Xinyu Wang
Title
Cited by
Cited by
Year
How to bid the cloud
L Zheng, C Joe-Wong, CW Tan, M Chiang, X Wang
ACM SIGCOMM Computer Communication Review 45 (4), 71-84, 2015
1442015
Enabling privacy-preserving image-centric social discovery
X Yuan, X Wang, C Wang, A Squicciarini, K Ren
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
452014
Enabling encrypted cloud media center with secure deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
392015
Privacy-preserving deep packet inspection in outsourced middleboxes
X Yuan, X Wang, J Lin, C Wang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
382016
Toward encrypted cloud media center with secure deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2016
322016
Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing
X Yuan, X Wang, C Wang, J Weng, K Ren
IEEE Transactions on Multimedia 18 (10), 2002-2014, 2016
282016
Enabling privacy-assured similarity retrieval over millions of encrypted records
X Yuan, H Cui, X Wang, C Wang
European Symposium on Research in Computer Security, 40-60, 2015
282015
Building an encrypted, distributed, and searchable key-value store
X Yuan, X Wang, C Wang, C Qian, J Lin
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
202016
Privacy-preserving similarity joins over encrypted data
X Yuan, X Wang, C Wang, C Yu, S Nutanong
IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017
192017
Enckv: An encrypted key-value store with rich queries
X Yuan, Y Guo, X Wang, C Wang, B Li, X Jia
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
192017
Enabling secure and efficient video delivery through encrypted in-network caching
X Yuan, X Wang, J Wang, Y Chu, C Wang, J Wang, MJ Montpetit, S Liu
IEEE Journal on Selected Areas in Communications 34 (8), 2077-2090, 2016
172016
IoT for next-generation racket sports training
Y Wang, M Chen, X Wang, RHM Chan, WJ Li
IEEE Internet of Things Journal 5 (6), 4558-4566, 2018
162018
Towards privacy-preserving and practical image-centric social discovery
X Yuan, X Wang, C Wang, AC Squicciarini, K Ren
IEEE Transactions on Dependable and Secure Computing 15 (5), 868-882, 2016
122016
Construction and mitigation of user-behavior-based covert channels on smartphones
W Qi, W Ding, X Wang, Y Jiang, Y Xu, J Wang, K Lu
IEEE Transactions on Mobile Computing 17 (1), 44-57, 2017
92017
Enabling encrypted rich queries in distributed key-value stores
X Yuan, X Wang, C Wang, B Li, X Jia
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1283-1297, 2018
52018
Towards a scalable, private, and searchable key-value store
X Yuan, X Wang, Y Chu, C Wang, C Qian
2015 IEEE Conference on Communications and Network Security (CNS), 773-774, 2015
12015
AI3: application-independent information infrastructure
B Zhang, J Wang, X Wang, Y Cheng, X Jia, J He
Proceedings of the 2014 ACM conference on SIGCOMM, 145-146, 2014
12014
Systems and methods for privacy-assured similarity joins over encrypted datasets
C Wang, S Nutanong, X Yuan, X Wang, C Yu
US Patent 10,496,638, 2019
2019
Method for operating a distributed key-value store
X Yuan, Y Guo, X Wang, C Wang
US Patent 10,476,662, 2019
2019
On the design of a general multiple-namespace system for future networks
J Wang, K Lu, W Ding, X Wang, S Liu, J Wang
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20