[go: up one dir, main page]

Follow
Xun Yi
Xun Yi
Professor of Cybersecurity, School of Computing Technologies, RMIT University
Verified email at rmit.edu.au
Title
Cited by
Cited by
Year
Public and private blockchain in construction business process and information integration
R Yang, R Wakefield, S Lyu, S Jayasuriya, F Han, X Yi, X Yang, ...
Automation in construction 118, 103276, 2020
6632020
Homomorphic encryption
X Yi, R Paulet, E Bertino
Homomorphic encryption and applications, 27-46, 2014
5412014
Privacy-preserving and content-protecting location based queries
R Paulet, MG Kaosar, X Yi, E Bertino
IEEE transactions on knowledge and data engineering 26 (5), 1200-1210, 2013
2172013
Hash function based on chaotic tent maps
X Yi
IEEE Transactions on Circuits and Systems II: Express Briefs 52 (6), 354-357, 2005
1742005
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
PP Jayaraman, X Yang, A Yavari, D Georgakopoulos, X Yi
Future Generation Computer Systems 76, 540-549, 2017
1732017
An identity-based signature scheme from the Weil pairing
X Yi
IEEE communications letters 7 (2), 76-78, 2003
1722003
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 988-1001, 2022
1682022
Secure edge of things for smart healthcare surveillance framework
A Alabdulatif, I Khalil, X Yi, M Guizani
IEEE access 7, 31010-31021, 2019
1512019
Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things
AP Kalapaaking, I Khalil, MS Rahman, M Atiquzzaman, X Yi, M Almashor
IEEE Transactions on Industrial Informatics 19 (2), 1703-1714, 2022
1462022
Privacy protection for wireless medical sensor data
X Yi, A Bouguettaya, D Georgakopoulos, A Song, J Willemson
IEEE transactions on dependable and secure computing 13 (3), 369-380, 2015
1442015
Single-database private information retrieval from fully homomorphic encryption
X Yi, MG Kaosar, R Paulet, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (5), 1125-1134, 2012
1442012
Practical approximate k nearest neighbor queries with location and query privacy
X Yi, R Paulet, E Bertino, V Varadharajan
IEEE Transactions on Knowledge and Data Engineering 28 (6), 1546-1559, 2016
1432016
Security and privacy in cloud computing: vision, trends, and challenges
Z Tari, X Yi, US Premarathne, P Bertok, I Khalil
IEEE Cloud Computing 2 (2), 30-38, 2015
1282015
A practical privacy-preserving recommender system
S Badsha, X Yi, I Khalil
Data Science and Engineering 1 (3), 161-177, 2016
1242016
Privacy of outsourced k-means clustering
D Liu, E Bertino, X Yi
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1222014
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption
A Alabdulatif, I Khalil, X Yi
Journal of Parallel and Distributed Computing 137, 192-204, 2020
1142020
Practical k nearest neighbor queries with location privacy
X Yi, R Paulet, E Bertino, V Varadharajan
2014 IEEE 30th international conference on data engineering, 640-651, 2014
1112014
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
X Yi, Y Ye
IEEE Transactions on Knowledge and Data Engineering 15 (4), 1054-1055, 2003
1102003
Blockchain-based federated learning with SMPC model verification against poisoning attack for healthcare systems
AP Kalapaaking, I Khalil, X Yi
IEEE Transactions on Emerging Topics in Computing 12 (1), 269-280, 2023
1052023
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities
X Yang, X Yi, S Nepal, A Kelarev, F Han
Future Generation Computer Systems 112, 859-874, 2020
1052020
The system can't perform the operation now. Try again later.
Articles 1–20