关注
Xinyu Lei
标题
引用次数
引用次数
年份
Outsourcing large matrix inversion computation to a public cloud
X Lei, X Liao, T Huang, H Li, C Hu
IEEE Transactions on cloud computing 1 (1), 1-1, 2013
1882013
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
X Lei, X Liao, T Huang, F Heriniaina
Information sciences 280, 205-217, 2014
1242014
The insecurity of home digital voice assistants--amazon alexa as a case study
X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie
arXiv preprint arXiv:1712.03327, 2017
1222017
Second-order consensus seeking in multi-agent systems with nonlinear dynamics over random switching directed networks
H Li, X Liao, X Lei, T Huang, W Zhu
IEEE Transactions on Circuits and Systems I: Regular Papers 60 (6), 1595-1607, 2013
1112013
Cloud computing service: The caseof large matrix determinant computation
X Lei, X Liao, T Huang, H Li
IEEE Transactions on Services Computing 8 (5), 688-700, 2014
1072014
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
X Lei, GH Tu, AX Liu, CY Li, T Xie
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
1022018
Highly efficient linear regression outsourcing to a cloud
F Chen, T Xiang, X Lei, J Chen
IEEE transactions on cloud computing 2 (4), 499-508, 2014
882014
Federated learning with domain generalization
L Zhang, X Lei, Y Shi, H Huang, C Chen
arXiv preprint arXiv:2111.10487, 2021
672021
Federated continuous learning with broad network architecture
J Le, X Lei, N Mu, H Zhang, K Zeng, X Liao
IEEE Transactions on Cybernetics 51 (8), 3874-3888, 2021
462021
SecEQP: A secure and efficient scheme for SkNN query problem over encrypted geodata on cloud
X Lei, AX Liu, R Li, GH Tu
2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019
452019
NTRU-KE: A lattice-based public key exchange protocol
X Lei, X Liao
Cryptology ePrint Archive, 2013
412013
Privacy-preserving federated learning with malicious clients and honest-but-curious servers
J Le, D Zhang, X Lei, L Jiao, K Zeng, X Liao
IEEE Transactions on Information Forensics and Security, 2023
382023
Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey
D Zhang, J Le, X Lei, T Xiang, X Liao
International Journal of Intelligent Systems 36 (9), 5051-5084, 2021
372021
Federated learning for iot devices with domain generalization
L Zhang, X Lei, Y Shi, H Huang, C Chen
IEEE Internet of Things Journal 10 (11), 9622-9633, 2023
352023
The security in optical wireless communication: A survey
X Zhang, G Klevering, X Lei, Y Hu, L Xiao, GH Tu
ACM Computing Surveys 55 (14s), 1-36, 2023
292023
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
X Lei, GH Tu, CY Li, T Xie, M Zhang
Proceedings of the 18th International Conference on Mobile Systems …, 2020
222020
Two-layer tree-connected feed-forward neural network model for neural cryptography
X Lei, X Liao, F Chen, T Huang
Physical Review E—Statistical, Nonlinear, and Soft Matter Physics 87 (3 …, 2013
222013
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures
Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
202021
SecEDMO: Enabling efficient data mining with strong privacy protection in cloud computing
J Wu, N Mu, X Lei, J Le, D Zhang, X Liao
IEEE Transactions on Cloud Computing 10 (1), 691-705, 2019
192019
PTA-SC: Privacy-preserving task allocation for spatial crowdsourcing
W Huang, X Lei, H Huang
2021 IEEE Wireless Communications and Networking Conference (WCNC), 1-7, 2021
152021
系统目前无法执行此操作,请稍后再试。
文章 1–20