关注
Xu Ma
Xu Ma
Qufu Normal University & Xidian University
在 xidian.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Privacy preserving multi-party computation delegation for deep learning in cloud computing
X Ma, F Zhang, X Chen, J Shen
Information Sciences 459, 103-116, 2018
1112018
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes
J Li, X Kuang, S Lin, X Ma, Y Tang
Information Sciences 526, 166-179, 2020
1062020
Outsourcing computation of modular exponentiations in cloud computing
X Ma, J Li, F Zhang
Cluster computing 16, 787-796, 2013
642013
Non-interactive privacy-preserving neural network prediction
X Ma, X Chen, X Zhang
Information Sciences 481, 507-519, 2019
592019
AEMDA: inferring miRNA–disease associations based on deep autoencoder
C Ji, Z Gao, X Ma, Q Wu, J Ni, C Zheng
Bioinformatics 37 (1), 66-72, 2021
522021
Differentially private byzantine-robust federated learning
X Ma, X Sun, Y Wu, Z Liu, X Chen, C Dong
IEEE Transactions on Parallel and Distributed Systems 33 (12), 3690-3701, 2022
352022
Privacy-preserving byzantine-robust federated learning
X Ma, Y Zhou, L Wang, M Miao
Computer Standards & Interfaces 80, 103561, 2022
302022
Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things
XM Qi Liu, Ruichao Mo, Xiaolong Xu
Wireless Networks, 2020
302020
Trusted data sharing with flexible access control based on blockchain
X Ma, C Wang, X Chen
Computer Standards & Interfaces 78, 103543, 2021
282021
Secure multiparty learning from the aggregation of locally trained models
X Ma, C Ji, X Zhang, J Wang, J Li, KC Li, X Chen
Journal of Network and Computer Applications 167, 102754, 2020
252020
Efficient computation outsourcing for inverting a class of homomorphic functions
F Zhang, X Ma, S Liu
Information Sciences 286, 19-28, 2014
222014
Oblivious transfer with timed-release receiver’s privacy
X Ma, L Xu, F Zhang
Journal of Systems and Software 84 (3), 460-464, 2011
172011
Misleading attention and classification: an adversarial attack to fool object detection models in the real world
H Zhang, X Ma
Computers & Security 122, 102876, 2022
122022
Efficient and secure batch exponentiations outsourcing in cloud computing
X Ma, J Li, F Zhang
2012 Fourth International Conference on Intelligent Networking and …, 2012
122012
Quantum-based feature selection for multiclassification problem in complex systems with edge computing
W Liu, J Chen, Y Wang, P Gao, Z Lei, X Ma
Complexity 2020, 1-12, 2020
112020
The data sharing scheme based on blockchain
X Ma, C Wang, L Wang
Proceedings of the 2nd ACM International Symposium on Blockchain and Secure …, 2020
52020
A Survey on Secure Outsourced Deep Learning
X Ma, X Zhang, C Dong, X Chen
Cyber Security Meets Machine Learning, 129-163, 2021
42021
Quality assessment for DIBR-synthesized images with local and global distortions
L Wang, Y Zhao, X Ma, S Qi, W Yan, H Chen
IEEE Access 8, 27938-27948, 2020
42020
Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing.
X Ma, J Li, F Zhang
Int. J. Netw. Secur. 17 (6), 743-753, 2015
42015
Verifiable evaluation of private polynomials
X Ma, F Zhang, J Li
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
42013
系统目前无法执行此操作,请稍后再试。
文章 1–20