Lei Xu

Orcid: 0000-0002-7349-5417

Affiliations:
  • Beijing Institute of Technology, School of Computer Science and Technology, China
  • Tsinghua University, Department of Computer Science and Technology, Beijing, China (former)
  • Tsinghua University, Department of Electronic Engineering, Beijing, China (PhD 2015)


According to our database1, Lei Xu authored at least 41 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees.
Comput. Secur., December, 2023

A blockchain based access control scheme with hidden policy and attribute.
Future Gener. Comput. Syst., April, 2023

Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

Blockchain-Empowered Privacy-Preserving Digital Object Trading in the Metaverse.
IEEE Multim., 2023

Blockchain-based Certificate Management with Multi-Party Authentication.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023

HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Blockchain-based Privacy-Preserving Reputation Management for Crowdsensing.
Proceedings of the 2023 4th International Conference on Computing, 2023

Regulation-Friendly Privacy-Preserving Blockchain Based on zk-SNARK.
Proceedings of the Advanced Information Systems Engineering Workshops, 2023

Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
ARC: An Asynchronous Consensus and Relay Chain-based Cross-chain Solution to Consortium Blockchain.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

2021
Successive Point-of-Interest Recommendation With Personalized Local Differential Privacy.
IEEE Trans. Veh. Technol., 2021

Blockchain Empowered Differentially Private and Auditable Data Publishing in Industrial IoT.
IEEE Trans. Ind. Informatics, 2021

Privacy-Accuracy Trade-Off in Differentially-Private Distributed Classification: A Game Theoretical Approach.
IEEE Trans. Big Data, 2021

A Privacy-Preserving Auditable Approach Using Threshold Tag-Based Encryption in Consortium Blockchain.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

Cross-Chain-Based Decentralized Identity for Mortgage Loans.
Proceedings of the Knowledge Science, Engineering and Management, 2021

2020
Blockchain-based multimedia sharing in vehicular social networks with privacy protection.
Multim. Tools Appl., 2020

LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
Trust-Based Privacy-Preserving Photo Sharing in Online Social Networks.
IEEE Trans. Multim., 2019

Trust-Based Collaborative Privacy Management in Online Social Networks.
IEEE Trans. Inf. Forensics Secur., 2019

User Participation in Collaborative Filtering-Based Recommendation Systems: A Game Theoretic Approach.
IEEE Trans. Cybern., 2019

Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks.
IEEE Internet Things J., 2019

Location-based Privacy-preserving Techniques in Connected Environment: A Survey.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Distributed Data Privacy Preservation in IoT Applications.
IEEE Wirel. Commun., 2018

Check in or Not? A Stochastic Game for Privacy Preserving in Point-of-Interest Recommendation System.
IEEE Internet Things J., 2018

Data Privacy Games
Springer, ISBN: 978-3-319-77964-5, 2018

2017
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Big Data Driven Similarity Based U-Model for Online Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Energy Efficient D2D Communications: A Perspective of Mechanism Design.
IEEE Trans. Wirel. Commun., 2016

User Association in Heterogeneous Networks: A Social Interaction Approach.
IEEE Trans. Veh. Technol., 2016

Microblog Dimensionality Reduction - A Deep Learning Approach.
IEEE Trans. Knowl. Data Eng., 2016

A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining.
Computer, 2016

2015
Privacy or Utility in Data Collection? A Contract Theoretic Approach.
IEEE J. Sel. Top. Signal Process., 2015

Game theoretic data privacy preservation: Equilibrium and pricing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Deep learning in exploring semantic relatedness for microblog dimensionality reduction.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Wireless network recommendation system in heterogeneous networks.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

2014
Information Security in Big Data: Privacy and Data Mining.
IEEE Access, 2014

User participation game in collaborative filtering.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2011
A New Answer Analysis Approach for Chinese Yes-No Question.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011


  Loading...