Lei Xu
Cited by
Cited by
The right to be forgotten in federated learning: An efficient realization with rapid retraining
Y Liu, L Xu, X Yuan, C Wang, B Li
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1749-1758, 2022
Hardening database padding for searchable encryption
L Xu, X Yuan, C Wang, Q Wang, C Xu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2503-2511, 2019
Forward and backward private DSSE for range queries
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk, L Xu
IEEE Transactions on Dependable and Secure Computing 19 (1), 328-338, 2022
Building a dynamic searchable encrypted medical database for multi-client
L Xu, C Xu, JK Liu, C Zuo, P Zhang
Information Sciences 527, 394-405, 2020
Multi-writer searchable encryption: An LWE-based realization and implementation
L Xu, X Yuan, R Steinfeld, C Wang, C Xu
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Enabling authorized encrypted search for multi-authority medical databases
L Xu, S Sun, X Yuan, JK Liu, C Zuo, C Xu
IEEE Transactions on Emerging Topics in Computing 9 (1), 534 - 546, 2021
Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption
L Xu, H Duan, A Zhou, X Yuan, C Wang
IEEE Transactions on Information Forensics and Security 16, 5310-5325, 2021
Enabling comparable search over encrypted data for IoT with privacy-preserving
L Xu, C Xu, Z Liu, Y Wang, J Wang
Computers, Materials & Continua 60 (2), 675-690, 2019
Toward a secure, rich, and fair query service for light clients on public blockchains
C Cai, L Xu, A Zhou, C Wang
IEEE Transactions on Dependable and Secure Computing 19 (6), 3640-3655, 2021
Towards efficient cryptographic data validation service in edge computing
L Xu, X Yuan, Z Zhou, C Wang, C Xu
IEEE Transactions on Services Computing 16 (1), 656 - 669, 2023
Verifiable identity-based encryption with keyword search for IoT from lattice
L Mei, C Xu, L Xu, X Yu, C Zuo
Comput. Mater. Contin 68, 2299-2314, 2021
EncELC: Hardening and enriching ethereum light clients with trusted enclaves
C Cai, L Xu, A Zhou, R Wang, C Wang, Q Wang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1887-1896, 2020
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
M Han, P Xu, L Xu, C Xu
Peer-to-Peer Networking and Applications 16 (1), 156-169, 2023
Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack.
X Yu, C Xu, L Xu, Y Wang
Computers, Materials & Continua 64 (2), 2020
Boomerang:{Metadata-Private} Messaging under Hardware Trust
P Jiang, Q Wang, J Cheng, C Wang, L Xu, X Wang, Y Wu, X Li, K Ren
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
A multi-client dynamic searchable symmetric encryption system with physical deletion
L Xu, C Xu, JK Liu, C Zuo, P Zhang
Information and Communications Security: 19th International Conference …, 2018
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption
L Xu, L Zheng, C Xu, X Yuan, C Wang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications
J Liu, C Chen, Y Qu, S Yang, L Xu
ISA transactions 141, 20-29, 2023
Peba: Enhancing user privacy and coverage of safe browsing services
Y Du, H Duan, L Xu, H Cui, C Wang, Q Wang
IEEE Transactions on Dependable and Secure Computing, 2022
Lattice-based searchable encryption with keywords revocable and bounded trapdoor exposure resistance
X Yu, C Xu, L Xu
IEEE Access 7, 43179-43189, 2019
The system can't perform the operation now. Try again later.
Articles 1–20