关注
Xiaoguo Li
Xiaoguo Li
Research Fellow @ SMU
在 smu.edu.sg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Towards efficient privacy-preserving face recognition in the cloud
S Guo, T Xiang, X Li
Signal Processing 164, 320-328, 2019
432019
Perceptual visual security index based on edge and texture similarities
T Xiang, S Guo, X Li
IEEE Transactions on Information Forensics and Security 11 (5), 951-963, 2016
382016
Processing secure, verifiable and efficient SQL over outsourced database
T Xiang, X Li, F Chen, S Guo, Y Yang
Information Sciences 348, 163-178, 2016
362016
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud
T Xiang, X Li, F Chen, Y Yang, S Zhang
Journal of Parallel and Distributed Computing 112, 97-107, 2018
282018
PEID: A perceptually encrypted image database for visual security evaluation
S Guo, T Xiang, X Li, Y Yang
IEEE Transactions on Information Forensics and Security 15, 1151-1163, 2019
262019
Public key encryption with conjunctive keyword search on lattice
P Wang, T Xiang, X Li, H Xiang
Journal of Information Security and Applications 51, 102433, 2020
172020
Collaborative ensemble learning under differential privacy
T Xiang, Y Li, X Li, S Zhong, S Yu
Web Intelligence 16 (1), 73-87, 2018
152018
Privacy-preserving reverse nearest neighbor query over encrypted spatial data
X Li, T Xiang, S Guo, H Li, Y Mu
IEEE Transactions on Services Computing 15 (5), 2954-2968, 2021
112021
Efficient attribute-based signature with collusion resistance for internet of vehicles
B Chen, T Xiang, X Li, M Zhang, D He
IEEE Transactions on Vehicular Technology, 2023
82023
Efficient biometric identity-based encryption
X Li, T Xiang, F Chen, S Guo
Information Sciences 465, 248-264, 2018
82018
Access control encryption without sanitizers for Internet of Energy
P Wang, T Xiang, X Li, H Xiang
Information Sciences 546, 924-942, 2021
62021
A survey of secure computation using trusted execution environments
X Li, B Zhao, G Yang, T Xiang, J Weng, RH Deng
arXiv preprint arXiv:2302.12150, 2023
52023
Image quality assessment based on multiscale fuzzy gradient similarity deviation
S Guo, T Xiang, X Li
Soft Computing 21, 1145-1155, 2017
52017
Achieving forward unforgeability in keyword-field-free conjunctive search
X Li, T Xiang, P Wang
Journal of Network and Computer Applications 166, 102755, 2020
42020
When evolutionary computation meets privacy
B Zhao, WN Chen, X Li, X Liu, Q Pei, J Zhang
IEEE Computational Intelligence Magazine 19 (1), 66-74, 2024
32024
CROWDFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics
B Zhao, X Li, X Liu, Q Pei, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security, 2023
32023
Identifiable, but not visible: A privacy-preserving person reidentification scheme
B Zhao, Y Li, X Liu, X Li, HH Pang, RH Deng
IEEE Transactions on Reliability, 2023
32023
Efficient and Privacy-Preserving Query on Outsourced Spherical Data
Y Zhou, T Xiang, X Li
International Conference on Algorithms and Architectures for Parallel …, 2018
32018
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage
X Li, T Xiang, Y Mu, F Guo, Z Yao
IEEE Transactions on Cloud Computing, 2022
22022
Bilateral-secure signature by key evolving
T Xiang, X Li, F Chen, Y Mu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
22016
系统目前无法执行此操作,请稍后再试。
文章 1–20