关注
Xiaoguo Li
Xiaoguo Li
Research Fellow @ SMU
在 smu.edu.sg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Towards efficient privacy-preserving face recognition in the cloud
S Guo, T Xiang, X Li
Signal Processing 164, 320-328, 2019
432019
Perceptual visual security index based on edge and texture similarities
T Xiang, S Guo, X Li
IEEE Transactions on Information Forensics and Security 11 (5), 951-963, 2016
382016
Processing secure, verifiable and efficient SQL over outsourced database
T Xiang, X Li, F Chen, S Guo, Y Yang
Information Sciences 348, 163-178, 2016
362016
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud
T Xiang, X Li, F Chen, Y Yang, S Zhang
Journal of Parallel and Distributed Computing 112, 97-107, 2018
272018
PEID: A perceptually encrypted image database for visual security evaluation
S Guo, T Xiang, X Li, Y Yang
IEEE Transactions on Information Forensics and Security 15, 1151-1163, 2019
262019
Public key encryption with conjunctive keyword search on lattice
P Wang, T Xiang, X Li, H Xiang
Journal of Information Security and Applications 51, 102433, 2020
192020
Collaborative ensemble learning under differential privacy
T Xiang, Y Li, X Li, S Zhong, S Yu
Web Intelligence 16 (1), 73-87, 2018
162018
Privacy-preserving reverse nearest neighbor query over encrypted spatial data
X Li, T Xiang, S Guo, H Li, Y Mu
IEEE Transactions on Services Computing 15 (5), 2954-2968, 2021
112021
Efficient attribute-based signature with collusion resistance for internet of vehicles
B Chen, T Xiang, X Li, M Zhang, D He
IEEE Transactions on Vehicular Technology 72 (6), 7844-7856, 2023
92023
A survey of secure computation using trusted execution environments
X Li, B Zhao, G Yang, T Xiang, J Weng, RH Deng
arXiv preprint arXiv:2302.12150, 2023
82023
Efficient biometric identity-based encryption
X Li, T Xiang, F Chen, S Guo
Information Sciences 465, 248-264, 2018
82018
Access control encryption without sanitizers for Internet of Energy
P Wang, T Xiang, X Li, H Xiang
Information Sciences 546, 924-942, 2021
62021
Image quality assessment based on multiscale fuzzy gradient similarity deviation
S Guo, T Xiang, X Li
Soft Computing 21, 1145-1155, 2017
52017
When evolutionary computation meets privacy
B Zhao, WN Chen, X Li, X Liu, Q Pei, J Zhang
IEEE Computational Intelligence Magazine 19 (1), 66-74, 2024
42024
Achieving forward unforgeability in keyword-field-free conjunctive search
X Li, T Xiang, P Wang
Journal of Network and Computer Applications 166, 102755, 2020
42020
CrowdFA: A privacy-preserving mobile crowdsensing paradigm via federated analytics
B Zhao, X Li, X Liu, Q Pei, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security, 2023
32023
Identifiable, but not visible: A privacy-preserving person reidentification scheme
B Zhao, Y Li, X Liu, X Li, HH Pang, RH Deng
IEEE Transactions on Reliability 72 (4), 1295-1307, 2023
32023
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption
X Li, G Yang, T Xiang, S Xu, B Zhao, HH Pang, RH Deng
2024 IEEE Symposium on Security and Privacy (SP), 100-100, 2024
22024
A privacy-preserving and redactable healthcare blockchain system
S Xu, J Ning, X Li, J Yuan, X Huang, RH Deng
IEEE Transactions on Services Computing, 2024
22024
Bilateral-secure signature by key evolving
T Xiang, X Li, F Chen, Y Mu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
22016
系统目前无法执行此操作,请稍后再试。
文章 1–20