Outsourcing large matrix inversion computation to a public cloud X Lei, X Liao, T Huang, H Li, C Hu IEEE Transactions on cloud computing 1 (1), 1-1, 2013 | 179 | 2013 |
The insecurity of home digital voice assistants--amazon alexa as a case study X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie arXiv preprint arXiv:1712.03327, 2017 | 117 | 2017 |
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud X Lei, X Liao, T Huang, F Heriniaina Information sciences 280, 205-217, 2014 | 117 | 2014 |
Second-order consensus seeking in multi-agent systems with nonlinear dynamics over random switching directed networks H Li, X Liao, X Lei, T Huang, W Zhu IEEE Transactions on Circuits and Systems I: Regular Papers 60 (6), 1595-1607, 2013 | 110 | 2013 |
Cloud computing service: The caseof large matrix determinant computation X Lei, X Liao, T Huang, H Li IEEE Transactions on Services Computing 8 (5), 688-700, 2014 | 104 | 2014 |
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 97 | 2018 |
Highly efficient linear regression outsourcing to a cloud F Chen, T Xiang, X Lei, J Chen IEEE transactions on cloud computing 2 (4), 499-508, 2014 | 86 | 2014 |
SecEQP: A secure and efficient scheme for SkNN query problem over encrypted geodata on cloud X Lei, AX Liu, R Li, GH Tu 2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019 | 39 | 2019 |
NTRU-KE: A lattice-based public key exchange protocol X Lei, X Liao Cryptology ePrint Archive, 2013 | 39 | 2013 |
Federated learning with domain generalization L Zhang, X Lei, Y Shi, H Huang, C Chen arXiv preprint arXiv:2111.10487, 2021 | 37 | 2021 |
Federated continuous learning with broad network architecture J Le, X Lei, N Mu, H Zhang, K Zeng, X Liao IEEE Transactions on Cybernetics 51 (8), 3874-3888, 2021 | 35 | 2021 |
Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey D Zhang, J Le, X Lei, T Xiang, X Liao International Journal of Intelligent Systems 36 (9), 5051-5084, 2021 | 30 | 2021 |
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence X Lei, GH Tu, CY Li, T Xie, M Zhang Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 22 | 2020 |
Federated learning for iot devices with domain generalization L Zhang, X Lei, Y Shi, H Huang, C Chen IEEE Internet of Things Journal, 2023 | 19 | 2023 |
SecEDMO: Enabling efficient data mining with strong privacy protection in cloud computing J Wu, N Mu, X Lei, J Le, D Zhang, X Liao IEEE Transactions on Cloud Computing 10 (1), 691-705, 2019 | 19 | 2019 |
Two-layer tree-connected feed-forward neural network model for neural cryptography X Lei, X Liao, F Chen, T Huang Physical Review E 87 (3), 032811, 2013 | 19 | 2013 |
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 17 | 2021 |
Support-set-assured parallel outsourcing of sparse reconstruction service for compressive sensing in multi-clouds Y Zhang, J Zhou, LY Zhang, F Chen, X Lei 2015 International Symposium on Security and Privacy in Social Networks and …, 2015 | 15 | 2015 |
Privacy-preserving federated learning with malicious clients and honest-but-curious servers J Le, D Zhang, X Lei, L Jiao, K Zeng, X Liao IEEE Transactions on Information Forensics and Security, 2023 | 12 | 2023 |
Fast and secure knn query processing in cloud computing X Lei, GH Tu, AX Liu, T Xie 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 12 | 2020 |