关注
Shengmin Xu
Shengmin Xu
在 fjnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Attribute-based encryption for cloud computing access control: A survey
Y Zhang, RH Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR) 53 (4), 1-41, 2020
1722020
Privacy-preserving federated deep learning with irregular users
G Xu, H Li, Y Zhang, S Xu, J Ning, RH Deng
IEEE Transactions on Dependable and Secure Computing 19 (2), 1364-1381, 2020
1402020
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
1072018
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng
IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2020
962020
Lightweight and expressive fine-grained access control for healthcare Internet-of-Things
S Xu, Y Li, RH Deng, Y Zhang, X Luo, X Liu
IEEE Transactions on Cloud Computing 10 (1), 474-490, 2019
822019
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
S Xu, G Yang, Y Mu
Information Sciences 479, 116-134, 2019
782019
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance
S Xu, G Yang, Y Mu, X Liu
Future Generation Computer Systems 97, 284-294, 2019
752019
K-Time Modifiable and Epoch-Based Redactable Blockchain
S Xu, J Ning, J Ma, X Huang, RH Deng
IEEE Transactions on Information Forensics and Security 16, 4507-4520, 2021
632021
Redactable blockchain in decentralized setting
J Ma, S Xu, J Ning, X Huang, RH Deng
IEEE Transactions on Information Forensics and Security 17, 1227-1242, 2022
542022
Server-aided bilateral access control for secure data sharing with dynamic user groups
S Xu, J Ning, X Huang, J Zhou, RH Deng
IEEE Transactions on Information Forensics and Security 16, 4746-4761, 2021
412021
Multi-keyword searchable and verifiable attribute-based encryption over cloud data
Y Zhang, T Zhu, R Guo, S Xu, H Cui, J Cao
IEEE Transactions on Cloud Computing 11 (1), 971-983, 2021
392021
Secure and verifiable inference in deep neural networks
G Xu, H Li, H Ren, J Sun, S Xu, J Ning, H Yang, K Yang, RH Deng
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
352020
Revocable policy-based chameleon hash
S Xu, J Ning, J Ma, G Xu, J Yuan, RH Deng
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
292021
Expressive bilateral access control for internet-of-things in cloud-fog computing
S Xu, J Ning, J Ma, X Huang, HH Pang, RH Deng
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
282021
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment
J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
272020
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
S Xu, J Yuan, G Xu, Y Li, X Liu, Y Zhang, Z Ying
Information Sciences 538, 19-38, 2020
262020
Catch you if you deceive me: Verifiable and privacy-aware truth discovery in crowdsensing systems
G Xu, H Li, S Xu, H Ren, Y Zhang, J Sun, RH Deng
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
232020
A secure EMR sharing system with tamper resistance and expressive access control
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng
IEEE Transactions on Dependable and Secure Computing 20 (1), 53-67, 2021
222021
Accountable and fine-grained controllable rewriting in blockchains
S Xu, X Huang, J Yuan, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 18, 101-116, 2022
192022
Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Z Ying, W Jiang, X Liu, S Xu, RH Deng
IEEE Transactions on Services Computing 15 (6), 3485-3498, 2021
192021
系统目前无法执行此操作,请稍后再试。
文章 1–20