Attribute-based encryption for cloud computing access control: A survey Y Zhang, RH Deng, S Xu, J Sun, Q Li, D Zheng ACM Computing Surveys (CSUR) 53 (4), 1-41, 2020 | 113 | 2020 |
Secure fine-grained access control and data sharing for dynamic groups in the cloud S Xu, G Yang, Y Mu, RH Deng IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018 | 94 | 2018 |
Privacy-preserving federated deep learning with irregular users G Xu, H Li, Y Zhang, S Xu, J Ning, RH Deng IEEE Transactions on Dependable and Secure Computing 19 (2), 1364-1381, 2020 | 78 | 2020 |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation S Xu, G Yang, Y Mu Information Sciences 479, 116-134, 2019 | 68 | 2019 |
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance S Xu, G Yang, Y Mu, X Liu Future Generation Computer Systems 97, 284-294, 2019 | 64 | 2019 |
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2020 | 60 | 2020 |
Lightweight and expressive fine-grained access control for healthcare Internet-of-Things S Xu, Y Li, RH Deng, Y Zhang, X Luo, X Liu IEEE Transactions on Cloud Computing 10 (1), 474-490, 2019 | 56 | 2019 |
K-Time Modifiable and Epoch-Based Redactable Blockchain S Xu, J Ning, J Ma, X Huang, RH Deng IEEE Transactions on Information Forensics and Security 16, 4507-4520, 2021 | 28 | 2021 |
Secure and verifiable inference in deep neural networks G Xu, H Li, H Ren, J Sun, S Xu, J Ning, H Yang, K Yang, RH Deng Annual Computer Security Applications Conference, 784-797, 2020 | 21 | 2020 |
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 19 | 2020 |
Server-aided bilateral access control for secure data sharing with dynamic user groups S Xu, J Ning, X Huang, J Zhou, RH Deng IEEE Transactions on Information Forensics and Security 16, 4746-4761, 2021 | 18 | 2021 |
Efficient ciphertext-policy attribute-based encryption with blackbox traceability S Xu, J Yuan, G Xu, Y Li, X Liu, Y Zhang, Z Ying Information Sciences 538, 19-38, 2020 | 18 | 2020 |
Catch you if you deceive me: Verifiable and privacy-aware truth discovery in crowdsensing systems G Xu, H Li, S Xu, H Ren, Y Zhang, J Sun, RH Deng Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 17 | 2020 |
Redactable blockchain in decentralized setting J Ma, S Xu, J Ning, X Huang, RH Deng IEEE Transactions on Information Forensics and Security 17, 1227-1242, 2022 | 15 | 2022 |
Multi-keyword searchable and verifiable attribute-based encryption over cloud data Y Zhang, T Zhu, R Guo, S Xu, H Cui, J Cao IEEE Transactions on Cloud Computing, 2021 | 14 | 2021 |
Expressive bilateral access control for internet-of-things in cloud-fog computing S Xu, J Ning, J Ma, X Huang, HH Pang, RH Deng Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021 | 14 | 2021 |
Revocable policy-based chameleon hash S Xu, J Ning, J Ma, G Xu, J Yuan, RH Deng Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 12 | 2021 |
Privacy-enhanced remote data integrity checking with updatable timestamp T Wu, G Yang, Y Mu, R Chen, S Xu Information Sciences 527, 210-226, 2020 | 11 | 2020 |
Efficient attribute-based encryption with blackbox traceability S Xu, G Yang, Y Mu, X Liu Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018 | 10 | 2018 |
Untouchable once revoking: a practical and secure dynamic EHR sharing system via cloud S Xu, J Ning, X Huang, Y Li, G Xu IEEE Transactions on Dependable and Secure Computing 19 (6), 3759-3773, 2021 | 9 | 2021 |