Lei Xu
Orcid: 0000-0001-9178-6640Affiliations:
- Nanjing University of Science and Technology, School of Science, China
- Monash University, Faculty of Information Technology, Melbourne, Australia (2017 - 2018)
According to our database1,
Lei Xu
authored at least 44 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Toward Quality-Aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond.
IEEE Netw., September, 2024
Wirel. Networks, August, 2024
Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search.
Wirel. Networks, July, 2024
Wirel. Networks, July, 2024
Proc. VLDB Endow., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
IEEE/ACM Trans. Netw., April, 2023
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage.
Peer Peer Netw. Appl., January, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2022
Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice.
Soft Comput., 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Emerg. Top. Comput., 2021
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
2020
Inf. Sci., 2020
Int. J. Embed. Syst., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance.
IEEE Access, 2019
Proceedings of the Science of Cyber Security - Second International Conference, 2019
Proceedings of the Science of Cyber Security - Second International Conference, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2017
云计算中基于属性的可搜索加密电子病历系统 (Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing).
计算机科学, 2017
A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform.
KSII Trans. Internet Inf. Syst., 2017
Throughput optimization of TCP incast congestion control in large-scale datacenter networks.
Comput. Networks, 2017
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2015
IEEE Access, 2015
Efficient and Secure Data Retrieval Scheme Using Searchable Encryption in Cloud Storage.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the 18th ACM International Conference on Modeling, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
2014
Pushing Server Bandwidth Consumption to the Limit: Modeling and Analysis of Peer-Assisted VoD.
IEEE Trans. Netw. Serv. Manag., 2014