Lei Xu

Orcid: 0000-0001-9178-6640

Affiliations:
  • Nanjing University of Science and Technology, School of Science, China
  • Monash University, Faculty of Information Technology, Melbourne, Australia (2017 - 2018)


According to our database1, Lei Xu authored at least 44 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Quality-Aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond.
IEEE Netw., September, 2024

Ranked searchable encryption based on differential privacy and blockchain.
Wirel. Networks, August, 2024

Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search.
Wirel. Networks, July, 2024

Conjunctive searchable encryption with efficient authorization for group sharing.
Wirel. Networks, July, 2024

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores.
Proc. VLDB Endow., June, 2024

Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024

Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024

HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

2023
R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers.
IEEE/ACM Trans. Netw., April, 2023

TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage.
Peer Peer Netw. Appl., January, 2023

Towards Efficient Cryptographic Data Validation Service in Edge Computing.
IEEE Trans. Serv. Comput., 2023

${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services.
IEEE Trans. Dependable Secur. Comput., 2023

Optimization of Functional Bootstrap with Large LUT and Packing Key Switching.
IACR Cryptol. ePrint Arch., 2023

Boomerang: Metadata-Private Messaging under Hardware Trust.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Forward and Backward Private DSSE for Range Queries.
IEEE Trans. Dependable Secur. Comput., 2022

Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2022

Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice.
Soft Comput., 2022

An Efficient Lattice-Based Encrypted Search Scheme with Forward Security.
Proceedings of the Network and System Security - 16th International Conference, 2022

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Enabling Authorized Encrypted Search for Multi-Authority Medical Databases.
IEEE Trans. Emerg. Top. Comput., 2021

R-AQM: Reverse ACK Active Queue Management in Multi-tenant Data Centers.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

2020
ABQ: Active Buffer Queueing in Datacenters.
IEEE Netw., 2020

Building a dynamic searchable encrypted medical database for multi-client.
Inf. Sci., 2020

Attacking the Niederreiter-type cryptosystem based on rank metric.
Int. J. Embed. Syst., 2020

EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance.
IEEE Access, 2019

Forward Private Searchable Encryption with Conjunctive Keywords Query.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Towards Realizing Authorized Encrypted Search with Designed Access Policy.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Multi-owner Secure Encrypted Search Using Searching Adversarial Networks.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2017
云计算中基于属性的可搜索加密电子病历系统 (Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing).
计算机科学, 2017

A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform.
KSII Trans. Internet Inf. Syst., 2017

Throughput optimization of TCP incast congestion control in large-scale datacenter networks.
Comput. Networks, 2017

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

MINOS: regulating router dataplane actions in dynamic runtime environments.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2015
Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis.
IEEE Access, 2015

Efficient and Secure Data Retrieval Scheme Using Searchable Encryption in Cloud Storage.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Modeling Multi-path TCP Throughput with Coupled Congestion Control and Flow Control.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Enhancing TCP Incast congestion control over large-scale datacenter networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

2014
Pushing Server Bandwidth Consumption to the Limit: Modeling and Analysis of Peer-Assisted VoD.
IEEE Trans. Netw. Serv. Manag., 2014


  Loading...