Runhua Xu
Orcid: 0000-0003-4541-9764
According to our database1,
Runhua Xu
authored at least 41 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022
Proceedings of the Federated Learning, 2022
Protecting Against Data Leakage in Federated Learning: What Approach Should You Choose?
Proceedings of the Federated Learning, 2022
2021
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication.
IEEE Trans. Dependable Secur. Comput., 2021
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
2020
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
2019
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Pervasive Mob. Comput., 2017
Mobile recommendations based on interest prediction from consumer's installed apps-insights from a large-scale field study.
Inf. Syst., 2017
2016
Understanding the impact of personality traits on mobile app adoption - Insights from a large-scale field study.
Comput. Hum. Behav., 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Int. J. Cloud Comput., 2015
Reality-Mining with Smartphones: Detecting and Predicting Life Events based on App Installation Behavior.
Proceedings of the International Conference on Information Systems, 2015
Towards Understanding the Impact of Personality Traits on Mobile App Adoption - A Scalable Approach.
Proceedings of the 23rd European Conference on Information Systems, 2015
2014
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014
Proceedings of the International Conference on Information Systems, 2014
Design of a Health Information System Enhancing the Performance of Obesity Expert and children Teams.
Proceedings of the 22st European Conference on Information Systems, 2014
Tell Me What to Eat - Design and Evaluation of a Mobile Companion Helping Children and Their Parents to Plan Nutrition Intake.
Proceedings of the Ambient Intelligence, European Conference, 2014
2013
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013