Login / Signup
Runhua Xu
ORCID
Publication Activity (10 Years)
Years Active: 2013-2024
Publications (10 Years): 42
Top Topics
Lightweight
Privacy Preserving
Access Control
Vertically Partitioned Data
Top Venues
CoRR
IEEE Trans. Dependable Secur. Comput.
ECIS
ICIS
</>
Publications
</>
Chao Li
,
Runhua Xu
,
Balaji Palanisamy
,
Li Duan
,
Meng Shen
,
Jiqiang Liu
,
Wei Wang
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident.
CoRR
(2024)
Chao Li
,
Runhua Xu
,
Li Duan
Liquid Democracy in DPoS Blockchains.
CoRR
(2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
BigDataSecurity/HPSC/IDS
(2023)
Chao Li
,
Runhua Xu
,
Li Duan
Liquid Democracy in DPoS Blockchains.
BSCI
(2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
,
Jiqiang Liu
,
Wei Wang
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
CCS
(2023)
Chao Li
,
Runhua Xu
,
Li Duan
Characterizing Coin-Based Voting Governance in DPoS Blockchains.
ICWSM
(2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
,
Jiqiang Liu
,
Wei Wang
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
CoRR
(2023)
Runhua Xu
,
Chao Li
,
James Joshi
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services.
IEEE Trans. Dependable Secur. Comput.
20 (3) (2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
CoRR
(2023)
Runhua Xu
,
Nathalie Baracaldo
,
Yi Zhou
,
Ali Anwar
,
Swanand Kadhe
,
Heiko Ludwig
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting.
CoRR
(2022)
Runhua Xu
,
Nathalie Baracaldo
,
Yi Zhou
,
Ali Anwar
,
Swanand Kadhe
,
Heiko Ludwig
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting.
CLOUD
(2022)
Runhua Xu
,
James Joshi
,
Chao Li
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets.
IEEE Trans. Dependable Secur. Comput.
19 (4) (2022)
Runhua Xu
,
Nathalie Baracaldo
,
Yi Zhou
,
Ali Anwar
,
James Joshi
,
Heiko Ludwig
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data.
AISec@CCS
(2021)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Jinlai Xu
,
Jingzhe Wang
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.
CODASPY
(2021)
Runhua Xu
,
James Joshi
,
Prashant Krishnamurthy
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication.
IEEE Trans. Dependable Secur. Comput.
18 (2) (2021)
Runhua Xu
,
Nathalie Baracaldo
,
James Joshi
Privacy-Preserving Machine Learning: Methods, Challenges and Directions.
CoRR
(2021)
Runhua Xu
,
Nathalie Baracaldo
,
Yi Zhou
,
Ali Anwar
,
James Joshi
,
Heiko Ludwig
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data.
CoRR
(2021)
Runhua Xu
,
Chao Li
,
James Joshi
T3AB: Transparent and Trustworthy Third-party Authority using Blockchain.
CoRR
(2021)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Jinlai Xu
,
Jingzhe Wang
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.
CoRR
(2021)
Runhua Xu
,
James Joshi
,
Chao Li
NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets.
CoRR
(2020)
Runhua Xu
,
James Joshi
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
CoRR
(2020)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Jian Wang
,
Jiqiang Liu
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
SRDS
(2020)
Runhua Xu
,
James Joshi
Trustworthy and Transparent Third-party Authority.
ACM Trans. Internet Techn.
20 (4) (2020)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Jian Wang
,
Jiqiang Liu
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
CoRR
(2020)
Runhua Xu
,
James Joshi
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
TPS-ISA
(2020)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts.
CoRR
(2019)
Runhua Xu
,
Nathalie Baracaldo
,
Yi Zhou
,
Ali Anwar
,
Heiko Ludwig
HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning.
AISec@CCS
(2019)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
Scalable and Privacy-Preserving Design of On/Off-Chain Smart Contracts.
ICDE Workshops
(2019)
Runhua Xu
,
James B. D. Joshi
,
Chao Li
CryptoNN: Training Neural Networks over Encrypted Data.
ICDCS
(2019)
Runhua Xu
,
James B. D. Joshi
,
Chao Li
CryptoNN: Training Neural Networks over Encrypted Data.
CoRR
(2019)
Runhua Xu
,
Nathalie Baracaldo
,
Yi Zhou
,
Ali Anwar
,
Heiko Ludwig
HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning.
CoRR
(2019)
Runhua Xu
,
Balaji Palanisamy
,
James Joshi
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing.
TrustCom/BigDataSE
(2018)
Remo Manuel Frey
,
Runhua Xu
,
Alexander Ilic
Mobile app adoption in different life stages: An empirical analysis.
Pervasive Mob. Comput.
40 (2017)
Remo Manuel Frey
,
Runhua Xu
,
Christian Ammendola
,
Omar Moling
,
Giuseppe Giglio
,
Alexander Ilic
Mobile recommendations based on interest prediction from consumer's installed apps-insights from a large-scale field study.
Inf. Syst.
71 (2017)
Runhua Xu
,
Remo Manuel Frey
,
Alexander Ilic
Individual Differences and Mobile Service Adoption: An Empirical Analysis.
BigDataService
(2016)
Remo Manuel Frey
,
Runhua Xu
,
Alexander Ilic
A lightweight user tracking method for app providers.
Conf. Computing Frontiers
(2016)
Runhua Xu
,
James B. D. Joshi
An Integrated Privacy Preserving Attribute Based Access Control Framework.
CLOUD
(2016)
Runhua Xu
,
James B. D. Joshi
Enabling Attribute Based Encryption as an Internet Service.
CIC
(2016)
Runhua Xu
,
Remo Manuel Frey
,
Elgar Fleisch
,
Alexander Ilic
Understanding the impact of personality traits on mobile app adoption - Insights from a large-scale field study.
Comput. Hum. Behav.
62 (2016)
Runhua Xu
,
Bo Lang
A CP-ABE scheme with hidden policy and its application in cloud computing.
Int. J. Cloud Comput.
4 (4) (2015)
Remo M. Frey
,
Runhua Xu
,
Alexander Ilic
Reality-Mining with Smartphones: Detecting and Predicting Life Events based on App Installation Behavior.
ICIS
(2015)
Runhua Xu
,
Remo M. Frey
,
Denis Vuckovac
,
Alexander Ilic
Towards Understanding the Impact of Personality Traits on Mobile App Adoption - A Scalable Approach.
ECIS
(2015)
Runhua Xu
,
Irena Pletikosa Cvijikj
,
Tobias Kowatsch
,
Florian Michahelles
,
Dirk Büchter
,
Björn Brogle
,
Anneco Dintheer
,
Dagmar L'Allemand
,
Wolfgang Maass
Tell Me What to Eat - Design and Evaluation of a Mobile Companion Helping Children and Their Parents to Plan Nutrition Intake.
AmI
(2014)
Tobias Kowatsch
,
Wolfgang Maass
,
Irena Pletikosa Cvijikj
,
Dirk Büchter
,
Björn Brogle
,
Anneco Dintheer
,
Dunja Wiegand
,
Dominique Durrer-Schutz
,
Runhua Xu
,
Yves Schutz
,
Dagmar L'Allemand-Jander
Design of a Health Information System Enhancing the Performance of Obesity Expert and children Teams.
ECIS
(2014)
Runhua Xu
,
Alexander Ilic
Measuring and Mitigating Product Data Inaccuracy in Online Retailing.
WISE (2)
(2014)
Runhua Xu
,
Alexander Ilic
Product as a Service: Enabling Physical Products as Service End-Points.
ICIS
(2014)
Runhua Xu
,
Yang Wang
,
Bo Lang
A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.
CBD
(2013)
Bo Lang
,
Runhua Xu
,
Yawei Duan
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control.
SECRYPT
(2013)
Bo Lang
,
Runhua Xu
,
Yawei Duan
Self-contained Data Protection Scheme Based on CP-ABE.
ICETE (Selected Papers)
(2013)