Follow
Shengmin Xu
Shengmin Xu
Verified email at fjnu.edu.cn
Title
Cited by
Cited by
Year
Attribute-based encryption for cloud computing access control: A survey
Y Zhang, RH Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR) 53 (4), 1-41, 2020
1412020
Privacy-preserving federated deep learning with irregular users
G Xu, H Li, Y Zhang, S Xu, J Ning, RH Deng
IEEE Transactions on Dependable and Secure Computing 19 (2), 1364-1381, 2020
1062020
Secure fine-grained access control and data sharing for dynamic groups in the cloud
S Xu, G Yang, Y Mu, RH Deng
IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018
1052018
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng
IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2020
812020
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
S Xu, G Yang, Y Mu
Information Sciences 479, 116-134, 2019
712019
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance
S Xu, G Yang, Y Mu, X Liu
Future Generation Computer Systems 97, 284-294, 2019
702019
Lightweight and expressive fine-grained access control for healthcare Internet-of-Things
S Xu, Y Li, RH Deng, Y Zhang, X Luo, X Liu
IEEE Transactions on Cloud Computing 10 (1), 474-490, 2019
692019
K-Time Modifiable and Epoch-Based Redactable Blockchain
S Xu, J Ning, J Ma, X Huang, RH Deng
IEEE Transactions on Information Forensics and Security 16, 4507-4520, 2021
472021
Redactable blockchain in decentralized setting
J Ma, S Xu, J Ning, X Huang, RH Deng
IEEE Transactions on Information Forensics and Security 17, 1227-1242, 2022
372022
Multi-keyword searchable and verifiable attribute-based encryption over cloud data
Y Zhang, T Zhu, R Guo, S Xu, H Cui, J Cao
IEEE Transactions on Cloud Computing 11 (1), 971-983, 2021
302021
Secure and verifiable inference in deep neural networks
G Xu, H Li, H Ren, J Sun, S Xu, J Ning, H Yang, K Yang, RH Deng
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
282020
Server-aided bilateral access control for secure data sharing with dynamic user groups
S Xu, J Ning, X Huang, J Zhou, RH Deng
IEEE Transactions on Information Forensics and Security 16, 4746-4761, 2021
272021
Expressive bilateral access control for internet-of-things in cloud-fog computing
S Xu, J Ning, J Ma, X Huang, HH Pang, RH Deng
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
242021
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
S Xu, J Yuan, G Xu, Y Li, X Liu, Y Zhang, Z Ying
Information Sciences 538, 19-38, 2020
242020
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment
J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
232020
Catch you if you deceive me: Verifiable and privacy-aware truth discovery in crowdsensing systems
G Xu, H Li, S Xu, H Ren, Y Zhang, J Sun, RH Deng
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
212020
Revocable policy-based chameleon hash
S Xu, J Ning, J Ma, G Xu, J Yuan, RH Deng
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
192021
Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Z Ying, W Jiang, X Liu, S Xu, RH Deng
IEEE Transactions on Services Computing 15 (6), 3485-3498, 2021
172021
Hercules: Boosting the performance of privacy-preserving federated learning
G Xu, X Han, S Xu, T Zhang, H Li, X Huang, RH Deng
IEEE Transactions on Dependable and Secure Computing, 2022
142022
A secure EMR sharing system with tamper resistance and expressive access control
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng
IEEE Transactions on Dependable and Secure Computing 20 (1), 53-67, 2021
142021
The system can't perform the operation now. Try again later.
Articles 1–20