Xun Yi
Orcid: 0000-0001-7351-5724
According to our database1,
Xun Yi
authored at least 272 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., October, 2024
Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries.
Wirel. Networks, August, 2024
Wirel. Networks, August, 2024
A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing.
IEEE Internet Things J., April, 2024
Inf. Sci., January, 2024
IEEE Internet Things J., January, 2024
Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation.
IEEE Internet Things J., January, 2024
IEEE Trans. Sustain. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems.
IEEE Trans. Emerg. Top. Comput., 2024
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024
Future Gener. Comput. Syst., 2024
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud.
Future Gener. Comput. Syst., 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme.
Ad Hoc Networks, 2024
GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
2023
J. Inf. Secur. Appl., December, 2023
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023
A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data.
World Wide Web (WWW), September, 2023
A non-invasive method for the cataloguing and authentication of surveillance video using on-camera blockchain participation, machine learning and signal analysis.
Forensic Sci. Int. Digit. Investig., September, 2023
Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition.
IEEE Trans. Knowl. Data Eng., July, 2023
Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain.
IEEE Trans. Ind. Informatics, July, 2023
Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023
Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2023
Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques.
IEEE Trans. Dependable Secur. Comput., 2023
Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat.
IEEE Internet Things J., 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
Proceedings of the 2023 Australasian Computer Science Week, 2023
2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
ACM Trans. Internet Techn., 2022
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Netw., 2022
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization.
J. Comput. Secur., 2022
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., 2022
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Informatics, 2022
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions.
IACR Cryptol. ePrint Arch., 2022
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home.
IACR Cryptol. ePrint Arch., 2022
Ancestral Colorings of Perfect Binary Trees With Applications in Private Retrieval of Merkle Proofs.
CoRR, 2022
Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures.
CoRR, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code.
IEEE J. Biomed. Health Informatics, 2021
A distributed networked system for secure publicly verifiable self-tallying online voting.
Inf. Sci., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Collusion-resistant protocols for private processing of aggregated queries in distributed databases.
Distributed Parallel Databases, 2021
Comput. J., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive User Profile Data.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Proceedings of the Computer Security - ESORICS 2021, 2021
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Broadband Communications, Networks, and Systems, 2021
2020
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud.
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Knowl. Data Eng., 2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Secur. Commun. Networks, 2020
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption.
J. Parallel Distributed Comput., 2020
J. Netw. Comput. Appl., 2020
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities.
Future Gener. Comput. Syst., 2020
Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption.
Eng. Appl. Artif. Intell., 2020
A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.
IEEE Access, 2020
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020
Proceedings of the Australasian Computer Science Week, 2020
Proceedings of the Australasian Computer Science Week, 2020
2019
Veh. Commun., 2019
IEEE Trans. Big Data, 2019
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.
Secur. Commun. Networks, 2019
Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Knowl. Based Syst., 2019
面向云环境的多关键词密文排序检索研究综述 (Research on Multi-keyword Ranked Search over Encrypted Cloud Data).
计算机科学, 2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019
Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
J. Parallel Distributed Comput., 2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Int. J. Inf. Manag., 2019
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection.
Future Gener. Comput. Syst., 2019
Electron. Commer. Res., 2019
Concurr. Comput. Pract. Exp., 2019
An efficient privacy-preserving protocol for database-driven cognitive radio networks.
Ad Hoc Networks, 2019
An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Access, 2019
Proceedings of the Network and Parallel Computing, 2019
Proceedings of the 2019 IFIP Networking Conference, 2019
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019
A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
IEEE Trans. Parallel Distributed Syst., 2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018
Secur. Commun. Networks, 2018
计算机科学, 2018
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller.
J. Discrete Algorithms, 2018
IACR Cryptol. ePrint Arch., 2018
A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018
Comput. Methods Programs Biomed., 2018
A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
IEEE Access, 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018
Proceedings of the IECON 2018, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data.
Secur. Commun. Networks, 2017
Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Netw. Comput. Appl., 2017
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
J. Comput. Syst. Sci., 2017
Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
IET Wirel. Sens. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation.
Future Gener. Comput. Syst., 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the Provable Security, 2017
Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller.
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
IEEE Trans. Dependable Secur. Comput., 2016
J. Inf. Secur. Appl., 2016
VP<sup>2</sup>RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016
Concurr. Comput. Pract. Exp., 2016
IEEE Cloud Comput., 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IEEE Cloud Comput., 2015
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the 11th International Conference on Natural Computation, 2015
Proceedings of the 11th International Conference on Natural Computation, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12229-8, 2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02337-8, 2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Circuits Syst. II Express Briefs, 2013
Equally contributory privacy-preserving k-means clustering over vertically partitioned data.
Inf. Syst., 2013
IEICE Electron. Express, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
IEEE Trans. Dependable Secur. Comput., 2012
Executing SQL queries over encrypted character strings in the Database-As-Service model.
Knowl. Based Syst., 2012
Data Knowl. Eng., 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Identity-based Password-Authenticated Key Exchange for Client/Server Model.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
2011
Web Intell. Agent Syst., 2011
J. Supercomput., 2011
Int. J. Inf. Secur. Priv., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Three-party Password-authenticated Key Exchange without Random Oracles.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011
Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the Electronic Government and the Information Systems Perspective, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
2010
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices
CoRR, 2010
Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010
2009
Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers.
Inf. Syst., 2009
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009
2008
Secur. Commun. Networks, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Data Knowl. Eng., 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
IEEE Trans. Circuits Syst. II Express Briefs, 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
2003
IEEE Trans. Wirel. Commun., 2003
IEEE Trans. Veh. Technol., 2003
IEEE Trans. Veh. Technol., 2003
IEEE Trans. Syst. Man Cybern. Part A, 2003
Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy.
IEEE Trans. Knowl. Data Eng., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2002
IEEE Trans. Consumer Electron., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
2001
Proceedings of the E-Commerce Agents, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments.
Distributed Parallel Databases, 2000
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000
1999
Author's reply to "comments on an optimized protocol for mobile network authentication and security".
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Mobile Networks and Computing, 1999
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999
1998
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998
Proceedings of the Multi-Agent Systems: Theories, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the 16th International Conference on Computer Safety, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the Concurrency and Parallelism, 1996