​
Login / Signup
Peng Xu
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 36
Top Topics
Lightweight
Execution Environment
Ciphertext
Keyword Search
Top Venues
IEEE Trans. Inf. Forensics Secur.
CoRR
Future Gener. Comput. Syst.
IEEE Trans. Ind. Informatics
</>
Publications
</>
Hao Nie
,
Wei Wang
,
Peng Xu
,
Xianglong Zhang
,
Laurence T. Yang
,
Kaitai Liang
Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
USENIX Security Symposium
(2024)
Luying Li
,
Wei Yu
,
Peng Xu
Fast and Simple Point Operations on Edwards448 and E448.
Public Key Cryptography (4)
(2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
CoRR
(2024)
Haochen Dou
,
Zhenwu Dan
,
Peng Xu
,
Wei Wang
,
Shuning Xu
,
Tianyang Chen
,
Hai Jin
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Hao Nie
,
Wei Wang
,
Peng Xu
,
Xianglong Zhang
,
Laurence T. Yang
,
Kaitai Liang
Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
CoRR
(2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
USENIX Security Symposium
(2024)
Tianyang Chen
,
Peng Xu
,
Stjepan Picek
,
Bo Luo
,
Willy Susilo
,
Hai Jin
,
Kaitai Liang
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
NDSS
(2023)
Wei Wang
,
Dongli Liu
,
Peng Xu
,
Laurence Tianruo Yang
,
Kaitai Liang
Keyword Search Shareable Encryption for Fast and Secure Data Replication.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Xianglong Zhang
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Kaitai Liang
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
CoRR
(2023)
Jiayun Fu
,
Xiaojing Ma
,
Bin B. Zhu
,
Pingyi Hu
,
Ruixin Zhao
,
Yaru Jia
,
Peng Xu
,
Hai Jin
,
Dongmei Zhang
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
NDSS
(2023)
Xianglong Zhang
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Kaitai Liang
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
USENIX Security Symposium
(2023)
Peng Xu
,
Manqing Hu
,
Tianyang Chen
,
Wei Wang
,
Hai Jin
LaF: Lattice-Based and Communication-Efficient Federated Learning.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Yubo Zheng
,
Peng Xu
,
Wei Wang
,
Tianyang Chen
,
Willy Susilo
,
Kaitai Liang
,
Hai Jin
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
ESORICS (2)
(2022)
Peng Xu
,
Willy Susilo
,
Wei Wang
,
Tianyang Chen
,
Qianhong Wu
,
Kaitai Liang
,
Hai Jin
ROSE: Robust Searchable Encryption With Forward and Backward Security.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Peng Xu
,
Ruijie Sun
,
Wei Wang
,
Tianyang Chen
,
Yubo Zheng
,
Hai Jin
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment.
Future Gener. Comput. Syst.
125 (2021)
Peng Xu
,
Willy Susilo
,
Wei Wang
,
Tianyang Chen
,
Qianhong Wu
,
Hai Jin
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance.
IACR Cryptol. ePrint Arch.
2021 (2021)
Peiming Xu
,
Shaohua Tang
,
Peng Xu
,
Qianhong Wu
,
Honggang Hu
,
Willy Susilo
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server.
IEEE Trans. Serv. Comput.
14 (6) (2021)
Yulin Wu
,
Xuan Wang
,
Willy Susilo
,
Guomin Yang
,
Zoe Lin Jiang
,
Qian Chen
,
Peng Xu
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput.
18 (6) (2021)
Wei Wang
,
Cheng Fang
,
Laurence Tianruo Yang
,
Hongrui Duan
,
Peng Xu
A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT.
IEEE Trans. Ind. Informatics
17 (11) (2021)
Tianyang Chen
,
Peng Xu
,
Wei Wang
,
Yubo Zheng
,
Willy Susilo
,
Hai Jin
Bestie: Very Practical Searchable Encryption with Forward and Backward Security.
ESORICS (2)
(2021)
Wei Wang
,
Peng Xu
,
Dongli Liu
,
Laurence Tianruo Yang
,
Zheng Yan
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics
16 (6) (2020)
Ye Tao
,
Peng Xu
,
Hai Jin
Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage.
IEEE Access
8 (2020)
Junfang Wu
,
Weizhong Qiang
,
Tianqing Zhu
,
Hai Jin
,
Peng Xu
,
Sheng Shen
Differential Privacy Preservation for Smart Meter Systems.
ICA3PP (1)
(2019)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
,
Jinjun Chen
Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE Trans. Serv. Comput.
11 (5) (2018)
Peng Xu
,
Shuanghong He
,
Wei Wang
,
Willy Susilo
,
Hai Jin
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks.
IEEE Trans. Ind. Informatics
14 (8) (2018)
Wei Wang
,
Peng Xu
,
Laurence T. Yang
Secure Data Collection, Storage and Access in Cloud-Assisted IoT.
IEEE Cloud Comput.
5 (4) (2018)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
,
Willy Susilo
,
Jinjun Chen
Securely Reinforcing Synchronization for Embedded Online Contests.
ACM Trans. Embed. Comput. Syst.
16 (2) (2017)
Peng Xu
,
Shuai Liang
,
Wei Wang
,
Willy Susilo
,
Qianhong Wu
,
Hai Jin
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
ACISP (1)
(2017)
Peng Xu
,
Xia Gao
,
Wei Wang
,
Willy Susilo
,
Qianhong Wu
,
Hai Jin
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch.
2017 (2017)
Peng Xu
,
Xiaolan Tang
,
Wei Wang
,
Hai Jin
,
Laurence T. Yang
Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT.
IEEE Access
5 (2017)
Feng Lu
,
Weikang Zhang
,
Liwen Shao
,
Xunfei Jiang
,
Peng Xu
,
Hai Jin
Scalable influence maximization under independent cascade model.
J. Netw. Comput. Appl.
86 (2017)
Peng Xu
,
Jun Xu
,
Wei Wang
,
Hai Jin
,
Willy Susilo
,
Deqing Zou
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
AsiaCCS
(2016)
Wei Wang
,
Peng Xu
,
Hui Li
,
Laurence Tianruo Yang
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Gener. Comput. Syst.
55 (2016)
Peng Xu
,
Jingnan Li
,
Wei Wang
,
Hai Jin
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
AsiaCCS
(2016)
Peng Xu
,
Tengfei Jiao
,
Qianhong Wu
,
Wei Wang
,
Hai Jin
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers
65 (1) (2016)
Daibin Wang
,
Hai Jin
,
Deqing Zou
,
Peng Xu
,
Tianqing Zhu
,
Gang Chen
Taming transitive permission attack via bytecode rewriting on Android application.
Secur. Commun. Networks
9 (13) (2016)
Peng Xu
,
Qianhong Wu
,
Wei Wang
,
Willy Susilo
,
Josep Domingo-Ferrer
,
Hai Jin
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur.
10 (9) (2015)
Peng Xu
,
Qianhong Wu
,
Wei Wang
,
Willy Susilo
,
Josep Domingo-Ferrer
,
Hai Jin
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search.
CoRR
(2015)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
One-Pass Anonymous Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE MS
(2015)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
,
Hui Li
A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Gener. Comput. Syst.
52 (2015)
Ayad Ibrahim
,
Hai Jin
,
Ali A. Yassin
,
Deqing Zou
,
Peng Xu
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing.
Comput. J.
57 (2) (2014)
Wei Wang
,
Peng Xu
,
Hui Li
,
Laurence Tianruo Yang
A Secure Synchronized Reading system over time-critical online contests.
ICC
(2014)
Peng Xu
,
Hai Jin
,
Qianhong Wu
,
Wei Wang
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers
62 (11) (2013)
Peng Xu
,
Hai Jin
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS.
IACR Cryptol. ePrint Arch.
2011 (2011)
Peng Xu
,
Hai Jin
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IACR Cryptol. ePrint Arch.
2010 (2010)