Runhua Xu

Orcid: 0000-0003-4541-9764

According to our database1, Runhua Xu authored at least 41 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models.
IEEE Trans. Inf. Forensics Secur., 2024

TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident.
CoRR, 2024

2023
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services.
IEEE Trans. Dependable Secur. Comput., 2023

Characterizing Coin-Based Voting Governance in DPoS Blockchains.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Liquid Democracy in DPoS Blockchains.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets.
IEEE Trans. Dependable Secur. Comput., 2022

DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

Privacy-Preserving Vertical Federated Learning.
Proceedings of the Federated Learning, 2022

Protecting Against Data Leakage in Federated Learning: What Approach Should You Choose?
Proceedings of the Federated Learning, 2022

2021
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-Preserving Machine Learning: Methods, Challenges and Directions.
CoRR, 2021

T3AB: Transparent and Trustworthy Third-party Authority using Blockchain.
CoRR, 2021

SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
Trustworthy and Transparent Third-party Authority.
ACM Trans. Internet Techn., 2020

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Proceedings of the Second IEEE International Conference on Trust, 2020

NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

2019
Scalable and Privacy-Preserving Design of On/Off-Chain Smart Contracts.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

CryptoNN: Training Neural Networks over Encrypted Data.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

2018
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Mobile app adoption in different life stages: An empirical analysis.
Pervasive Mob. Comput., 2017

Mobile recommendations based on interest prediction from consumer's installed apps-insights from a large-scale field study.
Inf. Syst., 2017

2016
Understanding the impact of personality traits on mobile app adoption - Insights from a large-scale field study.
Comput. Hum. Behav., 2016

Enabling Attribute Based Encryption as an Internet Service.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

A lightweight user tracking method for app providers.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Individual Differences and Mobile Service Adoption: An Empirical Analysis.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016

An Integrated Privacy Preserving Attribute Based Access Control Framework.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A CP-ABE scheme with hidden policy and its application in cloud computing.
Int. J. Cloud Comput., 2015

Reality-Mining with Smartphones: Detecting and Predicting Life Events based on App Installation Behavior.
Proceedings of the International Conference on Information Systems, 2015

Towards Understanding the Impact of Personality Traits on Mobile App Adoption - A Scalable Approach.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
Measuring and Mitigating Product Data Inaccuracy in Online Retailing.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Product as a Service: Enabling Physical Products as Service End-Points.
Proceedings of the International Conference on Information Systems, 2014

Design of a Health Information System Enhancing the Performance of Obesity Expert and children Teams.
Proceedings of the 22st European Conference on Information Systems, 2014

Tell Me What to Eat - Design and Evaluation of a Mobile Companion Helping Children and Their Parents to Plan Nutrition Intake.
Proceedings of the Ambient Intelligence, European Conference, 2014

2013
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control.
Proceedings of the SECRYPT 2013, 2013

Self-contained Data Protection Scheme Based on CP-ABE.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013


  Loading...