Xianrui Meng
Xianrui Meng
Amazon Web Services, Inc.
Verified email at amazon.com - Homepage
Title
Cited by
Cited by
Year
Spark sql: Relational data processing in spark
M Armbrust, RS Xin, C Lian, Y Huai, D Liu, JK Bradley, X Meng, T Kaftan, ...
Proceedings of the 2015 ACM SIGMOD international conference on management of …, 2015
14232015
GRECS: Graph Encryption for Approximate Shortest Distance Queries
X Meng, S Kamara, K Nissim, G Kollios
CCS - 22nd ACM SIGSAC Conference on Computer and Communications Security …, 2015
1022015
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
ASIACRYPT - International Conference on the Theory and Application of …, 2013
882013
Privacy Preserving Similarity Evaluation of Time Series Data.
X Meng, H Zhu, G Kollios
EDBT, 499-510, 2014
232014
Top-k Query Processing on Encrypted Databases with Strong Security Guarantees
X Meng, H Zhu, G Kollios
2018 IEEE 34th International Conference on Data Engineering (ICDE), ISBN …, 2018
202018
Monotone iterative for fourth-order p-Laplacian boundary value problems with impulsive effects
G Shi, X Meng
Applied mathematics and computation 181 (2), 1243-1248, 2006
82006
NED: An Inter-Graph Node Metric Based On Edit Distance
H Zhu, X Meng, G Kollios
PVLDB 2017 10 (No. 6), Page 697 - 708, 2017
62017
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation 275, 104602, 2020
42020
Privacy-preserving XGBoost Inference
X Meng, J Feigenbaum
PRIVACY-PRESERVING MACHINE LEARNING at NeurIPS 2020, 2020
42020
SAPAG: a self-adaptive privacy attack from gradients
Y Wang, J Deng, D Guo, C Wang, X Meng, H Liu, C Ding, S Rajasekaran
arXiv preprint arXiv:2009.06228, 2020
42020
Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation
X Meng, D Papadopoulos, A Oprea, N Triandopoulos
31904
Private Two-Party Cluster Analysis Made Formal & Scalable
X Meng, D Papadopoulos, A Oprea, N Triandopoulos
arXiv preprint arXiv:1904.04475, 2019
22019
Secure top-k query processing on encrypted databases
X Meng, H Zhu, G Kollios
CoRR, abs/1510.05175, 2015
22015
NED: An inter-graph node metric on edit distance
H Zhu, X Meng, G Kollios
CoRR, abs/1602.02358, 2016
12016
Private Hierarchical Clustering and Efficient Approximation
X Meng, D Papadopoulos, A Oprea, N Triandopoulos
Proceedings of the 2021 on Cloud Computing Security Workshop, 3-20, 2021
2021
A Secure and Efficient Federated Learning Framework for NLP
C Wang, J Deng, X Meng, Y Wang, J Li, S Lin, S Han, F Miao, ...
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
2021
System and method for processing encrypted search
NA Allen, MJ Campagna, XJ Meng
US Patent US11023595B1, 2021
2021
Secure join protocol in encrypted databases
XJ Meng
US Patent US10929402B1, 2021
2021
Security and privacy aspects of mobile applications for post-surgical care
X Meng
PETRA, 2014
2014
Perfect Distance Stars mod m
X Meng
Rose-Hulman Undergraduate Mathematics Journal 11 (1), 5, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–20