv. Comput., 2023

Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2023

An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
IEEE Trans. Inf. Forensics Secur., 2023

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023

PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees.
IEEE Trans. Inf. Forensics Secur., 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

Hercules: Boosting the Performance of Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image.
IEEE Trans. Cloud Comput., 2023

Adaptive Communications in Collaborative Perception with Domain Alignment for Autonomous Driving.
CoRR, 2023

Adversarial Training Over Long-Tailed Distribution.
CoRR, 2023

Extracting Cloud-based Model with Prior Knowledge.
CoRR, 2023

Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients.
Proceedings of the IEEE INFOCOM 2023, 2023

GuardHFL: Privacy Guardian for Heterogeneous Federated Learning.
Proceedings of the International Conference on Machine Learning, 2023

Extracting Robust Models with Uncertain Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Clean-image Backdoor: Attacking Multi-label Models with Poisoned Labels Only.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023

Color Backdoor: A Robust Poisoning Attack in Color Space.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2022

Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
IEEE Trans. Inf. Forensics Secur., 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Federated Deep Learning With Irregular Users.
IEEE Trans. Dependable Secur. Comput., 2022

Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022

DNA Similarity Search With Access Control Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Enabling Secure and Versatile Packet Inspection With Probable Cause Privacy for Outsourced Middlebox.
IEEE Trans. Cloud Comput., 2022

Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox.
IEEE Trans. Cloud Comput., 2022

Verifiable and privacy preserving federated learning without fully trusted centers.
J. Ambient Intell. Humaniz. Comput., 2022

Efficient Privacy-Preserving Federated Learning With Unreliable Users.
IEEE Internet Things J., 2022

Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data.
CoRR, 2022

A Benchmark of Long-tailed Instance Segmentation with Noisy Labels (Short Version).
CoRR, 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
CoRR, 2022

Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption.
CoRR, 2022

ShiftNAS: Towards Automatic Generation of Advanced Mulitplication-Less Neural Networks.
CoRR, 2022

Clean-Annotation Backdoor Attack against Lane Detection Systems in the Wild.
CoRR, 2022

Iron: Private Inference on Transformers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Anteater: Malware Injection Detection with Program Network Traffic Behavior.
Proceedings of the International Conference on Networking and Network Applications, 2022

Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Improving Adversarial Robustness of 3D Point Cloud Classification Models.
Proceedings of the Computer Vision - ECCV 2022, 2022

On the (In)Security of Secure ROS2.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Privacy-Enhanced Federated Learning Against Poisoning Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021

One radish, One hole: Specific adversarial training for enhancing neural network's robustness.
Peer-to-Peer Netw. Appl., 2021

A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT.
IEEE Internet Things J., 2021

A Stealthy and Robust Fingerprinting Scheme for Generative Models.
CoRR, 2021

Enhanced Mixup Training: a Defense Method Against Membership Inference Attack.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Efficient and Verifiable Proof of Replication with Fast Fault Localization.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Generating Audio Adversarial Examples with Ensemble Substituted Models.
Proceedings of the ICC 2021, 2021

Revocable Policy-Based Chameleon Hash.
Proceedings of the Computer Security - ESORICS 2021, 2021

Efficient, Private and Robust Federated Learning.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence.
IEEE Trans. Ind. Informatics, 2020

VerifyNet: Secure and Verifiable Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2020

Adaptive privacy-preserving federated learning.
Peer-to-Peer Netw. Appl., 2020

Efficient ciphertext-policy attribute-based encryption with blackbox traceability.
Inf. Sci., 2020

PADL: Privacy-Aware and Asynchronous Deep Learning for IoT Applications.
IEEE Internet Things J., 2020

Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020

Revocable and certificateless public auditing for cloud storage.
Sci. China Inf. Sci., 2020

A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Privacy-aware and Resource-saving Collaborative Learning for Healthcare in Cloud Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Achieving Privacy-preserving Federated Learning with Irrelevant Updates over E-Health Applications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Practical Black-Box Attack Against Autonomous Speech Recognition Model.
Proceedings of the IEEE Global Communications Conference, 2020

Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Veh. Technol., 2019

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities.
IEEE Commun. Mag., 2019

Towards Efficient and Privacy-Preserving Federated Deep Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

EPPS: Efficient Privacy-Preserving Scheme in Distributed Deep Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2018

Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Towards practical personalized recommendation with multi-level differential privacy controls.
Proceedings of the IEEE INFOCOM 2018, 2018

EFRS: Enabling Efficient and Fine-Grained Range Search on Encrypted Spatial Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Achieving efficient and privacy-preserving truth discovery in crowd sensing systems.
Comput. Secur., 2017

CryptMDB: A practical encrypted MongoDB over big data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Towards Efficient Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Diverse multi-keyword ranked search over encrypted cloud data supporting range query.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2008
Software Watermarking Based on Dynamic Program Slicing.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...