关注
Xinyu Lei
标题
引用次数
引用次数
年份
Outsourcing large matrix inversion computation to a public cloud
X Lei, X Liao, T Huang, H Li, C Hu
IEEE Transactions on cloud computing 1 (1), 1-1, 2013
1792013
The insecurity of home digital voice assistants--amazon alexa as a case study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
1172017
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
X Lei, X Liao, T Huang, F Heriniaina
Information sciences 280, 205-217, 2014
1172014
Second-order consensus seeking in multi-agent systems with nonlinear dynamics over random switching directed networks
H Li, X Liao, X Lei, T Huang, W Zhu
IEEE Transactions on Circuits and Systems I: Regular Papers 60 (6), 1595-1607, 2013
1102013
Cloud computing service: The caseof large matrix determinant computation
X Lei, X Liao, T Huang, H Li
IEEE Transactions on Services Computing 8 (5), 688-700, 2014
1042014
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
972018
Highly efficient linear regression outsourcing to a cloud
F Chen, T Xiang, X Lei, J Chen
IEEE transactions on cloud computing 2 (4), 499-508, 2014
862014
SecEQP: A secure and efficient scheme for SkNN query problem over encrypted geodata on cloud
X Lei, AX Liu, R Li, GH Tu
2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019
392019
NTRU-KE: A lattice-based public key exchange protocol
X Lei, X Liao
Cryptology ePrint Archive, 2013
392013
Federated learning with domain generalization
L Zhang, X Lei, Y Shi, H Huang, C Chen
arXiv preprint arXiv:2111.10487, 2021
372021
Federated continuous learning with broad network architecture
J Le, X Lei, N Mu, H Zhang, K Zeng, X Liao
IEEE Transactions on Cybernetics 51 (8), 3874-3888, 2021
352021
Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey
D Zhang, J Le, X Lei, T Xiang, X Liao
International Journal of Intelligent Systems 36 (9), 5051-5084, 2021
302021
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
X Lei, GH Tu, CY Li, T Xie, M Zhang
Proceedings of the 18th International Conference on Mobile Systems …, 2020
222020
Federated learning for iot devices with domain generalization
L Zhang, X Lei, Y Shi, H Huang, C Chen
IEEE Internet of Things Journal, 2023
192023
SecEDMO: Enabling efficient data mining with strong privacy protection in cloud computing
J Wu, N Mu, X Lei, J Le, D Zhang, X Liao
IEEE Transactions on Cloud Computing 10 (1), 691-705, 2019
192019
Two-layer tree-connected feed-forward neural network model for neural cryptography
X Lei, X Liao, F Chen, T Huang
Physical Review E 87 (3), 032811, 2013
192013
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures
Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
172021
Support-set-assured parallel outsourcing of sparse reconstruction service for compressive sensing in multi-clouds
Y Zhang, J Zhou, LY Zhang, F Chen, X Lei
2015 International Symposium on Security and Privacy in Social Networks and …, 2015
152015
Privacy-preserving federated learning with malicious clients and honest-but-curious servers
J Le, D Zhang, X Lei, L Jiao, K Zeng, X Liao
IEEE Transactions on Information Forensics and Security, 2023
122023
Fast and secure knn query processing in cloud computing
X Lei, GH Tu, AX Liu, T Xie
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
122020
系统目前无法执行此操作,请稍后再试。
文章 1–20