Xiaolei Dong
Orcid: 0000-0002-5844-0223
According to our database1,
Xiaolei Dong
authored at least 139 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024
Frontiers Comput. Sci., February, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Evaluating the reliability of microgrids consisting of renewable energy sources using stochastic scheduling based on the data-driven uncertainty set.
Eng. Appl. Artif. Intell., 2024
IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT.
IEEE Access, 2024
Proof of Privacy-Preserving Machine Learning: A Blockchain Consensus Mechanism with Secure Deep Learning Process.
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns.
J. Syst. Archit., November, 2023
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search.
Inf. Sci., November, 2023
Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles.
Trans. Emerg. Telecommun. Technol., November, 2023
Frontiers Comput. Sci., October, 2023
Quantum Inf. Comput., May, 2023
EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.
IEEE Trans. Mob. Comput., March, 2023
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
IEEE Trans. Inf. Forensics Secur., 2023
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.
IEEE Trans. Dependable Secur. Comput., 2023
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.
IEEE Trans. Dependable Secur. Comput., 2023
BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks.
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
2022
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.
IEEE Trans. Cloud Comput., 2022
J. Comput. Sci. Technol., 2022
EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid.
IEEE Internet Things J., 2022
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.
Frontiers Comput. Sci., 2022
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Access, 2022
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022
2021
IEEE Trans. Smart Grid, 2021
IEEE Trans. Serv. Comput., 2021
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.
IEEE Trans. Dependable Secur. Comput., 2021
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts.
Secur. Commun. Networks, 2021
PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.
IEEE Internet Things J., 2021
Int. J. Inf. Comput. Secur., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Des. Codes Cryptogr., 2021
Comput. J., 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search.
IEEE Trans. Serv. Comput., 2020
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020
Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020
Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage.
IACR Cryptol. ePrint Arch., 2020
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting.
Comput. Secur., 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
2019
Secure and efficient encrypted keyword search for multi-user setting in cloud computing.
Peer-to-Peer Netw. Appl., 2019
IACR Cryptol. ePrint Arch., 2019
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks.
Future Gener. Comput. Syst., 2019
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application.
Comput. J., 2019
DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
Proceedings of the ICIT 2019, 2019
PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Secur. Comput., 2018
Comput. J., 2018
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018
Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation.
Sci. China Inf. Sci., 2018
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Wirel. Commun. Mob. Comput., 2017
IACR Cryptol. ePrint Arch., 2017
Availability Based Multiservice Delivery for Wireless Sensor Networks in Adversarial Environments.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017
2016
Secur. Commun. Networks, 2016
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016
Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks.
Peer-to-Peer Netw. Appl., 2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications.
Concurr. Comput. Pract. Exp., 2016
Comput. J., 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wirel. Commun., 2015
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015
Peer-to-Peer Netw. Appl., 2015
IEEE J. Sel. Top. Signal Process., 2015
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks.
Inf. Sci., 2015
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
IACR Cryptol. ePrint Arch., 2015
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
User self-controllable profile matching for privacy-preserving mobile social networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014
An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wirel. Commun., 2013
Secur. Commun. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks.
Proceedings of the 8th International Conference on Body Area Networks, 2013
2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks.
IEEE Commun. Lett., 2011
Comput. Electr. Eng., 2011
2010
J. Syst. Sci. Complex., 2010
2009
Wirel. Commun. Mob. Comput., 2009
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Sci. China Ser. F Inf. Sci., 2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Int. J. Found. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
Sci. China Ser. F Inf. Sci., 2007
2006
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wirel. Commun. Mob. Comput., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006