Outsourcing large matrix inversion computation to a public cloud X Lei, X Liao, T Huang, H Li, C Hu IEEE Transactions on cloud computing 1 (1), 1-1, 2013 | 184 | 2013 |
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud X Lei, X Liao, T Huang, F Heriniaina Information sciences 280, 205-217, 2014 | 120 | 2014 |
The insecurity of home digital voice assistants--amazon alexa as a case study X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie arXiv preprint arXiv:1712.03327, 2017 | 118 | 2017 |
Second-order consensus seeking in multi-agent systems with nonlinear dynamics over random switching directed networks H Li, X Liao, X Lei, T Huang, W Zhu IEEE Transactions on Circuits and Systems I: Regular Papers 60 (6), 1595-1607, 2013 | 111 | 2013 |
Cloud computing service: The caseof large matrix determinant computation X Lei, X Liao, T Huang, H Li IEEE Transactions on Services Computing 8 (5), 688-700, 2014 | 107 | 2014 |
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures X Lei, GH Tu, AX Liu, CY Li, T Xie 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 99 | 2018 |
Highly efficient linear regression outsourcing to a cloud F Chen, T Xiang, X Lei, J Chen IEEE transactions on cloud computing 2 (4), 499-508, 2014 | 86 | 2014 |
Federated learning with domain generalization L Zhang, X Lei, Y Shi, H Huang, C Chen arXiv preprint arXiv:2111.10487, 2021 | 50 | 2021 |
SecEQP: A secure and efficient scheme for SkNN query problem over encrypted geodata on cloud X Lei, AX Liu, R Li, GH Tu 2019 IEEE 35th International Conference on Data Engineering (ICDE), 662-673, 2019 | 41 | 2019 |
Federated continuous learning with broad network architecture J Le, X Lei, N Mu, H Zhang, K Zeng, X Liao IEEE Transactions on Cybernetics 51 (8), 3874-3888, 2021 | 40 | 2021 |
NTRU-KE: A lattice-based public key exchange protocol X Lei, X Liao Cryptology ePrint Archive, 2013 | 39 | 2013 |
Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey D Zhang, J Le, X Lei, T Xiang, X Liao International Journal of Intelligent Systems 36 (9), 5051-5084, 2021 | 31 | 2021 |
Federated learning for iot devices with domain generalization L Zhang, X Lei, Y Shi, H Huang, C Chen IEEE Internet of Things Journal 10 (11), 9622-9633, 2023 | 27 | 2023 |
Privacy-preserving federated learning with malicious clients and honest-but-curious servers J Le, D Zhang, X Lei, L Jiao, K Zeng, X Liao IEEE Transactions on Information Forensics and Security, 2023 | 24 | 2023 |
SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence X Lei, GH Tu, CY Li, T Xie, M Zhang Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 22 | 2020 |
Two-layer tree-connected feed-forward neural network model for neural cryptography X Lei, X Liao, F Chen, T Huang Physical Review E—Statistical, Nonlinear, and Soft Matter Physics 87 (3 …, 2013 | 21 | 2013 |
SecEDMO: Enabling efficient data mining with strong privacy protection in cloud computing J Wu, N Mu, X Lei, J Le, D Zhang, X Liao IEEE Transactions on Cloud Computing 10 (1), 691-705, 2019 | 19 | 2019 |
The security in optical wireless communication: A survey X Zhang, G Klevering, X Lei, Y Hu, L Xiao, GH Tu ACM Computing Surveys 55 (14s), 1-36, 2023 | 18 | 2023 |
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 17 | 2021 |
Support-set-assured parallel outsourcing of sparse reconstruction service for compressive sensing in multi-clouds Y Zhang, J Zhou, LY Zhang, F Chen, X Lei 2015 International Symposium on Security and Privacy in Social Networks and …, 2015 | 15 | 2015 |