Xingliang Yuan
Xingliang Yuan
Department of Software Systems and Cybersecurity, Faculty of IT, Monash University
Verified email at - Homepage
Cited by
Cited by
Federated learning for 6G communications: Challenges, methods, and future directions
Y Liu, X Yuan, Z Xiong, J Kang, X Wang, D Niyato
China Communications 17 (9), 105-118, 2020
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications K, 2018
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain K, 2021
Privacy-aware and efficient mobile crowdsensing with truth discovery
Y Zheng, H Duan, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 121-133, 2017
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
D Huayi, W Cong, X Yuan, Y Zhou, Q Wang, K Ren
26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019
Enabling reliable keyword search in encrypted decentralized storage with fairness
C Cai, J Weng, X Yuan, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 131-144, 2018
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining
Y Liu, L Xu, X Yuan, C Wang, B Li
IEEE Conference on Computer Communications (INFOCOM), 1749--1758, 2022
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
J Zhu, Q Li, C Wang, X Yuan, Q Wang, K Ren
IEEE Transactions on Parallel and Distributed Systems 29 (8), 1721-1735, 2018
Privacy-preserving deep packet inspection in outsourced middleboxes
X Yuan, X Wang, J Lin, C Wang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer K, 2016
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 988-1001, 2022
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy
SF Sun, R Steinfeld, S Lai, X Yuan, A Sakzad, JK Liu, S Nepal, D Gu
The Network and Distributed System Security Symposium (NDSS), 2021
Towards trustworthy and private keyword search in encrypted decentralized storage
C Cai, X Yuan, C Wang
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
Trustworthy Graph Neural Networks: Aspects, Methods, and Trends
H Zhang, B Wu, X Yuan, S Pan, H Tong, J Pei
Proceedings of the IEEE, 2024
Servedb: Secure, verifiable, and efficient range queries on outsourced database
S Wu, Q Li, G Li, D Yuan, X Yuan, C Wang
2019 IEEE 35th International Conference on Data Engineering (ICDE), 626-637, 2019
Toward Encrypted Cloud Media Center With Secure Deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2017
Non-interactive privacy-preserving truth discovery in crowd sensing applications
X Tang, C Wang, X Yuan, Q Wang
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1988-1996, 2018
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation
B Wu, X Yang, S Pan, X Yuan
Proceedings of the 2022 ACM on Asia Conference on Computer and K, 2022
DeFiRanger: Detecting DeFi Price Manipulation Attacks
S Wu, Z Yu, D Wang, Y Zhou, L Wu, H Wang, X Yuan
IEEE Transactions on Dependable and Secure Computing, 2023
Enabling privacy-preserving image-centric social discovery
X Yuan, X Wang, C Wang, A Squicciarini, K Ren
2014 IEEE 34th International Conference on Distributed Computing Systems K, 2014
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
B Wu, X Yang, S Pan, X Yuan
IEEE International Conference on Data Mining (ICDM), 2021
The system can't perform the operation now. Try again later.
Articles 1–20