Xuexian Hu
Orcid: 0000-0001-9778-9463
According to our database1,
Xuexian Hu
authored at least 54 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput., 2024
2023
J. Inf. Secur. Appl., December, 2023
VF-CART: A communication-efficient vertical federated framework for the CART algorithm.
J. King Saud Univ. Comput. Inf. Sci., January, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Comput. Secur., 2022
2021
IEEE/ACM Trans. Netw., 2021
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.
IET Inf. Secur., 2020
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
2019
Soft Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security.
IEEE Access, 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
IEEE Trans. Cloud Comput., 2018
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage.
IEEE Syst. J., 2018
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS.
Int. J. Commun. Syst., 2018
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network.
Proceedings of the 8th International Conference on Communication and Network Security, 2018
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy.
Proceedings of the 8th International Conference on Communication and Network Security, 2018
2017
Wirel. Pers. Commun., 2017
Secur. Commun. Networks, 2017
Knowl. Based Syst., 2017
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017
Int. J. Commun. Syst., 2017
Int. J. Comput. Math., 2017
Comput. Intell. Neurosci., 2017
Sci. China Inf. Sci., 2017
An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model.
Proceedings of the Social Media Processing - 6th National Conference, 2017
An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
J. Inf. Secur. Appl., 2016
Int. J. Netw. Secur., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Universally composable three-party password-authenticated key exchange with contributiveness.
Int. J. Commun. Syst., 2015
IET Comput. Digit. Tech., 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2014
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
2012
J. Medical Syst., 2012
2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006