What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiaohua Jia
Google Scholar
ORCID:
0000-0001-8702-8302
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Private Sample Alignment for Vertical Federated Learning: An Efficient and Reliable Realization.
Yuxin Xi
Yu Guo
Shiyuan Xu
Chengjun Cai
Xiaohua Jia
2024
journals/tifs
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems.
Chen Zhang
Yulong Ming
Mingyue Wang
Yu Guo
Xiaohua Jia
2024
journals/tifs
MI-VFDNN: An Efficient Vertical Federated Deep Neural Network With Multi-Layer Interaction.
Xiao Sun
Haining Yu
Zhichao Liu
Xiaohua Jia
2024
journals/tifs
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing.
Mingyue Wang
Zizhuo Chen
Yinbin Miao
Hejiao Huang
Cong Wang
Xiaohua Jia
2024
journals/tifs
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers.
Yu Guo
Yu Zhao
Saihui Hou
Cong Wang
Xiaohua Jia
2024
journals/tifs
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage.
Haodi Wang
Yu Guo
Rongfang Bie
Xiaohua Jia
2024
journals/tifs
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing.
Mingyang Song
Zhongyun Hua
Yifeng Zheng
Tao Xiang
Xiaohua Jia
2024
journals/tifs
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Cong Wang
2024
conf/uss
GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
2024
conf/esorics
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting.
Rui Lian
Yulong Ming
Chengjun Cai
Yifeng Zheng
Cong Wang
Xiaohua Jia
2023
journals/tifs
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Qian Wang
Cong Wang
2023
journals/tifs
APFed: Anti-Poisoning Attacks in Privacy-Preserving Heterogeneous Federated Learning.
Xiao Chen
Haining Yu
Xiaohua Jia
Xiangzhan Yu
2022
journals/tifs
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Xun Yi
2022
journals/tifs
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Hejiao Huang
Cong Wang
2022
conf/ccs
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls.
Chengjun Cai
Yichen Zang
Cong Wang
Xiaohua Jia
Qian Wang
2021
journals/tifs
A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server.
Hongcheng Xie
Yu Guo
Xiaohua Jia
2019
journals/tifs
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service.
Yuchuan Luo
Xiaohua Jia
Shaojing Fu
Ming Xu
2018
conf/ccs
Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes.
Yu Guo
Cong Wang
Xiaohua Jia
2017
conf/ccs
EncKV: An Encrypted Key-value Store with Rich Queries.
Xingliang Yuan
Yu Guo
Xinyu Wang
Cong Wang
Baochun Li
Xiaohua Jia
2013
journals/tifs
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.
Kan Yang
Xiaohua Jia
Kui Ren
Bo Zhang
Ruitao Xie
2013
conf/ccs
Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Kan Yang
Xiaohua Jia
Kui Ren
Coauthors
Baochun Li
(1)
Bo Zhang
(1)
Chen Zhang
(1)
Chengjun Cai
(3)
Cong Wang
(9)
Haining Yu
(2)
Haodi Wang
(1)
Hejiao Huang
(2)
Hongcheng Xie
(1)
Kan Yang
(2)
Kui Ren
(2)
Ming Xu
(1)
Mingyang Song
(1)
Mingyue Wang
(2)
Qian Wang
(2)
Rongfang Bie
(1)
Rui Lian
(1)
Ruitao Xie
(1)
Saihui Hou
(1)
Shaojing Fu
(1)
Shiyuan Xu
(1)
Songlei Wang
(5)
Tao Xiang
(1)
Xiangzhan Yu
(1)
Xiao Chen
(1)
Xiao Sun
(1)
Xiaohua Jia
(21)
Xingliang Yuan
(1)
Xinyu Wang
(1)
Xun Yi
(1)
Yichen Zang
(1)
Yifeng Zheng
(7)
Yinbin Miao
(1)
Yu Guo
(7)
Yu Zhao
(1)
Yuchuan Luo
(1)
Yulong Ming
(2)
Yuxin Xi
(1)
Zhichao Liu
(1)
Zhongyun Hua
(1)
Zizhuo Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to