


Остановите войну!
for scientists:
Xingliang Yuan
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j30]Qingqing Gan, Joseph K. Liu, Xiaoming Wang, Xingliang Yuan, Shi-Feng Sun, Daxin Huang, Cong Zuo, Jianfeng Wang:
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Frontiers Comput. Sci. 16(6): 166820 (2022) - [j29]Shi-Feng Sun
, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j28]Xiaoning Liu
, Bang Wu, Xingliang Yuan
, Xun Yi
:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. IEEE Trans. Inf. Forensics Secur. 17: 237-252 (2022) - [j27]Yuanshao Zhu
, Yi Liu
, James J. Q. Yu
, Xingliang Yuan
:
Semi-Supervised Federated Learning for Travel Mode Identification From GPS Trajectories. IEEE Trans. Intell. Transp. Syst. 23(3): 2380-2391 (2022) - [c45]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation. AsiaCCS 2022: 337-350 - [c44]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. INFOCOM 2022: 1749-1758 - [e2]Wei Bao
, Xingliang Yuan
, Longxiang Gao
, Tom H. Luan
, David Bong Jun Choi
:
Ad Hoc Networks and Tools for IT - 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6-7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 428, Springer 2022, ISBN 978-3-030-98004-7 [contents] - [i21]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022) - [i20]He Zhang, Xingliang Yuan, Chuan Zhou, Shirui Pan:
Projective Ranking-based GNN Evasion Attacks. CoRR abs/2202.12993 (2022) - [i19]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. CoRR abs/2203.07320 (2022) - [i18]He Zhang, Bang Wu, Xingliang Yuan, Shirui Pan, Hanghang Tong, Jian Pei:
Trustworthy Graph Neural Networks: Aspects, Methods and Trends. CoRR abs/2205.07424 (2022) - 2021
- [j26]Yanli Ren
, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J. Inf. Secur. Appl. 58: 102698 (2021) - [j25]Chengjun Cai
, Jian Weng
, Xingliang Yuan
, Cong Wang
:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE Trans. Dependable Secur. Comput. 18(1): 131-144 (2021) - [j24]Lei Xu
, Shifeng Sun
, Xingliang Yuan
, Joseph K. Liu
, Cong Zuo
, Chungen Xu
:
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases. IEEE Trans. Emerg. Top. Comput. 9(1): 534-546 (2021) - [j23]Lei Xu
, Huayi Duan
, Anxin Zhou
, Xingliang Yuan
, Cong Wang
:
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 5310-5325 (2021) - [j22]Helei Cui
, Xingliang Yuan
, Yifeng Zheng
, Cong Wang
:
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection. IEEE Trans. Serv. Comput. 14(4): 998-1012 (2021) - [c43]Bang Wu, Shirui Pan, Xingliang Yuan:
Towards Extracting Graph Neural Network Models via Prediction Queries (Student Abstract). AAAI 2021: 15925-15926 - [c42]Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Joseph K. Liu:
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves. ACNS (1) 2021: 50-75 - [c41]He Zhang, Bang Wu, Xiangwen Yang, Chuan Zhou, Shuo Wang, Xingliang Yuan, Shirui Pan:
Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks. CIKM 2021: 3617-3621 - [c40]Xiaoning Liu
, Yifeng Zheng, Xingliang Yuan, Xun Yi:
[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service. ESORICS (1) 2021: 519-541 - [c39]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications. ICDM 2021: 1421-1426 - [c38]Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal:
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control. ISPEC 2021: 126-146 - [c37]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [c36]Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [e1]Xingliang Yuan
, Wei Bao, Xun Yi, Nguyen Hoang Tran:
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 402, Springer 2021, ISBN 978-3-030-91423-3 [contents] - [i17]Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, Kui Ren:
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. CoRR abs/2104.15068 (2021) - [i16]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications. CoRR abs/2110.08760 (2021) - [i15]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - [i14]Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 1593 (2021) - 2020
- [j21]Xingliang Yuan
, Chengjun Cai
, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - [j20]Shangqi Lai
, Xingliang Yuan
, Amin Sakzad
, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets. IEEE Internet Things J. 7(4): 2651-2662 (2020) - [j19]Yu Guo
, Mingyue Wang
, Cong Wang
, Xingliang Yuan
, Xiaohua Jia
:
Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes. IEEE Internet Things J. 7(6): 5359-5370 (2020) - [j18]Yifeng Zheng
, Huayi Duan
, Xingliang Yuan
, Cong Wang
:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. IEEE Trans. Dependable Secur. Comput. 17(1): 121-133 (2020) - [j17]Xu Yuan
, Xingliang Yuan
, Yihe Zhang, Baochun Li
, Cong Wang
:
Enabling Encrypted Boolean Queries in Geographically Distributed Databases. IEEE Trans. Parallel Distributed Syst. 31(3): 634-646 (2020) - [j16]Jinghua Jiang, Yifeng Zheng
, Zhenkui Shi, Xingliang Yuan
, Xiaolin Gui
, Cong Wang
:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. IEEE Trans. Serv. Comput. 13(3): 410-424 (2020) - [c35]Viet Vo, Shangqi Lai
, Xingliang Yuan, Shifeng Sun, Surya Nepal
, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. ACNS (2) 2020: 83-103 - [i13]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. CoRR abs/2001.01848 (2020) - [i12]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. CoRR abs/2001.03743 (2020) - [i11]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database with Padding Countermeasures. CoRR abs/2003.06103 (2020) - [i10]Yi Liu, Xingliang Yuan, Zehui Xiong, Jiawen Kang, Xiaofei Wang, Dusit Niyato:
Federated Learning for 6G Communications: Challenges, Methods, and Future Directions. CoRR abs/2006.02931 (2020) - [i9]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i8]Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization. CoRR abs/2010.12751 (2020) - [i7]Yi Liu, Xingliang Yuan, Ruihui Zhao, Yifeng Zheng, Yefeng Zheng:
RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System. CoRR abs/2012.04432 (2020) - [i6]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IACR Cryptol. ePrint Arch. 2020: 20 (2020) - [i5]Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. IACR Cryptol. ePrint Arch. 2020: 463 (2020)
2010 – 2019
- 2019
- [j15]Huayi Duan
, Yifeng Zheng
, Cong Wang
, Xingliang Yuan
:
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things. IEEE Internet Things J. 6(2): 2637-2650 (2019) - [j14]Xu Yuan
, Xingliang Yuan
, Baochun Li
, Cong Wang
:
Toward Secure and Scalable Computation in Internet of Things Data Applications. IEEE Internet Things J. 6(2): 3753-3763 (2019) - [j13]Yu Guo
, Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Baochun Li
, Xiaohua Jia
:
Enabling Encrypted Rich Queries in Distributed Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 30(6): 1283-1297 (2019) - [c34]Shangqi Lai
, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. AsiaCCS 2019: 41-54 - [c33]Lei Xu
, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu
:
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. AsiaCCS 2019: 122-133 - [c32]Huayi Duan
, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang
, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. CCS 2019: 2351-2367 - [c31]Xingliang Yuan, Chengjun Cai
, Qian Wang
, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8 - [c30]Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang:
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. ICDE 2019: 626-637 - [c29]Lei Xu
, Xingliang Yuan, Cong Wang, Qian Wang
, Chungen Xu
:
Hardening Database Padding for Searchable Encryption. INFOCOM 2019: 2503-2511 - [i4]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search. CoRR abs/1905.04501 (2019) - [i3]Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph:
Defending Against Misclassification Attacks in Transfer Learning. CoRR abs/1908.11230 (2019) - [i2]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets. CoRR abs/1911.05927 (2019) - 2018
- [j12]Cong Wang, Xingliang Yuan
, Yong Cui, Kui Ren:
Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond. IEEE Netw. 32(1): 166-171 (2018) - [j11]Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. IEEE Trans. Dependable Secur. Comput. 15(5): 868-882 (2018) - [j10]Xingliang Yuan
, Huayi Duan
, Cong Wang
:
Assuring String Pattern Matching in Outsourced Middleboxes. IEEE/ACM Trans. Netw. 26(3): 1362-1375 (2018) - [j9]Jie Zhu, Qi Li
, Cong Wang
, Xingliang Yuan
, Qian Wang
, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j8]Xingliang Yuan
, Jian Weng
, Cong Wang, Kui Ren:
Secure Integrated Circuit Design via Hybrid Cloud. IEEE Trans. Parallel Distributed Syst. 29(8): 1851-1864 (2018) - [c28]Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
, Viet Vo, Surya Nepal
:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. CCS 2018: 763-780 - [c27]Zhimei Sui, Shangqi Lai
, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. Inscrypt 2018: 260-273 - [c26]Helei Cui
, Cong Wang, Yu Hua, Yuefeng Du
, Xingliang Yuan:
A Bandwidth-Efficient Middleware for Encrypted Deduplication. DSC 2018: 1-8 - [c25]Xiaoting Tang, Cong Wang, Xingliang Yuan, Qian Wang
:
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications. INFOCOM 2018: 1988-1996 - [c24]Yu Guo, Cong Wang, Xingliang Yuan, Xiaohua Jia:
Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes. IWQoS 2018: 1-10 - [c23]Xiaoning Liu
, Xingliang Yuan
, Joseph K. Liu:
Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data. TrustCom/BigDataSE 2018: 1664-1668 - 2017
- [j7]Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Chenyun Yu, Sarana Nutanong:
Privacy-Preserving Similarity Joins Over Encrypted Data. IEEE Trans. Inf. Forensics Secur. 12(11): 2763-2775 (2017) - [j6]Chenyun Yu, Sarana Nutanong, Hangyu Li
, Cong Wang
, Xingliang Yuan
:
A Generic Method for Accelerating LSH-Based Similarity Join Processing. IEEE Trans. Knowl. Data Eng. 29(4): 712-726 (2017) - [j5]Helei Cui
, Xingliang Yuan
, Cong Wang
:
Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing. IEEE Trans. Mob. Comput. 16(5): 1315-1329 (2017) - [j4]Yifeng Zheng
, Xingliang Yuan
, Xinyu Wang
, Jinghua Jiang, Cong Wang
, Xiaolin Gui:
Toward Encrypted Cloud Media Center With Secure Deduplication. IEEE Trans. Multim. 19(2): 251-265 (2017) - [c22]Zhenkui Shi, Xiaoning Liu
, Xingliang Yuan
:
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination. SCC@AsiaCCS 2017: 51-57 - [c21]Xingliang Yuan
, Yu Guo, Xinyu Wang
, Cong Wang, Baochun Li, Xiaohua Jia:
EncKV: An Encrypted Key-value Store with Rich Queries. AsiaCCS 2017: 423-435 - [c20]Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:
Secure multi-client data access with boolean queries in distributed key-value stores. CNS 2017: 1-9 - [c19]Chengjun Cai
, Xingliang Yuan
, Cong Wang:
Towards trustworthy and private keyword search in encrypted decentralized storage. ICC 2017: 1-7 - [c18]Chenyun Yu, Sarana Nutanong, Hangyu Li
, Cong Wang
, Xingliang Yuan
:
A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract). ICDE 2017: 29-30 - [c17]Xiaoning Liu
, Xingliang Yuan
, Cong Wang:
EncSIM: An encrypted similarity search service for distributed high-dimensional datasets. IWQoS 2017: 1-10 - [c16]Chengjun Cai
, Xingliang Yuan, Cong Wang:
Hardening Distributed and Encrypted Keyword Search via Blockchain. PAC 2017: 119-128 - [i1]Huayi Duan, Xingliang Yuan, Cong Wang:
LightBox: SGX-assisted Secure Network Functions at Near-native Speed. CoRR abs/1706.06261 (2017) - 2016
- [j3]Jinghua Jiang, Yifeng Zheng
, Xingliang Yuan
, Zhenkui Shi, Xiaolin Gui, Cong Wang
, Jing Yao:
Towards Secure and Accurate Targeted Mobile Coupon Delivery. IEEE Access 4: 8116-8126 (2016) - [j2]Xingliang Yuan
, Xinyu Wang
, Jinfan Wang, Yilei Chu, Cong Wang
, Jianping Wang, Marie-José Montpetit, Shucheng Liu:
Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching. IEEE J. Sel. Areas Commun. 34(8): 2077-2090 (2016) - [j1]Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Jian Weng, Kui Ren
:
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE Trans. Multim. 18(10): 2002-2014 (2016) - [c15]Xingliang Yuan
, Xinyu Wang
, Cong Wang, Chen Qian, Jianxiong Lin:
Building an Encrypted, Distributed, and Searchable Key-value Store. AsiaCCS 2016: 547-558 - [c14]Chengcheng Dai, Xingliang Yuan
, Cong Wang
:
Privacy-Preserving Ridesharing Recommendation in Geosocial Networks. CSoNet 2016: 193-205 - [c13]Xingliang Yuan
, Huayi Duan
, Cong Wang
:
Bringing execution assurances of pattern matching in outsourced middleboxes. ICNP 2016: 1-10 - [c12]Xingliang Yuan
, Huayi Duan
, Cong Wang
:
Towards verifiable outsourced middleboxes. ICNP 2016: 1-2 - [c11]Helei Cui, Xingliang Yuan
, Yifeng Zheng
, Cong Wang:
Enabling secure and effective near-duplicate detection over encrypted in-network storage. INFOCOM 2016: 1-9 - [c10]Xingliang Yuan
, Xinyu Wang
, Jianxiong Lin, Cong Wang:
Privacy-preserving deep packet inspection in outsourced middleboxes. INFOCOM 2016: 1-9 - 2015
- [c9]Yifeng Zheng
, Xingliang Yuan
, Xinyu Wang
, Jinghua Jiang, Cong Wang
, Xiaolin Gui:
Enabling Encrypted Cloud Media Center with Secure Deduplication. AsiaCCS 2015: 63-72 - [c8]Xingliang Yuan
, Cong Wang
, Kui Ren
:
Enabling IP Protection for Outsourced Integrated Circuit Design. AsiaCCS 2015: 237-247 - [c7]Xingliang Yuan
, Xinyu Wang
, Yilei Chu, Cong Wang
, Chen Qian:
Towards a scalable, private, and searchable key-value store. CNS 2015: 773-774 - [c6]Xingliang Yuan
, Helei Cui
, Xinyu Wang
, Cong Wang
:
Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records. ESORICS (2) 2015: 40-60 - [c5]Jinghua Jiang, Zhenkui Shi, Xingliang Yuan
, Cong Wang
, Xiaolin Gui:
Towards secure and practical targeted mobile advertising. INFOCOM Workshops 2015: 79-80 - [c4]Helei Cui
, Xingliang Yuan
, Cong Wang
:
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices. INFOCOM 2015: 2659-2667 - [c3]Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan
, Cong Wang
:
Towards Secure and Practical Targeted Mobile Advertising. MSN 2015: 79-88 - 2014
- [c2]Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Anna Cinzia Squicciarini
, Kui Ren
:
Enabling Privacy-Preserving Image-Centric Social Discovery. ICDCS 2014: 198-207 - 2010
- [c1]Xingliang Yuan
, Jia Wang:
Statistical timing verification for transparently latched circuits through structural graph traversal. ASP-DAC 2010: 663-668
Coauthor Index
aka: Shi-Feng Sun

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-06-28 22:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint