Peng Xu
Orcid: 0000-0003-4268-4976Affiliations:
- Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China (PhD 2010)
According to our database1,
Peng Xu
authored at least 53 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
A Cryptographic Hardware Engineering Course based on FPGA and Security Analysis Equipment.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
SpaHet: A Software/Hardware Co-design for Accelerating Heterogeneous-Sparsity based Sparse Matrix Multiplication.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
A Real-Time Scalable Video Distribution Strategy Based on Dynamic Coalition and D2D Broadcast.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT.
IEEE Trans. Ind. Informatics, 2021
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment.
Future Gener. Comput. Syst., 2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics, 2020
IEEE Access, 2020
2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
IEEE Trans. Serv. Comput., 2018
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018
IEEE Cloud Comput., 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
J. Netw. Comput. Appl., 2017
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch., 2017
IEEE Access, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Gener. Comput. Syst., 2016
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015
A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Gener. Comput. Syst., 2015
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
2014
Comput. J., 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013
2012
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries.
IEEE Trans. Inf. Forensics Secur., 2012
2011
IACR Cryptol. ePrint Arch., 2011
2010
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity.
Inf. Sci., 2010
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010