Xingliang Yuan
Orcid: 0000-0002-3701-4946
According to our database1,
Xingliang Yuan
authored at least 128 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. IEEE, February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection.
CoRR, 2024
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts.
CoRR, 2024
CoRR, 2024
CoRR, 2024
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning.
CoRR, 2024
DeFiGuard: A Price Manipulation Detection Service in DeFi using Graph Neural Networks.
CoRR, 2024
NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human.
CoRR, 2024
Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks.
CoRR, 2024
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?
CoRR, 2024
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
<i>BadSampler: </i> Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IEEE Trans. Knowl. Data Eng., August, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Serv. Comput., 2023
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques.
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks.
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Semi-Supervised Federated Learning for Travel Mode Identification From GPS Trajectories.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization.
J. Comput. Secur., 2022
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications.
Proceedings of the IEEE International Conference on Data Mining, 2021
[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021
Towards Extracting Graph Neural Network Models via Prediction Queries (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System.
CoRR, 2020
CoRR, 2020
Federated Learning for 6G Communications: Challenges, Methods, and Future Directions.
CoRR, 2020
A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
IEEE Internet Things J., 2019
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019
GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE/ACM Trans. Netw., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Netw., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Multim., 2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Knowl. Data Eng., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016
IEEE J. Sel. Areas Commun., 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the Computational Social Networks - 5th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
2010
Statistical timing verification for transparently latched circuits through structural graph traversal.
Proceedings of the 15th Asia South Pacific Design Automation Conference, 2010