What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rongxing Lu
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach.
Kaiyao Miao
Meng Zhang
Fanghong Guo
Rongxing Lu
Xiaohong Guan
2025
journals/tifs
COKV: Key-Value Data Collection With Condensed Local Differential Privacy.
Junpeng Zhang
Hui Zhu
Jiaqi Zhao
Rongxing Lu
Yandong Zheng
Jiezhen Tang
Hui Li
2025
journals/tifs
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks.
Xiaodong Wu
Henry Yuan
Xiangman Li
Jianbing Ni
Rongxing Lu
2025
journals/tifs
Toward Efficient and Secure Hypercube Tree Building for Vertically Distributed Data in Cloud.
Yandong Zheng
Hui Zhu
Rongxing Lu
Songnian Zhang
Fengwei Wang
Jun Shao
Hui Li
2025
journals/tifs
Optimized Sparse Vector Aggregation Under Local Differential Privacy.
Ellen Z. Zhang
Yunguo Guan
Rongxing Lu
Harry Zhang
2025
conf/esorics
SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts.
Xiaodong Wu
Xiangman Li
Qi Li
Jianbing Ni
Rongxing Lu
2024
journals/tifs
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains.
Andi Liu
Yizhong Liu
Qianhong Wu
Boyu Zhao
Dongyu Li
Yuan Lu
Rongxing Lu
Willy Susilo
2024
journals/tifs
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
Yandong Zheng
Hui Zhu
Rongxing Lu
Songnian Zhang
Yunguo Guan
Fengwei Wang
Jun Shao
Hui Li
2024
journals/tifs
Dynamic Group Time-Based One-Time Passwords.
Xuelian Cao
Zheng Yang
Jianting Ning
Chenglu Jin
Rongxing Lu
Zhiming Liu
Jianying Zhou
2024
journals/tifs
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning.
Xue-Yang Li
Xue Yang
Zhengchun Zhou
Rongxing Lu
2024
journals/tifs
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions.
Zhi Li
Hao Wang
Songnian Zhang
Wenying Zhang
Rongxing Lu
2024
journals/tifs
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
Songnian Zhang
Rongxing Lu
Hui Zhu
Yandong Zheng
Yunguo Guan
Fengwei Wang
Jun Shao
Hui Li
2024
conf/eurosp
Fingerprinting Image-to-Image Generative Adversarial Networks.
Guanlin Li
Guowen Xu
Han Qiu
Shangwei Guo
Run Wang
Jiwei Li
Tianwei Zhang
Rongxing Lu
2023
journals/tifs
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy.
Lei Wu
Chengyi Qin
Zihui Xu
Yunguo Guan
Rongxing Lu
2023
journals/tifs
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
Yandong Zheng
Hui Zhu
Rongxing Lu
Yunguo Guan
Songnian Zhang
Fengwei Wang
Jun Shao
Hui Li
2023
journals/tifs
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.
Yandong Zheng
Rongxing Lu
Hui Zhu
Songnian Zhang
Yunguo Guan
Jun Shao
Fengwei Wang
Hui Li
2023
journals/tifs
Cross-Chain Virtual Payment Channels.
Xiaofeng Jia
Zhe Yu
Jun Shao
Rongxing Lu
Guiyi Wei
Zhenguang Liu
2023
journals/tifs
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
Jiaqi Zhao
Hui Zhu
Wei Xu
Fengwei Wang
Rongxing Lu
Hui Li
2023
journals/tifs
Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
Fengwei Wang
Hui Zhu
Guozhang He
Rongxing Lu
Yandong Zheng
Hui Li
2023
journals/tifs
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
Yandong Zheng
Hui Zhu
Rongxing Lu
Yunguo Guan
Songnian Zhang
Fengwei Wang
Jun Shao
Hui Li
2022
journals/compsec
Everything you control is not everything: Achieving intention-concealed visit on social networks.
Helin Li
Hui Zhu
Xiaodong Lin
Rongxing Lu
Zhipeng Yu
Wei Lan
2022
journals/tifs
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids.
Meng Zhang
Zhuorui Wu
Jun Yan
Rongxing Lu
Xiaohong Guan
2022
journals/tifs
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
Jiaqi Zhao
Hui Zhu
Fengwei Wang
Rongxing Lu
Zhe Liu
Hui Li
2022
journals/tifs
Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security.
Songnian Zhang
Suprio Ray
Rongxing Lu
Yunguo Guan
Yandong Zheng
Jun Shao
2022
journals/tifs
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare.
Yandong Zheng
Rongxing Lu
Yunguo Guan
Songnian Zhang
Jun Shao
Hui Zhu
2021
journals/compsec
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Fan Yin
Rongxing Lu
Yandong Zheng
Jun Shao
Xue Yang
Xiaohu Tang
2021
journals/tifs
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
Jindan Zhang
Rongxing Lu
Baocang Wang
Xu An Wang
2021
journals/tifs
Privacy-Enhanced Federated Learning Against Poisoning Adversaries.
Xiaoyuan Liu
Hongwei Li
Guowen Xu
Zongqi Chen
Xiaoming Huang
Rongxing Lu
2021
journals/tifs
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
Shuai Zhao
Fenghua Li
Hongwei Li
Rongxing Lu
Siqi Ren
Haiyong Bao
Jianhong Lin
Song Han
2020
journals/tifs
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data".
Xiong Li
Shanpeng Liu
Rongxing Lu
2020
journals/tifs
Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks.
Qichao Xu
Zhou Su
Rongxing Lu
2019
journals/istr
An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare.
Guoming Wang
Rongxing Lu
Cheng Huang
Yong Liang Guan
2018
conf/ccs
Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems.
Guowen Xu
Hongwei Li
Rongxing Lu
2018
conf/esorics
Efficient and Secure Outsourcing of Differentially Private Data Publication.
Jin Li
Heng Ye
Wei Wang
Wenjing Lou
Y. Thomas Hou
Jiqiang Liu
Rongxing Lu
2016
journals/tifs
Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid.
Neetesh Saxena
Bong Jun Choi
Rongxing Lu
2016
journals/tifs
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
Lichun Li
Rongxing Lu
Kim-Kwang Raymond Choo
Anwitaman Datta
Jun Shao
2016
journals/tifs
Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
Ximeng Liu
Robert H. Deng
Wenxiu Ding
Rongxing Lu
Baodong Qin
2016
journals/tifs
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
Beibei Li
Rongxing Lu
Wei Wang
Kim-Kwang Raymond Choo
2016
journals/tifs
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Rongxing Lu
Jin Li
2016
conf/ccs
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Cheng Huang
Rongxing Lu
Hui Zhu
Jun Shao
Xiaodong Lin
2016
conf/acisp
Proxy Re-encryption with Delegatable Verifiability.
Xiaodong Lin
Rongxing Lu
2014
conf/provsec
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Rongxing Lu
Xiaodong Lin
Jun Shao
Kaitai Liang
2010
conf/ccs
Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Rongxing Lu
Xiaodong Lin
Xiaohui Liang
Xuemin (Sherman) Shen
2007
journals/compsec
Simple three-party key exchange protocol.
Rongxing Lu
Zhenfu Cao
2007
conf/esorics
Efficient Password-Based Authenticated Key Exchange Without Public Information.
Jun Shao
Zhenfu Cao
Licheng Wang
Rongxing Lu
2006
conf/cans
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
Rongxing Lu
Zhenfu Cao
Xiaolei Dong
2005
conf/cans
Constructing Secure Warrant-Based Proxy Signcryption Schemes.
Yuan Zhou
Zhenfu Cao
Rongxing Lu
Coauthors
Andi Liu
(1)
Anwitaman Datta
(1)
Baocang Wang
(1)
Baodong Qin
(1)
Beibei Li
(1)
Bong Jun Choi
(1)
Boyu Zhao
(1)
Cheng Huang
(2)
Chenglu Jin
(1)
Chengyi Qin
(1)
Dongyu Li
(1)
Ellen Z. Zhang
(1)
Fan Yin
(1)
Fanghong Guo
(1)
Fenghua Li
(1)
Fengwei Wang
(9)
Guanlin Li
(1)
Guiyi Wei
(1)
Guoming Wang
(1)
Guowen Xu
(3)
Guozhang He
(1)
Haiyong Bao
(1)
Han Qiu
(1)
Hao Wang
(1)
Harry Zhang
(1)
Helin Li
(1)
Heng Ye
(1)
Henry Yuan
(1)
Hongwei Li
(3)
Hui Li
(10)
Hui Zhu
(13)
Jianbing Ni
(2)
Jianhong Lin
(1)
Jianting Ning
(1)
Jianying Zhou
(1)
Jiaqi Zhao
(3)
Jiezhen Tang
(1)
Jin Li
(2)
Jindan Zhang
(1)
Jiqiang Liu
(1)
Jiwei Li
(1)
Joseph K. Liu
(1)
Jun Shao
(14)
Jun Yan
(1)
Junpeng Zhang
(1)
Kaitai Liang
(1)
Kaiyao Miao
(1)
Kim-Kwang Raymond Choo
(2)
Lei Wu
(1)
Licheng Wang
(1)
Lichun Li
(1)
Man Ho Au
(1)
Meng Zhang
(2)
Neetesh Saxena
(1)
Qi Li
(1)
Qianhong Wu
(1)
Qichao Xu
(1)
Robert H. Deng
(1)
Rongxing Lu
(47)
Run Wang
(1)
Shangwei Guo
(1)
Shanpeng Liu
(1)
Shuai Zhao
(1)
Siqi Ren
(1)
Song Han
(1)
Songnian Zhang
(9)
Suprio Ray
(1)
Tianwei Zhang
(1)
Wei Lan
(1)
Wei Wang
(1)
Wei Wang
(1)
Wei Xu
(1)
Wenjing Lou
(1)
Wenxiu Ding
(1)
Wenying Zhang
(1)
Willy Susilo
(1)
Xiangman Li
(2)
Xiaodong Lin
(5)
Xiaodong Wu
(2)
Xiaofeng Jia
(1)
Xiaohong Guan
(2)
Xiaohu Tang
(1)
Xiaohui Liang
(1)
Xiaolei Dong
(1)
Xiaoming Huang
(1)
Xiaoyuan Liu
(1)
Ximeng Liu
(1)
Xinyi Huang
(1)
Xiong Li
(1)
Xu An Wang
(1)
Xue Yang
(2)
Xue-Yang Li
(1)
Xuelian Cao
(1)
Xuemin (Sherman) Shen
(1)
Y. Thomas Hou
(1)
Yandong Zheng
(11)
Yizhong Liu
(1)
Yong Liang Guan
(1)
Yuan Lu
(1)
Yuan Zhou
(1)
Yunguo Guan
(9)
Zhe Liu
(1)
Zhe Yu
(1)
Zhenfu Cao
(4)
Zheng Yang
(1)
Zhengchun Zhou
(1)
Zhenguang Liu
(1)
Zhi Li
(1)
Zhiming Liu
(1)
Zhipeng Yu
(1)
Zhou Su
(1)
Zhuorui Wu
(1)
Zihui Xu
(1)
Zongqi Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to