default search action
Cheng Xu 0004
Person information
- affiliation: Hong Kong Baptist University, Department of Computer Science, Hong Kong
Other persons with the same name
- Cheng Xu — disambiguation page
- Cheng Xu 0001 — Hunan University, School of Information Science and Engineering, Changsha, China (and 1 more)
- Cheng Xu 0002 — Uppsala University, Department of Information Technology, Sweden
- Cheng Xu 0003 — University of Science and Technology, School of Computer and Communication Engineering, Beijing, China
- Cheng Xu 0005 — Beijing Union University,Beijing Key Laboratory of Information Service Engineering, China (and 1 more)
- Cheng Xu 0006 — School of Computer Science, University College Dublin, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Xuan Luo, Jian Pei, Cheng Xu, Wenjie Zhang, Jianliang Xu:
Fast Shapley Value Computation in Data Assemblage Tasks as Cooperative Simple Games. Proc. ACM Manag. Data 2(1): 56:1-56:28 (2024) - [j5]Xinyi Zhang, Qichen Wang, Cheng Xu, Yun Peng, Jianliang Xu:
FedKNN: Secure Federated k-Nearest Neighbor Search. Proc. ACM Manag. Data 2(1): V2mod011:1-V2mod011:26 (2024) - [c17]Ce Zhang, Cheng Xu, Haibo Hu, Jianliang Xu:
COLE: A Column-based Learned Storage for Blockchain Systems. FAST 2024: 329-345 - [c16]Haixin Wang, Cheng Xu, Xiaojie Chen, Ce Zhang, Haibo Hu, Shikun Tian, Ying Yan, Jianliang Xu:
V2FS : A Verifiable Virtual Filesystem for Multi-Chain Query Authentication. ICDE 2024: 1999-2011 - 2023
- [i5]Ce Zhang, Cheng Xu, Haibo Hu, Jianliang Xu:
COLE: A Column-based Learned Storage for Blockchain Systems. CoRR abs/2306.10739 (2023) - 2022
- [j4]Xuan Luo, Jian Pei, Zicun Cong, Cheng Xu:
On Shapley Value in Data Assemblage Under Independent Utility. Proc. VLDB Endow. 15(11): 2761-2773 (2022) - [c15]Haixin Wang, Cheng Xu, Ce Zhang, Jianliang Xu, Zhe Peng, Jian Pei:
vChain+: Optimizing Verifiable Blockchain Boolean Range Queries. ICDE 2022: 1927-1940 - [c14]Yang Ji, Cheng Xu, Ce Zhang, Jianliang Xu:
DCert: towards secure, efficient, and versatile blockchain light clients. Middleware 2022: 269-280 - [i4]Xuan Luo, Jian Pei, Zicun Cong, Cheng Xu:
On Shapley Value in Data Assemblage Under Independent Utility. CoRR abs/2208.01163 (2022) - [i3]Yuzhe Tang, Kai Li, Yibo Wang, Jiaqi Chen, Cheng Xu:
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning. CoRR abs/2212.12656 (2022) - 2021
- [j3]Cheng Xu, Ce Zhang, Jianliang Xu, Jian Pei:
SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing. Proc. VLDB Endow. 14(11): 2314-2326 (2021) - [c13]Ce Zhang, Cheng Xu, Haixin Wang, Jianliang Xu, Byron Choi:
Authenticated Keyword Search in Scalable Hybrid-Storage Blockchains. ICDE 2021: 996-1007 - [c12]Zhe Peng, Cheng Xu, Haixin Wang, Jinbin Huang, Jianliang Xu, Xiaowen Chu:
P2B-Trace: Privacy-Preserving Blockchain-based Contact Tracing to Combat Pandemics. SIGMOD Conference 2021: 2389-2393 - 2020
- [c11]Shangwei Guo, Yang Ji, Ce Zhang, Cheng Xu, Jianliang Xu:
vCBIR: A Verifiable Search Engine for Content-Based Image Retrieval. ICDE 2020: 1730-1733 - [c10]Kai Li, Yuzhe Richard Tang, Jiaqi Chen, Zhehu Yuan, Cheng Xu, Jianliang Xu:
Cost-Effective Data Feeds to Blockchains via Workload-Adaptive Data Replication. Middleware 2020: 371-385 - [c9]Haixin Wang, Cheng Xu, Ce Zhang, Jianliang Xu:
vChain: A Blockchain System Ensuring Query Integrity. SIGMOD Conference 2020: 2693-2696
2010 – 2019
- 2019
- [c8]Ce Zhang, Cheng Xu, Jianliang Xu, Yuzhe Richard Tang, Byron Choi:
GEM^2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain. ICDE 2019: 842-853 - [c7]Shangwei Guo, Jianliang Xu, Ce Zhang, Cheng Xu, Tao Xiang:
ImageProof: Enabling Authentication for Large-Scale Image Retrieval. ICDE 2019: 1070-1081 - [c6]Yang Ji, Cheng Xu, Jianliang Xu, Haibo Hu:
vABS: Towards Verifiable Attribute-Based Search Over Shared Cloud Data. ICDE 2019: 2028-2031 - [c5]Cheng Xu, Ce Zhang, Jianliang Xu:
vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases. SIGMOD Conference 2019: 141-158 - [i2]Kai Li, Yuzhe Richard Tang, Qi Zhang, Cheng Xu, Jianliang Xu:
GRuB: Gas-Efficient Blockchain Storage via Workload-Adaptive Data Replication. CoRR abs/1911.04078 (2019) - 2018
- [j2]Cheng Xu, Qian Chen, Haibo Hu, Jianliang Xu, Xiaojun Hei:
Authenticating Aggregate Queries over Set-Valued Data with Confidentiality. IEEE Trans. Knowl. Data Eng. 30(4): 630-644 (2018) - [c4]Yuzhe Richard Tang, Zihao Xing, Cheng Xu, Ju Chen, Jianliang Xu:
Lightweight Blockchain Logging for Data-Intensive Applications. Financial Cryptography Workshops 2018: 308-324 - [c3]Cheng Xu, Qian Chen, Haibo Hu, Jianliang Xu, Xiaojun Hei:
Authenticating Aggregate Queries over Set-Valued Data with Confidentiality (Extended Abstract). ICDE 2018: 1797-1798 - [c2]Cheng Xu, Jianliang Xu, Byron Choi:
Distributed kNN Query Authentication. MDM 2018: 167-176 - [c1]Cheng Xu, Jianliang Xu, Haibo Hu, Man Ho Au:
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach. SIGMOD Conference 2018: 147-162 - [i1]Cheng Xu, Ce Zhang, Jianliang Xu:
vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases. CoRR abs/1812.02386 (2018) - 2017
- [j1]Qijun Zhu, Haibo Hu, Cheng Xu, Jianliang Xu, Wang-Chien Lee:
Geo-social group queries with minimum acquaintance constraints. VLDB J. 26(5): 709-727 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint