Towards efficient privacy-preserving face recognition in the cloud S Guo, T Xiang, X Li Signal Processing 164, 320-328, 2019 | 41 | 2019 |
Perceptual visual security index based on edge and texture similarities T Xiang, S Guo, X Li IEEE Transactions on Information Forensics and Security 11 (5), 951-963, 2016 | 37 | 2016 |
Processing secure, verifiable and efficient SQL over outsourced database T Xiang, X Li, F Chen, S Guo, Y Yang Information Sciences 348, 163-178, 2016 | 36 | 2016 |
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud T Xiang, X Li, F Chen, Y Yang, S Zhang Journal of Parallel and Distributed Computing 112, 97-107, 2018 | 28 | 2018 |
PEID: A perceptually encrypted image database for visual security evaluation S Guo, T Xiang, X Li, Y Yang IEEE Transactions on Information Forensics and Security 15, 1151-1163, 2019 | 25 | 2019 |
Public key encryption with conjunctive keyword search on lattice P Wang, T Xiang, X Li, H Xiang Journal of Information Security and Applications 51, 102433, 2020 | 16 | 2020 |
Collaborative ensemble learning under differential privacy T Xiang, Y Li, X Li, S Zhong, S Yu Web Intelligence 16 (1), 73-87, 2018 | 15 | 2018 |
Privacy-preserving reverse nearest neighbor query over encrypted spatial data X Li, T Xiang, S Guo, H Li, Y Mu IEEE Transactions on Services Computing 15 (5), 2954-2968, 2021 | 11 | 2021 |
Efficient biometric identity-based encryption X Li, T Xiang, F Chen, S Guo Information Sciences 465, 248-264, 2018 | 8 | 2018 |
Efficient attribute-based signature with collusion resistance for internet of vehicles B Chen, T Xiang, X Li, M Zhang, D He IEEE Transactions on Vehicular Technology, 2023 | 7 | 2023 |
Access control encryption without sanitizers for Internet of Energy P Wang, T Xiang, X Li, H Xiang Information Sciences 546, 924-942, 2021 | 6 | 2021 |
A survey of secure computation using trusted execution environments X Li, B Zhao, G Yang, T Xiang, J Weng, RH Deng arXiv preprint arXiv:2302.12150, 2023 | 5 | 2023 |
Image quality assessment based on multiscale fuzzy gradient similarity deviation S Guo, T Xiang, X Li Soft Computing 21, 1145-1155, 2017 | 5 | 2017 |
Achieving forward unforgeability in keyword-field-free conjunctive search X Li, T Xiang, P Wang Journal of Network and Computer Applications 166, 102755, 2020 | 4 | 2020 |
When evolutionary computation meets privacy B Zhao, WN Chen, X Li, X Liu, Q Pei, J Zhang IEEE Computational Intelligence Magazine 19 (1), 66-74, 2024 | 3 | 2024 |
CROWDFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics B Zhao, X Li, X Liu, Q Pei, Y Li, RH Deng IEEE Transactions on Information Forensics and Security, 2023 | 3 | 2023 |
Efficient and Privacy-Preserving Query on Outsourced Spherical Data Y Zhou, T Xiang, X Li International Conference on Algorithms and Architectures for Parallel …, 2018 | 3 | 2018 |
Identifiable, but not visible: A privacy-preserving person reidentification scheme B Zhao, Y Li, X Liu, X Li, HH Pang, RH Deng IEEE Transactions on Reliability, 2023 | 2 | 2023 |
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage X Li, T Xiang, Y Mu, F Guo, Z Yao IEEE Transactions on Cloud Computing, 2022 | 2 | 2022 |
A Privacy-Preserving and Redactable Healthcare Blockchain System S Xu, J Ning, X Li, J Yuan, X Huang, RH Deng IEEE Transactions on Services Computing, 2024 | 1 | 2024 |