


default search action
Xuhua Ding
Person information
- affiliation: Singapore Management University, School of Information Systems
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c60]Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, Zhengyu He:
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone. NDSS 2025 - [i5]Mihael Liskij, Xuhua Ding, Gene Tsudik, Michael V. Basin:
Oblivious Digital Tokens. CoRR abs/2503.03494 (2025) - 2024
- [j26]Lei Zhou
, Fengwei Zhang
, Kevin Leach
, Xuhua Ding
, Zhenyu Ning
, Guojun Wang
, Jidong Xiao
:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [j25]Haoxin Tu
, Lingxiao Jiang
, Jiaqi Hong
, Xuhua Ding
, He Jiang
:
Concretely Mapped Symbolic Memory Locations for Memory Error Detection. IEEE Trans. Software Eng. 50(7): 1747-1767 (2024) - [c59]Zhanbo Wang
, Jiaxin Zhan
, Xuhua Ding
, Fengwei Zhang
, Ning Hu
:
ESem: To Harden Process Synchronization for Servers. AsiaCCS 2024 - 2023
- [j24]Chuntao Dong
, Qingni Shen
, Xuhua Ding
, Daoqing Yu, Wu Luo, Pengfei Wu
, Zhonghai Wu:
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud. IEEE Trans. Dependable Secur. Comput. 20(1): 867-885 (2023) - [c58]Pansilu Pitigalaarachchi
, Xuhua Ding
, Haiqing Qiu
, Haoxin Tu
, Jiaqi Hong
, Lingxiao Jiang
:
KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis. CCS 2023: 2009-2023 - [c57]Xuhua Ding
:
How to Resuscitate a Sick VM in the Cloud. DSN-S 2023: 89-93 - [c56]Zhe Chen, Haiqing Qiu, Xuhua Ding:
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices. ESORICS (4) 2023: 271-289 - 2022
- [c55]Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu:
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities. NDSS 2022 - [c54]Haoxin Tu, Lingxiao Jiang
, Xuhua Ding
, He Jiang:
FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers. ESEC/SIGSOFT FSE 2022: 1741-1745 - [c53]Lei Zhou, Xuhua Ding
, Fengwei Zhang:
Smile: Secure Memory Introspection for Live Enclave. SP 2022: 386-401 - [e1]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - 2021
- [j23]Lei Zhou, Fengwei Zhang
, Jidong Xiao
, Kevin Leach
, Westley Weimer, Xuhua Ding
, Guojun Wang
:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [c52]Chao Su
, Xuhua Ding
, Qingkai Zeng:
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions. DSN 2021: 326-337 - [c51]Ivan De Oliveira Nunes, Xuhua Ding
, Gene Tsudik:
On the Root of Trust Identification Problem. IPSN 2021: 315-327 - [c50]Jiaqi Hong, Xuhua Ding
:
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces. SP 2021: 1902-1918 - 2020
- [i4]Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik:
On the Root of Trust Identification Problem. CoRR abs/2010.13858 (2020)
2010 – 2019
- 2019
- [c49]Xuhua Ding, Ercan Ozturk, Gene Tsudik:
Balancing Security and Privacy in Genomic Range Queries. WPES@CCS 2019: 106-110 - 2018
- [j22]Xuhua Ding
, Gene Tsudik
:
Initializing trust in smart devices via presence attestation. Comput. Commun. 131: 35-38 (2018) - [j21]Siqi Zhao, Xuhua Ding
:
FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems. ACM Trans. Priv. Secur. 21(3): 15:1-15:30 (2018) - [c48]Zhilong Wang, Xuhua Ding
, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao:
To Detect Stack Buffer Overflow with Polymorphic Canaries. DSN 2018: 243-254 - 2017
- [j20]Tatiana Bradley, Xuhua Ding
, Gene Tsudik:
Genomic Security (Lest We Forget). IEEE Secur. Priv. 15(5): 38-46 (2017) - [j19]Yujue Wang, HweeHwa Pang
, Yanjiang Yang, Xuhua Ding
:
Secure server-aided top-k monitoring. Inf. Sci. 420: 345-363 (2017) - [j18]Siqi Ma
, Junzuo Lai, Robert H. Deng
, Xuhua Ding
:
Adaptable key-policy attribute-based encryption with time interval. Soft Comput. 21(20): 6191-6200 (2017) - [c47]Zhangkai Zhang, Xuhua Ding
, Gene Tsudik, Jinhua Cui, Zhoujun Li:
Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping. CCS 2017: 89-102 - [c46]Siqi Zhao, Xuhua Ding
:
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms. EuroS&P 2017: 546-560 - [c45]Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu:
Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed. USENIX Security Symposium 2017: 799-813 - 2016
- [c44]Dong Shen, Zhangkai Zhang, Xuhua Ding
, Zhoujun Li, Robert H. Deng
:
H-Binder: A Hardened Binder Framework on Android Systems. SecureComm 2016: 24-43 - [c43]Hui Cui
, Robert H. Deng
, Xuhua Ding
, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. SecureComm 2016: 165-181 - 2015
- [c42]Yueqiang Cheng, Xuhua Ding
, Robert H. Deng
:
Efficient Virtualization-Based Application Protection Against Untrusted Operating System. AsiaCCS 2015: 345-356 - [c41]Swee-Won Lo, Zhuo Wei, Robert H. Deng
, Xuhua Ding
:
On Security of Content-Based Video Stream Authentication. ESORICS (1) 2015: 366-383 - [c40]Pinghai Yuan, Qingkai Zeng, Xuhua Ding
:
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. RAID 2015: 66-85 - [c39]Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding
, Qingni Shen:
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. SecureComm 2015: 193-211 - 2014
- [j17]Yifan Zhao, Swee-Won Lo, Robert H. Deng
, Xuhua Ding
:
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks. J. Comput. Syst. Sci. 80(3): 520-532 (2014) - [j16]Robert Huijie Deng
, Xuhua Ding
, Yongdong Wu, Zhuo Wei:
Efficient block-based transparent encryption for H.264/SVC bitstreams. Multim. Syst. 20(2): 165-178 (2014) - [j15]Robert H. Deng
, Xuhua Ding
, Swee-Won Lo:
Efficient authentication and access control of scalable multimedia streams over packet-lossy networks. Secur. Commun. Networks 7(3): 611-625 (2014) - [j14]Zhuo Wei, Yongdong Wu, Robert H. Deng
, Xuhua Ding
:
A Hybrid Scheme for Authenticating Scalable Video Codestreams. IEEE Trans. Inf. Forensics Secur. 9(4): 543-553 (2014) - [j13]HweeHwa Pang
, Xuhua Ding
:
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data. ACM Trans. Database Syst. 39(3): 23:1-23:40 (2014) - [c38]Swee-Won Lo, Zhuo Wei, Xuhua Ding, Robert H. Deng
:
Generic attacks on content-based video stream authentication. ICME Workshops 2014: 1-2 - [c37]Swee-Won Lo, Zhuo Wei, Xuhua Ding, Robert H. Deng
:
Generic attacks on content-based video stream authentication. ICME Workshops 2014: 1-6 - [c36]Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng:
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. NDSS 2014 - 2013
- [j12]Yueqiang Cheng, Xuhua Ding
, Robert H. Deng:
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows. ACM Trans. Inf. Syst. Secur. 16(2): 6 (2013) - [c35]Xuhua Ding
, HweeHwa Pang
, Junzuo Lai:
Verifiable and private top-k monitoring. AsiaCCS 2013: 553-558 - [c34]Zhuo Wei, Robert H. Deng
, Jialie Shen, Yongdong Wu, Xuhua Ding
, Swee-Won Lo:
Technique for authenticating H.264/SVC streams in surveillance applications. ICME Workshops 2013: 1-4 - [c33]Junzuo Lai, Xuhua Ding
, Yongdong Wu:
Accountable Trapdoor Sanitizable Signatures. ISPEC 2013: 117-131 - [c32]Yanjiang Yang, Xuhua Ding
, Haibing Lu, Jian Weng
, Jianying Zhou
:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. ISC 2013: 238-247 - [c31]Yanjiang Yang, Xuhua Ding
, Haibing Lu, Zhiguo Wan, Jianying Zhou
:
Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. ISC 2013: 293-308 - [c30]Yueqiang Cheng, Xuhua Ding
:
Guardian: Hypervisor as Security Foothold for Personal Computers. TRUST 2013: 19-36 - [i3]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng:
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication. IACR Cryptol. ePrint Arch. 2013: 207 (2013) - 2012
- [j11]Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng
:
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory. Int. J. Comput. Intell. Syst. 5(5): 953-963 (2012) - [j10]Zhuo Wei, Yongdong Wu, Xuhua Ding
, Robert H. Deng
:
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Signal Process. Image Commun. 27(9): 1011-1024 (2012) - [c29]Xuhua Zhou, Xuhua Ding
, Kefei Chen:
A Generic Construction of Accountable Decryption and Its Applications. ACISP 2012: 322-335 - [c28]Payas Gupta, Xuhua Ding
, Debin Gao
:
Coercion resistance in authentication responsibility shifting. AsiaCCS 2012: 97-98 - [c27]Xinwen Zhang, Xuhua Ding:
STC 2012: the seventh ACM workshop on scalable trusted computing. CCS 2012: 1058-1059 - [c26]Zhuo Wei, Xuhua Ding
, Robert Huijie Deng
, Yongdong Wu:
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. Communications and Multimedia Security 2012: 72-86 - [c25]Yanjiang Yang, Haibing Lu, Jian Weng
, Xuhua Ding
, Jianying Zhou
:
A Generic Approach for Providing Revocation Support in Secret Handshake. ICICS 2012: 276-284 - [c24]Yifan Zhao, Swee-Won Lo, Robert H. Deng
, Xuhua Ding
:
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. NSS 2012: 192-205 - [c23]Yueqiang Cheng, Xuhua Ding
:
Virtualization Based Password Protection against Malware in Untrusted Operating Systems. TRUST 2012: 201-218 - 2011
- [j9]Xuhua Ding
, Yanjiang Yang, Robert H. Deng
:
Database Access Pattern Protection Without Full-Shuffles. IEEE Trans. Inf. Forensics Secur. 6(1): 189-201 (2011) - [c22]Feng Bao, Robert H. Deng
, Xuhua Ding
, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c21]Yueqiang Cheng, Xuhua Ding
, Robert H. Deng
:
DriverGuard: A Fine-Grained Protection on I/O Flows. ESORICS 2011: 227-244 - [c20]Xuhua Zhou, Xuhua Ding
, Kefei Chen:
Lightweight Delegated Subset Test with Privacy Protection. ISPEC 2011: 138-151 - 2010
- [j8]Xuhua Ding
, Yanjiang Yang, Robert H. Deng
, Shuhong Wang:
A new hardware-assisted PIR with O(n) shuffle cost. Int. J. Inf. Sec. 9(4): 237-252 (2010) - [j7]HweeHwa Pang
, Xuhua Ding
, Xiaokui Xiao
:
Embellishing Text Search Queries To Protect User Privacy. Proc. VLDB Endow. 3(1): 598-607 (2010) - [j6]HweeHwa Pang
, Xuhua Ding
, Baihua Zheng
:
Efficient processing of exact top-k queries over disk-resident sorted lists. VLDB J. 19(3): 437-456 (2010) - [c19]Xuhua Ding
:
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. ACNS 2010: 545-562 - [c18]Mei Liu, Xuhua Ding
:
On Trustworthiness of CPU Usage Metering and Accounting. ICDCS Workshops 2010: 82-91
2000 – 2009
- 2009
- [j5]Yanjiang Yang, Feng Bao, Xuhua Ding
, Robert H. Deng
:
Multiuser private queries over encrypted databases. Int. J. Appl. Cryptogr. 1(4): 309-319 (2009) - [j4]Xuhua Ding
, Gene Tsudik, Shouhuai Xu:
Leak-free mediated group signatures. J. Comput. Secur. 17(4): 489-514 (2009) - [j3]Baihua Zheng
, Wang-Chien Lee, Peng Liu, Dik Lun Lee
, Xuhua Ding
:
Tuning On-Air Signatures for Balancing Performance and Confidentiality. IEEE Trans. Knowl. Data Eng. 21(12): 1783-1797 (2009) - [c17]Jian Weng
, Robert H. Deng
, Xuhua Ding
, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. AsiaCCS 2009: 322-332 - [c16]Emiliano De Cristofaro, Xuhua Ding
, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. ICCCN 2009: 1-6 - [c15]Liang Gu, Yueqiang Cheng, Xuhua Ding
, Robert H. Deng
, Yao Guo
, Weizhong Shao:
Remote Attestation on Function Execution (Work-in-Progress). INTRUST 2009: 60-72 - [i2]Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. CoRR abs/0905.2158 (2009) - 2008
- [c14]Liang Gu, Xuhua Ding
, Robert Huijie Deng
, Bing Xie, Hong Mei:
Remote attestation on program execution. STC 2008: 11-20 - [c13]Xuhua Ding
, Wei Yu
, Ying Pan:
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. ICC 2008: 1605-1609 - [c12]Liang Gu, Xuhua Ding
, Robert H. Deng
, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei:
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ICYCS 2008: 2347-2353 - [c11]Feng Bao, Robert H. Deng
, Xuhua Ding
, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 - [c10]Yanjiang Yang, Xuhua Ding
, Robert H. Deng
, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 - 2007
- [j2]Xuhua Ding
, Daniele Mazzocchi, Gene Tsudik:
Equipping smart devices with public key signatures. ACM Trans. Internet Techn. 7(1): 3 (2007) - [c9]Yingjiu Li, Xuhua Ding
:
Protecting RFID communications in supply chains. AsiaCCS 2007: 234-241 - 2006
- [c8]Ying Pan, Xuhua Ding
:
Anomaly Based Web Phishing Page Detection. ACSAC 2006: 381-392 - [c7]Shuhong Wang, Xuhua Ding
, Robert H. Deng
, Feng Bao:
Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64 - [c6]Xuhua Ding
, Shuhong Wang, Baihua Zheng
:
Secure Real-time User Preference Collection for Broadcast Scheduling. SecureComm 2006: 1-10 - [i1]Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. IACR Cryptol. ePrint Arch. 2006: 208 (2006) - 2005
- [c5]Wei Wei, Xuhua Ding
, Kefei Chen:
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. ICICS 2005: 269-279 - 2004
- [j1]Dan Boneh, Xuhua Ding
, Gene Tsudik:
Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004) - [c4]Xuhua Ding
, Gene Tsudik, Shouhuai Xu:
Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 - 2003
- [c3]Xuhua Ding
, Gene Tsudik:
Simple Identity-Based Cryptography with Mediated RSA. CT-RSA 2003: 193-210 - 2002
- [c2]Xuhua Ding, Daniele Mazzocchi, Gene Tsudik:
Experimenting with Server-Aided Signatures. NDSS 2002 - 2001
- [c1]Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong:
A Method for Fast Revocation of Public Key Certificates and Security Capabilities. USENIX Security Symposium 2001
Coauthor Index
aka: Robert Huijie Deng

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-14 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint