Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack P Xu, H Jin, Q Wu, W Wang IEEE Transactions on Computers 62 (11), 2266-2277, 2013 | 333 | 2013 |
Conditional identity-based broadcast proxy re-encryption and its application to cloud email P Xu, T Jiao, Q Wu, W Wang, H Jin IEEE Transactions on Computers 65 (1), 66-79, 2016 | 164 | 2016 |
Lightweight Searchable Public-key Encryption for Cloud-assisted Wireless Sensor Networks P Xu, S He, W Wang, W Susilo, H Jin IEEE Transactions on Industrial Informatics 14 (8), 3712-3723, 2018 | 97 | 2018 |
Secure Data Collection, Storage and Access in Cloud-Assisted IoT W Wang, P Xu, LT Yang IEEE Cloud Computing 5 (4), 77-88, 2018 | 87 | 2018 |
Generating searchable public-key ciphertexts with hidden structures for fast keyword search P Xu, Q Wu, W Wang, W Susilo, J Domingo-Ferrer, H Jin IEEE Transactions on Information Forensics and Security 10 (9), 1993-2006, 2015 | 71 | 2015 |
Scalable influence maximization under independent cascade model F Lu, W Zhang, L Shao, X Jiang, P Xu, H Jin Journal of Network and Computer Applications 86, 15-23, 2017 | 57 | 2017 |
Secure data sharing and search for cloud-edge-collaborative storage Y Tao, P Xu, H Jin IEEE Access 8, 15963-15972, 2019 | 53 | 2019 |
Lightweighted Secure Searching over Public-key Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices W Wang, P Xu, D Liu, LT Yang, Z Yan IEEE Transactions on Industrial Informatics 16 (6), 4221-4230, 2019 | 51 | 2019 |
Practical multi-keyword and boolean search over encrypted e-mail in cloud server P Xu, S Tang, P Xu, Q Wu, H Hu, W Susilo IEEE Transactions on Services Computing 14 (6), 1877-1889, 2019 | 50 | 2019 |
Fine-grained and heterogeneous proxy re-encryption for secure cloud storage P Xu, H Chen, D Zou, H Jin Chinese Science Bulletin 59 (32), 4201-4209, 2014 | 43 | 2014 |
ROSE: Robust searchable encryption with forward and backward security P Xu, W Susilo, W Wang, T Chen, Q Wu, K Liang, H Jin IEEE transactions on information forensics and security 17, 1115-1130, 2022 | 33 | 2022 |
Bestie: Very practical searchable encryption with forward and backward security T Chen, P Xu, W Wang, Y Zheng, W Susilo, H Jin European Symposium on Research in Computer Security, 3-23, 2021 | 33 | 2021 |
Efficient server-aided secure two-party computation in heterogeneous mobile cloud computing Y Wu, X Wang, W Susilo, G Yang, ZL Jiang, Q Chen, P Xu IEEE Transactions on Dependable and Secure Computing 18 (6), 2820-2834, 2020 | 22 | 2020 |
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage P Xu, S Liang, W Wang, W Susilo, Q Wu, H Jin 22nd Australasian Conference on Information Security and Privacy, 207-226, 2017 | 22 | 2017 |
A Practical Framework for-Out-of-Oblivious Transfer With Security Against Covert Adversaries B Zeng, C Tartary, P Xu, J Jing, X Tang IEEE Transactions on Information Forensics and Security 7 (2), 465-479, 2012 | 22 | 2012 |
LaF: Lattice-Based and Communication-efficient Federated Learning P Xu, M Hu, T Chen, W Wang, H Jin IEEE Transactions on Information Forensics and Security 17, 2483-2496, 2022 | 21 | 2022 |
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security P Xu, J Li, W Wang, H Jin 11th ACM on Asia Conference on Computer and Communications Security, 223-233, 2016 | 20 | 2016 |
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts W Wang, P Xu, H Li, LT Yang Future Generation Computer Systems 55, 353-361, 2016 | 20 | 2016 |
Towards efficient yet privacy-preserving approximate search in cloud computing A Ibrahim, H Jin, AA Yassin, D Zou, P Xu The Computer Journal 57 (2), 241-254, 2014 | 19 | 2014 |
Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT P Xu, X Tang, W Wang, H Jin, LT Yang IEEE Access 5, 24775-24784, 2017 | 18 | 2017 |