default search action
Xun Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j143]Nazatul Haque Sultan, Shabnam Kasra Kermanshahi, Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi:
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme. Ad Hoc Networks 158: 103478 (2024) - [j142]Huiqing Wang, Yongrong Huang, Zhide Chen, Xu Yang, Xun Yi, Hai Dong, Xuechao Yang:
Estimation of realized volatility of cryptocurrencies using CEEMDAN-RF-LSTM. Future Gener. Comput. Syst. 158: 219-229 (2024) - [j141]Yuanlong Liu, Hua Dai, Qian Zhou, Pengyue Li, Xun Yi, Geng Yang:
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud. Future Gener. Comput. Syst. 159: 1-14 (2024) - [j140]Shehan Edirimannage, Charitha Elvitigala, Ibrahim Khalil, Primal Wijesekera, Xun Yi:
QARMA-FL: Quality-Aware Robust Model Aggregation for Mobile Crowdsourcing. IEEE Internet Things J. 11(2): 1800-1815 (2024) - [j139]Hui Cui, Xun Yi:
Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation. IEEE Internet Things J. 11(2): 3662-3670 (2024) - [j138]Zhiqiang Ruan, Xu Yang, Haibo Luo, Xuechao Yang, Yuan Miao, Xinyi Huang, Xun Yi:
A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing. IEEE Internet Things J. 11(8): 13393-13410 (2024) - [j137]Fei Zhu, Duan Guo, Sharif Abuadbba, Xun Yi, Junwei Luo, Saru Kumari, Tao Peng:
Lightweight Verifiable Privacy-Preserving Data Aggregation for Smart Grids. IEEE Internet Things J. 11(19): 31249-31259 (2024) - [j136]Shabnam Kasra Kermanshahi, Ron Steinfeld, Xun Yi, Joseph K. Liu, Surya Nepal, Junwei Lou:
Fast and private multi-dimensional range search over encrypted data. Inf. Sci. 652: 119773 (2024) - [j135]Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. IEEE Trans. Dependable Secur. Comput. 21(2): 789-803 (2024) - [j134]Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi:
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems. IEEE Trans. Emerg. Top. Comput. 12(1): 269-280 (2024) - [j133]Xu Yang, Xuechao Yang, Junwei Luo, Xun Yi, Ibrahim Khalil, Shangqi Lai, Wei Wu, Albert Y. Zomaya:
Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System. IEEE Trans. Sustain. Comput. 9(1): 88-99 (2024) - [j132]Xuechao Yang, Andrei Kelarev, Xun Yi:
Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries. Wirel. Networks 30(6): 4749-4759 (2024) - [j131]Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang:
An efficient privacy-preserving recommender system in wireless networks. Wirel. Networks 30(6): 4949-4960 (2024) - [c115]Chengkun He, Xiangmin Zhou, Chen Wang, Iqbal Gondal, Jie Shao, Xun Yi:
Online Anomaly Detection over Live Social Video Streaming. ICDE 2024: 4760-4772 - [c114]Zhibo Xu, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Xingliang Yuan, Xun Yi:
OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural Network. USENIX Security Symposium 2024 - [c113]Ziqi Wang, Xiaoyu Xia, Minhui Xue, Ibrahim Khalil, Minghui Liwang, Xun Yi:
GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing. WWW 2024: 2735-2746 - [i37]Chengkun He, Xiangmin Zhou, Chen Wang, Iqbal Gondal, Jie Shao, Xun Yi:
Online Anomaly Detection over Live Social Video Streaming. CoRR abs/2401.08615 (2024) - [i36]Tao Huang, Ziyang Chen, Jiayang Meng, Qingyu Huang, Xu Yang, Xun Yi, Ibrahim Khalil:
Machine Unlearning with Minimal Gradient Dependence for High Unlearning Ratios. CoRR abs/2406.16986 (2024) - [i35]Quang Cao, Katerina Vgena, Aikaterini-Georgia Mavroeidi, Christos Kalloniatis, Xun Yi, Son Hoang Dau:
Architecture for Protecting Data Privacy in Decentralized Social Networks. CoRR abs/2409.18360 (2024) - 2023
- [j130]Michael Kerr, Fengling Han, Xun Yi, Andrei Kelarev, Ron G. van Schyndel:
A non-invasive method for the cataloguing and authentication of surveillance video using on-camera blockchain participation, machine learning and signal analysis. Forensic Sci. Int. Digit. Investig. 46: 301573 (2023) - [j129]Ziaur Rahman, Xun Yi, Ibrahim Khalil:
Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat. IEEE Internet Things J. 10(8, April 15): 6769-6778 (2023) - [j128]Hui Cui, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi:
Password-authenticated proofs of retrievability for multiple devices checking cloud data. J. Inf. Secur. Appl. 75: 103480 (2023) - [j127]Junwei Luo, Xuechao Yang, Xun Yi, Fengling Han:
Privacy-preserving recommendation system based on user classification. J. Inf. Secur. Appl. 79: 103630 (2023) - [j126]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques. IEEE Trans. Dependable Secur. Comput. 20(1): 620-636 (2023) - [j125]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. IEEE Trans. Dependable Secur. Comput. 20(2): 988-1001 (2023) - [j124]Neda Bugshan, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Shahriar Badsha:
Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1535-1547 (2023) - [j123]Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things. IEEE Trans. Ind. Informatics 19(2): 1703-1714 (2023) - [j122]Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi:
Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain. IEEE Trans. Ind. Informatics 19(7): 7936-7945 (2023) - [j121]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Xinyi Huang, Feihong Xu:
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(10): 10456-10466 (2023) - [j120]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Xun Yi:
Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition. IEEE Trans. Knowl. Data Eng. 35(7): 7341-7356 (2023) - [j119]Hui Cui, Xuechao Yang, Wencheng Yang, Baodong Qin, Xun Yi:
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks. IEEE Trans. Netw. Sci. Eng. 10(4): 2347-2357 (2023) - [j118]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT. IEEE Trans. Sustain. Comput. 8(1): 32-42 (2023) - [j117]Qian Zhou, Hua Dai, Yuanlong Liu, Geng Yang, Xun Yi, Zheng Hu:
A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data. World Wide Web (WWW) 26(5): 3055-3079 (2023) - [c112]Junwei Luo, Xuechao Yang, Xun Yi, Fengling Han, Iqbal Gondal, Guang-Bin Huang:
A Comparative Study on Design and Usability of Cryptographic Libraries. ACSW 2023: 102-111 - [c111]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal:
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System. ASSS@AsiaCCS 2023: 3:1-3:11 - [c110]Quang Cao, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah:
Committed Private Information Retrieval. ESORICS (1) 2023: 393-413 - [c109]Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-Enclave Time Series Processing System. ICICS 2023: 719-737 - [c108]Yinfu Deng, Hua Dai, Yuanlong Liu, Zhangchen Li, Geng Yang, Xun Yi:
TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted Data. ICPADS 2023: 2320-2327 - [i34]Quang Cao, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah:
Committed Private Information Retrieval. CoRR abs/2302.01733 (2023) - [i33]Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things. CoRR abs/2304.12889 (2023) - [i32]Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
SMPC-based Federated Learning for 6G enabled Internet of Medical Things. CoRR abs/2304.13352 (2023) - [i31]Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi:
Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems. CoRR abs/2304.13360 (2023) - [i30]Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi:
Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain. CoRR abs/2305.09209 (2023) - [i29]Nazatul Haque Sultan, Shabnam Kasra Kermanshahi, Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi:
A Multi-Client Searchable Encryption Scheme for IoT Environment. CoRR abs/2305.09221 (2023) - [i28]Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi:
TimeClave: Oblivious In-enclave Time series Processing System. CoRR abs/2306.16652 (2023) - [i27]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal:
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System. CoRR abs/2308.09237 (2023) - 2022
- [j116]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Forward-Secure Edge Authentication for Graphs. Comput. J. 65(7): 1653-1665 (2022) - [j115]Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil:
Social Media Identity Deception Detection: A Survey. ACM Comput. Surv. 54(3): 69:1-69:35 (2022) - [j114]Xuechao Yang, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, Joe Ryan:
Protecting Private Information for Two Classes of Aggregated Database Queries. Informatics 9(3): 66 (2022) - [j113]Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal:
Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet Things J. 9(5): 3321-3332 (2022) - [j112]Kwok-Yan Lam, Sananda Mitra, Florian Gondesen, Xun Yi:
ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities. IEEE Internet Things J. 9(8): 5895-5908 (2022) - [j111]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang, Xingfu Yan:
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks. IEEE Internet Things J. 9(14): 12209-12218 (2022) - [j110]Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j109]Fei Zhu, Feihong Xu, Xu Yang, Xun Yi, Alsharif Abuadbba:
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments. Inf. Process. Lett. 173: 106170 (2022) - [j108]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. J. Comput. Secur. 30(6): 795-827 (2022) - [j107]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai:
Range search on encrypted spatial data with dynamic updates. J. Comput. Secur. 30(6): 829-849 (2022) - [j106]Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things. IEEE Netw. 36(4): 182-189 (2022) - [j105]Xiaoning Liu, Yifeng Zheng, Xun Yi, Surya Nepal:
Privacy-Preserving Collaborative Analytics on Medical Time Series Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1687-1702 (2022) - [j104]Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. IEEE Trans. Inf. Forensics Secur. 17: 237-252 (2022) - [j103]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Xun Yi:
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs. IEEE Trans. Inf. Forensics Secur. 17: 3179-3194 (2022) - [j102]Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. ACM Trans. Internet Techn. 22(3): 57:1-57:25 (2022) - [j101]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. IEEE Trans. Serv. Comput. 15(5): 2728-2741 (2022) - [c107]Fei Zhu, Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang:
Efficient Hash-Based Redactable Signature for Smart Grid Applications. ESORICS (3) 2022: 554-573 - [c106]Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang, Xu Yang:
An Efficient Clustering-Based Privacy-Preserving Recommender System. NSS 2022: 387-405 - [i26]Ziaur Rahman, Xun Yi, Ibrahim Khalil:
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat. CoRR abs/2201.12727 (2022) - [i25]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022) - [i24]Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Akter Sumi, Adnan Anwar:
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. CoRR abs/2203.16124 (2022) - [i23]Md Tamjid Hossain, Shahriar Badsha, Hung M. La, Haoting Shen, Shafkat Islam, Ibrahim Khalil, Xun Yi:
Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures. CoRR abs/2204.02654 (2022) - [i22]Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. CoRR abs/2205.00384 (2022) - [i21]Quang Cao, Rinaldo Gagiano, Duy Huynh, Xun Yi, Son Hoang Dau, Phuc Lu Le, Quang-Hung Luu, Emanuele Viterbo, Yu-Chih Huang, Jingge Zhu, Mohammad M. Jalalzai, Chen Feng:
Ancestral Colorings of Perfect Binary Trees With Applications in Private Retrieval of Merkle Proofs. CoRR abs/2205.05211 (2022) - [i20]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Xun Yi:
Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition. CoRR abs/2206.09388 (2022) - [i19]Ziaur Rahman, Xun Yi, Ibrahim Khalil:
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat. IACR Cryptol. ePrint Arch. 2022: 114 (2022) - [i18]Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Akter Sumi, Adnan Anwar:
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. IACR Cryptol. ePrint Arch. 2022: 410 (2022) - [i17]Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. IACR Cryptol. ePrint Arch. 2022: 504 (2022) - [i16]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization. IACR Cryptol. ePrint Arch. 2022: 899 (2022) - 2021
- [j100]Hui Cui, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi:
Two-Factor Decryption: A Better Way to Protect Data Security and Privacy. Comput. J. 64(4): 550-563 (2021) - [j99]Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman:
Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System. IEEE Commun. Mag. 59(5): 128-134 (2021) - [j98]Leanne Rylands, Jennifer Seberry, Xun Yi, Andrei Kelarev, Joe Ryan, Yuqing Lin:
Collusion-resistant protocols for private processing of aggregated queries in distributed databases. Distributed Parallel Databases 39(1): 97-127 (2021) - [j97]Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT. IEEE Internet Things J. 8(14): 11678-11689 (2021) - [j96]Xuechao Yang, Xun Yi, Andrei Kelarev, Fengling Han, Junwei Luo:
A distributed networked system for secure publicly verifiable self-tallying online voting. Inf. Sci. 543: 125-142 (2021) - [j95]Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi:
Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code. IEEE J. Biomed. Health Informatics 25(1): 35-46 (2021) - [j94]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [c105]Junwei Luo, Xuechao Yang, Xun Yi, Fengling Han, Andrei Kelarev:
Efficient Privacy-Preserving User Matching with Intel SGX. BROADNETS 2021: 92-111 - [c104]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi:
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy. ESORICS (2) 2021: 24-43 - [c103]Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service. ESORICS (1) 2021: 519-541 - [c102]Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara:
Privacy-Aware Identity Cloning Detection Based on Deep Forest. ICSOC 2021: 415-430 - [c101]Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara:
NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive User Profile Data. ICWS 2021: 618-628 - [c100]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [c99]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. QSHINE 2021: 57-74 - [c98]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi:
Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. QSHINE 2021: 177-193 - [c97]Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang:
A Usability Study of Cryptographic API Design. QSHINE 2021: 194-213 - [c96]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. SERVICES 2021: 11 - [c95]Xuechao Yang, Xun Yi, Andrei Kelarev:
Secure Ranked Choice Online Voting System via Intel SGX and Blockchain. TrustCom 2021: 139-146 - [e3]Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tran:
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 402, Springer 2021, ISBN 978-3-030-91423-3 [contents] - [i15]Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil:
Social Media Identity Deception Detection: A Survey. CoRR abs/2103.04673 (2021) - [i14]Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman:
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System. CoRR abs/2106.13339 (2021) - [i13]Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara:
NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive User Profile Data. CoRR abs/2109.15179 (2021) - [i12]Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara:
Privacy-Aware Identity Cloning Detection based on Deep Forest. CoRR abs/2110.10897 (2021) - [i11]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. CoRR abs/2111.11158 (2021) - [i10]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi:
Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security. CoRR abs/2111.11161 (2021) - [i9]Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman:
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System. IACR Cryptol. ePrint Arch. 2021: 1515 (2021) - [i8]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. IACR Cryptol. ePrint Arch. 2021: 1551 (2021) - 2020
- [j93]Hua Dai, Yan Ji, Geng Yang, Haiping Huang, Xun Yi:
A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds. IEEE Access 8: 4895-4907 (2020) - [j92]Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi:
Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption. Eng. Appl. Artif. Intell. 94: 103737 (2020) - [j91]Xuechao Yang, Xun Yi, Surya Nepal, Andrei Kelarev, Fengling Han:
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities. Future Gener. Comput. Syst. 112: 859-874 (2020) - [j90]Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil:
Lightweight privacy preservation for secondary users in cognitive radio networks. J. Netw. Comput. Appl. 162: 102652 (2020) - [j89]Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi:
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. J. Parallel Distributed Comput. 137: 192-204 (2020) - [j88]Hua Dai, Xuelong Dai, Xiao Li, Xun Yi, Fu Xiao, Geng Yang:
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Secur. Commun. Networks 2020: 7307315:1-7307315:15 (2020) - [j87]Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K. Liu, Xun Yi:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Trans. Dependable Secur. Comput. 17(6): 1207-1217 (2020) - [j86]Hui Cui, Zhiguo Wan, Xinlei Wei, Surya Nepal, Xun Yi:
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 3227-3238 (2020) - [j85]Xun Yi, Elisa Bertino, Fang-Yu Rao, Kwok-Yan Lam, Surya Nepal, Athman Bouguettaya:
Privacy-Preserving User Profile Matching in Social Networks. IEEE Trans. Knowl. Data Eng. 32(8): 1572-1585 (2020) - [j84]Abdulatif Alabdulatif, Ibrahim Khalil, Albert Y. Zomaya, Zahir Tari, Xun Yi:
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud. IEEE Trans. Parallel Distributed Syst. 31(11): 2668-2681 (2020) - [c94]Junwei Luo, Xuechao Yang, Xun Yi:
SGX-based Users Matching with Privacy Protection. ACSW 2020: 4:1-4:9 - [c93]Nasrin Sohrabi, Xun Yi, Zahir Tari, Ibrahim Khalil:
BACC: Blockchain-Based Access Control For Cloud Data. ACSW 2020: 10:1-10:10 - [c92]Zezhong Wang, Xiangmin Zhou, Yuliang Ma, Xun Yi:
Online Community Identification over Heterogeneous Attributed Directed Graphs. ADMA 2020: 266-280 - [c91]Xun Yi, Russell Paulet, Elisa Bertino, Fang-Yu Rao:
Practical Anonymous Subscription with Revocation Based on Broadcast Encryption. ICDE 2020: 241-252 - [c90]Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang:
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments. ProvSec 2020: 145-165 - [i7]Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. IACR Cryptol. ePrint Arch. 2020: 463 (2020)
2010 – 2019
- 2019
- [j83]Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi, Mohsen Guizani:
Secure Edge of Things for Smart Healthcare Surveillance Framework. IEEE Access 7: 31010-31021 (2019) - [j82]Xuelong Dai, Hua Dai, Geng Yang, Xun Yi, Haiping Huang:
An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Access 7: 142855-142865 (2019) - [j81]Yali Zeng, Li Xu, Xu Yang, Xun Yi:
An efficient privacy-preserving protocol for database-driven cognitive radio networks. Ad Hoc Networks 90 (2019) - [j80]Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng:
A new privacy-preserving authentication protocol for anonymous web browsing. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j79]Lynn Batten, Xun Yi:
Off-line digital cash schemes providing untraceability, anonymity and change. Electron. Commer. Res. 19(1): 81-110 (2019) - [j78]Andrei Kelarev, Xun Yi, Shahriar Badsha, Xuechao Yang, Leanne Rylands, Jennifer Seberry:
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection. Future Gener. Comput. Syst. 90: 368-380 (2019) - [j77]Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi:
A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems. Int. J. Inf. Manag. 45: 276-288 (2019) - [j76]Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil:
Privacy-preserving aggregation for cooperative spectrum sensing. J. Netw. Comput. Appl. 140: 54-64 (2019) - [j75]Hua Dai, Xuelong Dai, Xun Yi, Geng Yang, Haiping Huang:
Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147 (2019) - [j74]Abdulatif Alabdulatif, Ibrahim Khalil, Heshan Kumarage, Albert Y. Zomaya, Xun Yi:
Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities. J. Parallel Distributed Comput. 127: 209-223 (2019) - [j73]Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [j72]Hua Dai, Xiao Li, Xiangyang Zhu, Geng Yang, Xun Yi:
面向云环境的多关键词密文排序检索研究综述 (Research on Multi-keyword Ranked Search over Encrypted Cloud Data). 计算机科学 46(1): 6-12 (2019) - [j71]Mohammad Saidur Rahman, Ibrahim Khalil, Abdulatif Alabdulatif, Xun Yi:
Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform. Knowl. Based Syst. 180: 104-115 (2019) - [j70]Rui Zhu, Li Xu, Yali Zeng, Xun Yi:
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. Secur. Commun. Networks 2019: 9126376:1-9126376:12 (2019) - [j69]Arezou Soltani Panah, Ali Yavari, Ron G. van Schyndel, Dimitrios Georgakopoulos, Xun Yi:
Context-Driven Granular Disclosure Control for Internet of Things Applications. IEEE Trans. Big Data 5(3): 408-422 (2019) - [j68]Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui:
A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun. 15: 16-27 (2019) - [c89]Mohammad Saidur Rahman, Ibrahim Khalil, Mahawaga Arachchige Pathum Chamikara, Abdelaziz Bouras, Xun Yi:
A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper. BSCI 2019: 97-105 - [c88]Xun Yi, Kwok-Yan Lam:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. AsiaCCS 2019: 613-620 - [c87]Xun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao:
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation. ESORICS (2) 2019: 387-411 - [c86]Xiaoning Liu, Xun Yi:
Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping. ESORICS (2) 2019: 439-460 - [c85]Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Tao Gu:
A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud. HICSS 2019: 1-10 - [c84]Jingjing Bao, Hua Dai, Maohu Yang, Xun Yi, Geng Yang, Liang Liu:
PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. ICA3PP (2) 2019: 496-511 - [c83]Hua Dai, Yan Ji, Liang Liu, Geng Yang, Xun Yi:
A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds. ICAIS (3) 2019: 68-80 - [c82]Nasser Alzahrani, Ibrahim Khalil, Xun Yi:
ADS4all: Democratizing Authenticated Data Structures. ICSOC Workshops 2019: 280-286 - [c81]Hua Dai, Yan Ji, Fu Xiao, Geng Yang, Xun Yi, Lei Chen:
Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service. Networking 2019: 1-9 - [c80]Maohu Yang, Hua Dai, Jingjing Bao, Xun Yi, Geng Yang:
A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data. NPC 2019: 169-181 - 2018
- [j67]Nasser R. Sabar, Xun Yi, Andy Song:
A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security. IEEE Access 6: 10421-10431 (2018) - [j66]Xuechao Yang, Xun Yi, Surya Nepal, Andrei Kelarev, Fengling Han:
A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption. IEEE Access 6: 20506-20519 (2018) - [j65]Hui Cui, Xun Yi, Surya Nepal:
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks. IEEE Access 6: 30049-30059 (2018) - [j64]Shahriar Badsha, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman:
Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking. IEEE Access 6: 42119-42130 (2018) - [j63]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam:
Privacy Preserving User Based Web Service Recommendations. IEEE Access 6: 56647-56657 (2018) - [j62]Jemal H. Abawajy, Andrei V. Kelarev, Xun Yi, Herbert F. Jelinek:
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN. Comput. Methods Programs Biomed. 160: 85-94 (2018) - [j61]Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal:
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Networks 133: 157-165 (2018) - [j60]Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78: 677-679 (2018) - [j59]Andrei Kelarev, Joe Ryan, Leanne Rylands, Jennifer Seberry, Xun Yi:
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller. J. Discrete Algorithms 52-53: 112-121 (2018) - [j58]Hua Dai, Jingjing Bao, Xiangyang Zhu, Xun Yi, Geng Yang:
面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds). 计算机科学 45(12): 92-97 (2018) - [j57]Hua Dai, Hui Ren, Zhiye Chen, Geng Yang, Xun Yi:
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds. Secur. Commun. Networks 2018: 2373545:1-2373545:10 (2018) - [j56]Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - [j55]Zubair Shah, Abdun Naser Mahmood, Michael Barlow, Zahir Tari, Xun Yi, Albert Y. Zomaya:
Computing Hierarchical Summary from Two-Dimensional Big Data Streams. IEEE Trans. Parallel Distributed Syst. 29(4): 803-818 (2018) - [c79]Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam, Xun Yi:
Using Blockchain to Control Access to Cloud Data. Inscrypt 2018: 274-288 - [c78]Yong Feng, Cheng Meng, Fengling Han, Xun Yi, Xinghuo Yu:
An Online Estimation Algorithm of State-of-Charge of Lithium-Ion Batteries. IECON 2018: 3879-3882 - [c77]Xun Yi, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials. MDM 2018: 187-196 - [c76]Xuechao Yang, Xun Yi, Surya Nepal, Fengling Han:
Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain. WISE (1) 2018: 18-35 - [c75]Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal:
An Improved Lightweight RFID Authentication Protocol for Internet of Things. WISE (1) 2018: 111-126 - [r1]Xun Yi:
Private Information Retrieval. Encyclopedia of Database Systems (2nd ed.) 2018 - [i6]Xun Yi, Kwok-Yan Lam, Dieter Gollmann:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. IACR Cryptol. ePrint Arch. 2018: 660 (2018) - 2017
- [j54]Hua Dai, Min Wang, Xun Yi, Geng Yang, Jingjing Bao:
Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks. IEEE Access 5: 14478-14489 (2017) - [j53]Prem Prakash Jayaraman, Xuechao Yang, Ali Yavari, Dimitrios Georgakopoulos, Xun Yi:
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation. Future Gener. Comput. Syst. 76: 540-549 (2017) - [j52]Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi:
Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. IET Wirel. Sens. Syst. 7(6): 182-190 (2017) - [j51]Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Xun Yi:
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J. Comput. Syst. Sci. 90: 28-45 (2017) - [j50]Zakaria Gheid, Yacine Challal, Xun Yi, Abdelouahid Derhab:
Efficient and privacy-aware multi-party classification protocol for human activity recognition. J. Netw. Comput. Appl. 98: 84-96 (2017) - [j49]Xiangyang Zhu, Hua Dai, Xun Yi, Geng Yang, Xiao Li:
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. Secur. Commun. Networks 2017: 1923476:1-1923476:17 (2017) - [c74]Hua Dai, Xiangyang Zhu, Geng Yang, Xun Yi:
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data. BigCom 2017: 111-116 - [c73]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino:
Privacy Preserving User-Based Recommender System. ICDCS 2017: 1074-1083 - [c72]Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, YaLi Zeng:
A Practical Authentication Protocol for Anonymous Web Browsing. ISPEC 2017: 468-482 - [c71]Andrei Kelarev, Jennifer Seberry, Leanne Rylands, Xun Yi:
Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller. IWOCA 2017: 383-394 - [c70]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Private Recommendations Generation for Vertically Partitioned Datasets. PACIS 2017: 163 - [c69]Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Hai Dong:
Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword. PACIS 2017: 230 - [c68]Abdulatif Alabdulatif, Ibrahim Khalil, Mark C. Reynolds, Heshan Kumarage, Xun Yi:
Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption. PACIS 2017: 289 - [c67]Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi:
Fuzzy Public-Key Encryption Based on Biometric Data. ProvSec 2017: 400-409 - [c66]Xuechao Yang, Xun Yi, Caspar Ryan, Ron G. van Schyndel, Fengling Han, Surya Nepal, Andy Song:
A Verifiable Ranked Choice Internet Voting System. WISE (2) 2017: 490-501 - [c65]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino:
Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516 - [e2]Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. ACM 2017, ISBN 978-1-4503-4944-4 [contents] - [i5]Lynn Batten, Xun Yi:
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change. IACR Cryptol. ePrint Arch. 2017: 1220 (2017) - 2016
- [j48]Heshan Kumarage, Ibrahim Khalil, Abdulatif Alabdulatif, Zahir Tari, Xun Yi:
Secure Data Analytics for Cloud-Integrated Internet of Things Applications. IEEE Cloud Comput. 3(2): 46-56 (2016) - [j47]Hua Wang, Xun Yi, Elisa Bertino, Lili Sun:
Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28(3): 600-615 (2016) - [j46]Shahriar Badsha, Xun Yi, Ibrahim Khalil:
A Practical Privacy-Preserving Recommender System. Data Sci. Eng. 1(3): 161-177 (2016) - [j45]Hua Dai, Qingqun Ye, Xun Yi, Ruiliang He, Geng Yang, Jinji Pan:
VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks. Int. J. Distributed Sens. Networks 12(11) (2016) - [j44]Feng Hao, Xun Yi, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. J. Inf. Secur. Appl. 27-28: 1-2 (2016) - [j43]Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya:
ID2S Password-Authenticated Key Exchange Protocols. IEEE Trans. Computers 65(12): 3687-3701 (2016) - [j42]Xun Yi, Athman Bouguettaya, Dimitrios Georgakopoulos, Andy Song, Jan Willemson:
Privacy Protection for Wireless Medical Sensor Data. IEEE Trans. Dependable Secur. Comput. 13(3): 369-380 (2016) - [j41]Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:
Private Cell Retrieval From Data Warehouses. IEEE Trans. Inf. Forensics Secur. 11(6): 1346-1361 (2016) - [j40]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. IEEE Trans. Knowl. Data Eng. 28(6): 1546-1559 (2016) - [c64]Xun Yi, Xuechao Yang, Yong Feng, Fengling Han, Ron G. van Schyndel:
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps. ACISP (1) 2016: 329-342 - [c63]Xun Yi, Elisa Bertino, Fang-Yu Rao, Athman Bouguettaya:
Practical privacy-preserving user profile matching in social networks. ICDE 2016: 373-384 - [c62]Xuechao Yang, Xun Yi, Ibrahim Khalil, Fengling Han, Zahir Tari:
Securing Body Sensor Network with ECG. MoMM 2016: 298-306 - 2015
- [j39]Zahir Tari, Xun Yi, Uthpala Subodhani Premarathne, Peter Bertók, Ibrahim Khalil:
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. IEEE Cloud Comput. 2(2): 30-38 (2015) - [c61]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c60]Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya:
Privacy-Preserving Association Rule Mining in Cloud Computing. AsiaCCS 2015: 439-450 - [c59]Fang-Yu Rao, Bharath K. Samanthula, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-user K-Means Clustering. CIC 2015: 80-89 - [c58]Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c57]Dongyang Wang, Junjie Wu, Xun Yi:
Optical quantum computing. ICNC 2015: 390-397 - [c56]Yong Liu, Junjie Wu, Xun Yi:
Quantum Boson-Sampling Machine. ICNC 2015: 398-404 - [c55]Nasser R. Sabar, Andy Song, Zahir Tari, Xun Yi, Albert Y. Zomaya:
A Memetic Algorithm for Dynamic Shortest Path Routing on Mobile Ad-hoc Networks. ICPADS 2015: 60-67 - [c54]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi:
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data. IRI 2015: 427-434 - [e1]Ian Welch, Xun Yi:
13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015. CRPIT 161, Australian Computer Society 2015, ISBN 978-1-921770-43-2 [contents] - [i4]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - 2014
- [b2]Xun Yi, Russell Paulet, Elisa Bertino:
Homomorphic Encryption and Applications. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-12228-1, pp. 1-126 - [j38]Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing:
Private Searching on Streaming Data Based on Keyword Frequency. IEEE Trans. Dependable Secur. Comput. 11(2): 155-167 (2014) - [j37]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino:
Privacy-Preserving and Content-Protecting Location Based Queries. IEEE Trans. Knowl. Data Eng. 26(5): 1200-1210 (2014) - [c53]Dongxi Liu, Elisa Bertino, Xun Yi:
Privacy of outsourced k-means clustering. AsiaCCS 2014: 123-134 - [c52]Guangyuan Wang, Hua Wang, Xiaohui Tao, Ji Zhang, Xun Yi, Jianming Yong:
Positive Influence Dominating Set Games. CSCWD 2014: 469-473 - [c51]Xun Yi, Feng Hao, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - [c50]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical k nearest neighbor queries with location privacy. ICDE 2014: 640-651 - [c49]Huiquan Wang, Junjie Wu, Xuejun Yang, Pingxing Chen, Xun Yi:
An Enhanced Quantum PageRank Algorithm Integrated with Quantum Search. IMIS 2014: 74-81 - [i3]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-User k-Means Clustering. CoRR abs/1412.4378 (2014) - 2013
- [b1]Xun Yi, Russell Paulet, Elisa Bertino:
Private Information Retrieval. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627051538, pp. 1-114 - [j36]Xuan Zhu, Chunqing Wu, Yuhua Tang, Junjie Wu, Xun Yi:
Multi-level programming of memristor in nanocrossbar. IEICE Electron. Express 10(5): 20130013 (2013) - [j35]Xuan Zhu, Xuejun Yang, Chunqing Wu, Junjie Wu, Xun Yi:
Hamming network circuits based on CMOS/memristor hybrid design. IEICE Electron. Express 10(12): 20130404 (2013) - [j34]Xun Yi, Yanchun Zhang:
Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf. Syst. 38(1): 97-107 (2013) - [j33]Xun Yi, Eiji Okamoto:
Practical Internet voting system. J. Netw. Comput. Appl. 36(1): 378-387 (2013) - [j32]Xuan Zhu, Xuejun Yang, Chunqing Wu, Nong Xiao, Junjie Wu, Xun Yi:
Performing Stateful Logic on Memristor Memory. IEEE Trans. Circuits Syst. II Express Briefs 60-II(10): 682-686 (2013) - [j31]Xun Yi, Md. Golam Kaosar, Russell Paulet, Elisa Bertino:
Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Trans. Knowl. Data Eng. 25(5): 1125-1134 (2013) - [j30]Xun Yi, San Ling, Huaxiong Wang:
Efficient Two-Server Password-Only Authenticated Key Exchange. IEEE Trans. Parallel Distributed Syst. 24(9): 1773-1782 (2013) - [c48]Russell Paulet, Xun Yi:
Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. AISC 2013: 25-30 - [c47]Xun Yi, Yuan Miao, Elisa Bertino, Jan Willemson:
Multiparty privacy protection for electronic health records. GLOBECOM 2013: 2730-2735 - [c46]Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:
Private data warehouse queries. SACMAT 2013: 25-36 - [c45]Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam, Xun Yi:
(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. SecureComm 2013: 380-392 - [c44]Xun Yi, Jan Willemson, Farid Naït-Abdesselam:
Privacy-Preserving Wireless Medical Sensor Network. TrustCom/ISPA/IUCC 2013: 118-125 - 2012
- [j29]Md. Golam Kaosar, Russell Paulet, Xun Yi:
Fully homomorphic encryption based two-party association rule mining. Data Knowl. Eng. 76: 1-15 (2012) - [j28]Zongda Wu, Guandong Xu, Yu Zong, Xun Yi, Enhong Chen, Yanchun Zhang:
Executing SQL queries over encrypted character strings in the Database-As-Service model. Knowl. Based Syst. 35: 332-348 (2012) - [j27]Xun Yi:
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Dependable Secur. Comput. 9(2): 303-304 (2012) - [c43]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino:
Privacy-Preserving and Content-Protecting Location Based Queries. ICDE 2012: 44-53 - [c42]Yu Zong, Guandong Xu, Ping Jin, Xun Yi, Enhong Chen, Zongda Wu:
A projective clustering algorithm based on significant local dense areas. IJCNN 2012: 1-8 - [c41]Xun Yi, Raylin Tso, Eiji Okamoto:
Identity-based Password-Authenticated Key Exchange for Client/Server Model. SECRYPT 2012: 45-54 - [c40]Xun Yi, Chaoping Xing:
Private (t, n) Threshold Searching on Streaming Data. SocialCom/PASSAT 2012: 676-683 - 2011
- [j26]Md. Golam Kaosar, Xun Yi:
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree. Int. J. Inf. Secur. Priv. 5(2): 13-32 (2011) - [j25]Raylin Tso, Xun Yi, Xinyi Huang:
Efficient and short certificateless signatures secure against realistic adversaries. J. Supercomput. 55(2): 173-191 (2011) - [j24]Guandong Xu, Lin Li, Yanchun Zhang, Xun Yi, Masaru Kitsuregawa:
Modeling user hidden navigational behavior for Web recommendation. Web Intell. Agent Syst. 9(3): 239-255 (2011) - [c39]Md. Golam Kaosar, Russell Paulet, Xun Yi:
Secure Two-Party Association Rule Mining. AISC 2011: 15-22 - [c38]Xun Yi, Eiji Okamoto:
Practical Remote End-to-End Voting Scheme. EGOVIS 2011: 386-400 - [c37]Md. Golam Kaosar, Russell Paulet, Xun Yi:
Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption. ICA3PP (1) 2011: 360-370 - [c36]Zhuojia Xu, Xun Yi:
Classification of Privacy-preserving Distributed Data Mining protocols. ICDIM 2011: 337-342 - [c35]Xun Yi, Raylin Tso, Eiji Okamoto:
Three-party Password-authenticated Key Exchange without Random Oracles. SECRYPT 2011: 15-24 - [c34]Xun Yi, Elisa Bertino:
Private searching for single and conjunctive keywords on streaming data. WPES 2011: 153-158 - 2010
- [j23]Xun Yi, Lynn Margaret Batten:
Wireless broadcast encryption based on smart cards. Wirel. Networks 16(1): 153-165 (2010) - [c33]Raylin Tso, Xun Yi, Tadahiko Ito, Takeshi Okamoto, Eiji Okamoto:
Design and Analysis of "Flexible" k-out-of-n Signatures. ATC 2010: 255-267 - [c32]Raylin Tso, Xun Yi:
Certificateless Proxy Signature and Its Extension to Blind Signature. NSS 2010: 542-547 - [c31]Xun Yi:
Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System. NSS 2010: 574-578 - [i2]Md. Golam Kaosar, Xun Yi:
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices. CoRR abs/1005.0940 (2010)
2000 – 2009
- 2009
- [j22]Xun Yi, Yanchun Zhang:
Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Inf. Syst. 34(3): 371-380 (2009) - [c30]Md. Golam Kaosar, Zhuojia Xu, Xun Yi:
Distributed Association Rule Mining with Minimum Communication Overhead. AusDM 2009: 17-24 - [c29]Xun Yi, Raylin Tso, Eiji Okamoto:
ID-Based Group Password-Authenticated Key Exchange. IWSEC 2009: 192-211 - 2008
- [j21]Lynn Margaret Batten, Xun Yi:
Efficient broadcast key distribution with dynamic revocation. Secur. Commun. Networks 1(4): 351-362 (2008) - [c28]Xun Yi, Mike Faulkner, Eiji Okamoto:
Secure Wireless Sensor Networks. ARES 2008: 497-502 - [c27]Raylin Tso, Xun Yi, Xinyi Huang:
Efficient and Short Certificateless Signature. CANS 2008: 64-79 - [c26]Guandong Xu, Yanchun Zhang, Xun Yi:
Modelling User Behaviour for Web Recommendation Using LDA Model. Web Intelligence/IAT Workshops 2008: 529-532 - [c25]Raylin Tso, Xun Yi, Takeshi Okamoto, Eiji Okamoto:
Efficient convertible Limited Verifier Signatures. ISIT 2008: 230-234 - 2007
- [j20]Xun Yi, Yanchun Zhang:
Privacy-preserving distributed association rule mining via semi-trusted mixer. Data Knowl. Eng. 63(2): 550-567 (2007) - [c24]Raylin Tso, Xun Yi, Eiji Okamoto:
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments. APSCC 2007: 103-110 - [c23]Xun Yi:
Directed Transitive Signature Scheme. CT-RSA 2007: 129-144 - [i1]Xun Yi, Raylin Tso, Eiji Okamoto:
ID-Based Group Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2007: 469 (2007) - 2006
- [c22]Xun Yi, Pietro Cerone:
Secure Electronic Voting for Mobile Communications. VTC Spring 2006: 836-840 - 2005
- [j19]Xun Yi:
Hash function based on chaotic tent maps. IEEE Trans. Circuits Syst. II Express Briefs 52-II(6): 354-357 (2005) - [j18]Xun Yi:
Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Knowl. Data Eng. 17(9): 1298-1299 (2005) - 2004
- [j17]Xun Yi:
Authenticated key agreement in dynamic peer groups. Theor. Comput. Sci. 326(1-3): 363-382 (2004) - [j16]Xun Yi:
Identity-Based Fault-Tolerant Conference Key Agreement. IEEE Trans. Dependable Secur. Comput. 1(3): 170-178 (2004) - 2003
- [j15]Xun Yi:
An identity-based signature scheme from the Weil pairing. IEEE Commun. Lett. 7(2): 76-78 (2003) - [j14]Chik How Tan, Xun Yi, Chee Kheong Siew:
On the n-th Order Shift Register Based Discrete Logarithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1213-1216 (2003) - [j13]Chik How Tan, Xun Yi, Chee Kheong Siew:
A New Provably Secure Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(10): 2633-2635 (2003) - [j12]Xun Yi, Yiming Ye:
Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. IEEE Trans. Knowl. Data Eng. 15(4): 1054-1055 (2003) - [j11]Yiming Ye, Xun Yi, Juhnyoung Lee:
Performance and attention in multiagent object search team. IEEE Trans. Syst. Man Cybern. Part A 33(2): 257-264 (2003) - [j10]Xun Yi, Chee Kheong Siew, Hung-Min Sun, Her-Tyan Yeh, Chun-Li Lin, Tzonelih Hwang:
Security of Park-Lim key agreement schemes for VSAT satellite communications. IEEE Trans. Veh. Technol. 52(2): 465-468 (2003) - [j9]Xun Yi, Chee Kheong Siew, Chik How Tan:
A secure and efficient conference scheme for mobile communications. IEEE Trans. Veh. Technol. 52(4): 784-793 (2003) - [j8]Xun Yi, Chee Kheong Siew, Chik How Tan, Yiming Ye:
A secure conference scheme for mobile communications. IEEE Trans. Wirel. Commun. 2(6): 1168-1177 (2003) - [c21]Chik How Tan, Xun Yi, Chee Kheong Siew:
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. ACISP 2003: 428-442 - 2002
- [j7]Chik How Tan, Xun Yi, Chee Kheong Siew:
New Signature Schemes Based on 3rd Order Shift Registers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 102-109 (2002) - [j6]Xun Yi, Chik How Tan, Chee Kheong Siew, Syed Mahbubur Rahman:
ID-based key agreement for multimedia encryption. IEEE Trans. Consumer Electron. 48(2): 298-303 (2002) - [j5]Xun Yi, Chee Kheong Siew:
Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. Veh. Technol. 51(6): 1313-1315 (2002) - [c20]Yiming Ye, Stephen J. Boies, Jiming Liu, Xun Yi:
Collective perception in massive, open, and heterogeneous multi-agent environment. AAMAS 2002: 1175-1182 - 2001
- [j4]Xun Yi, Chik How Tan, Chee Kheong Siew, Syed Mahbubur Rahman:
Fast encryption for multimedia. IEEE Trans. Consumer Electron. 47(1): 101-107 (2001) - [c19]Chik How Tan, Xun Yi, Chee Kheong Siew:
Signature Schemes Based on 3rd Order Shift Registers. ACISP 2001: 445-459 - [c18]Xun Yi, Chee Kheong Siew, Yuan Miao:
Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases. E-Commerce Agents 2001: 221-246 - 2000
- [j3]Xun Yi, Chee Kheong Siew, Xiao Feng Wang, Eiji Okamoto:
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments. Distributed Parallel Databases 8(1): 85-117 (2000) - [c17]Xun Yi, Chee Kheong Siew:
Software Agent-Mediated Confidential Information Gathering System. ICPADS 2000: 523-528 - [c16]Liu Yu, Chee Kheong Siew, Xun Yi, Yuan Miao:
Improving Object Oriented Analysis by Explicit Change Analysis. TOOLS (36) 2000: 2-7 - [c15]David Siew, Xun Yi:
Agent-Mediated Internet Advertising. WECWIS 2000: 102-108
1990 – 1999
- 1999
- [j2]Xun Yi:
Author's reply to "comments on an optimized protocol for mobile network authentication and security". ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(2): 38 (1999) - [c14]Yu Liu, Chee Kheong Siew, Xun Yi, Yuan Miao:
Improving Object Oriented Analysis by Explicit Change Analysis. APSEC 1999: 384-387 - [c13]Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto:
Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302 - [c12]Xun Yi, Shigeki Kitazawa, Hisao Sakazaki, Eiji Okamoto, D. Frank Hsu:
An agent-based architecture for securing mobile IP. Mobile Networks and Computing 1999: 303-314 - [c11]Shigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo:
Improvement of Secure Access Control Agent for Distributed Files. ICPP Workshops 1999: 185-191 - [c10]Xun Yi, S. Kitazawa, Eiji Okamoto, Xiao Feng Wang, Kwok-Yan Lam, S. Tu:
Agent-based copyright protection architecture for online electronic publishing. Security and Watermarking of Multimedia Contents 1999: 484-493 - 1998
- [j1]Xun Yi, Eiji Okamoto, Kwok-Yan Lam:
An optimized protocol for mobile network authentication and security. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2(3): 37-39 (1998) - [c9]Xun Yi, Kwok-Yan Lam, Yongfei Han:
Differential Cryptanalysis of a Block Cipher. ACISP 1998: 58-67 - [c8]Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto:
Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193 - [c7]Xun Yi, Xiao Feng Wang, Kwok-Yan Lam:
A Secure Intelligent Trade Agent System. Trends in Distributed Systems for Electronic Commerce 1998: 218-228 - [c6]Xiao Feng Wang, Kwok-Yan Lam, Xun Yi:
Secure Agent-Mediated Mobile Payment. PRIMA 1998: 162-173 - [c5]Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu:
A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203 - 1997
- [c4]Xun Yi, Kwok-Yan Lam:
A New Hash Function Based on Block Cipher. ACISP 1997: 139-146 - [c3]Xun Yi, Kwok-Yan Lam, Shixin Cheng, Xiaohu You:
A New Byte-Oriented Block Cipher. ISW 1997: 209-220 - [c2]Xun Yi, Kwork-Yan Lam, Yongfei Han:
Design, Analysis and Implementation of a New Hash Function Based on Block Cipher. SAFECOMP 1997: 148-157 - 1996
- [c1]Xun Yi:
On Design and Analysis of a New Block Cipher. ASIAN 1996: 213-222
Coauthor Index
aka: Sharif Abuadbba
aka: Andrei Kelarev
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint