Follow
Xinyu Wang
Title
Cited by
Cited by
Year
How to bid the cloud
L Zheng, C Joe-Wong, CW Tan, M Chiang, X Wang
ACM SIGCOMM Computer Communication Review 45 (4), 71-84, 2015
2212015
Privacy-preserving deep packet inspection in outsourced middleboxes
X Yuan, X Wang, J Lin, C Wang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
832016
IoT for next-generation racket sports training
Y Wang, M Chen, X Wang, RHM Chan, WJ Li
IEEE Internet of Things Journal 5 (6), 4558-4566, 2018
802018
Toward encrypted cloud media center with secure deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
IEEE Transactions on Multimedia 19 (2), 251-265, 2016
672016
Enabling privacy-preserving image-centric social discovery
X Yuan, X Wang, C Wang, A Squicciarini, K Ren
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
612014
Enabling encrypted cloud media center with secure deduplication
Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
552015
Enckv: An encrypted key-value store with rich queries
X Yuan, Y Guo, X Wang, C Wang, B Li, X Jia
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
542017
Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing
X Yuan, X Wang, C Wang, J Weng, K Ren
IEEE Transactions on Multimedia 18 (10), 2002-2014, 2016
492016
Enabling privacy-assured similarity retrieval over millions of encrypted records
X Yuan, H Cui, X Wang, C Wang
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
482015
Enabling encrypted rich queries in distributed key-value stores
X Yuan, X Wang, C Wang, B Li, X Jia
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1283-1297, 2018
442018
Building an encrypted, distributed, and searchable key-value store
X Yuan, X Wang, C Wang, C Qian, J Lin
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
422016
Privacy-preserving similarity joins over encrypted data
X Yuan, X Wang, C Wang, C Yu, S Nutanong
IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017
412017
Systems and methods for privacy-assured similarity joins over encrypted datasets
C Wang, S Nutanong, X Yuan, X Wang, C Yu
US Patent 10,496,638, 2019
292019
Enabling secure and efficient video delivery through encrypted in-network caching
X Yuan, X Wang, J Wang, Y Chu, C Wang, J Wang, MJ Montpetit, S Liu
IEEE Journal on Selected Areas in Communications 34 (8), 2077-2090, 2016
282016
Towards privacy-preserving and practical image-centric social discovery
X Yuan, X Wang, C Wang, AC Squicciarini, K Ren
IEEE Transactions on Dependable and Secure Computing 15 (5), 868-882, 2016
212016
Construction and mitigation of user-behavior-based covert channels on smartphones
W Qi, W Ding, X Wang, Y Jiang, Y Xu, J Wang, K Lu
IEEE Transactions on Mobile Computing 17 (1), 44-57, 2017
192017
Method for operating a distributed key-value store
X Yuan, Y Guo, X Wang, C Wang
US Patent 10,476,662, 2019
92019
Webenclave: protect web secrets from browser extensions with software enclave
X Wang, Y Du, C Wang, Q Wang, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3055-3070, 2021
52021
Blinddb: an encrypted, distributed, and searchable key-value store
X Yuan, X Wang, J Lin, C Wang, C Qian
12016
Towards a scalable, private, and searchable key-value store
X Yuan, X Wang, Y Chu, C Wang, C Qian
2015 IEEE Conference on Communications and Network Security (CNS), 773-774, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20