Xingliang Yuan bio photo

Xingliang Yuan

When you risk it all, sky is the limit.

  Scholar Github e-Mail

Publication

You can also browse my Google Scholar profile.

Journal

  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Squicciarini, and Kui Ren,
    Towards Privacy-preserving and Practical Image-centric Social Discovery
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 15, no. 5, pp. 868-882, 2018
    [BibTeX] [Link]

    @article{YWWSR-TDSC16,
      author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Anna Squicciarini and Kui Ren},
      title = {Towards Privacy-preserving and Practical Image-centric Social Discovery},
      journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},
      volume={15},
      number={5},
      pages={251 - 265},
      year = {2018},
      publisher={IEEE}
    }
    
  • Cong Wang, Xingliang Yuan, Yong Cui, and Kui Ren,
    Towards Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond
    IEEE Network Magazine, vol. 32, no. 1, pp. 166-171, 2017
    [BibTeX] [Link]

    @article{WYCR-NETWORK17,
      author = {Cong Wang and Xingliang Yuan and Yong Cui and Kui Ren},
      title = {Towards Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond},
      journal = {IEEE Network Magazine},
      volume={32},
      number={1},
      pages={166 - 171},
      year = {2017},
      publisher={IEEE}
    }
    
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, and Sarana Nutanong,
    Privacy-preserving Similarity Joins Over Encrypted Data
    IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 11, pp. 2763-2775, 2017
    [BibTeX] [Link]

    @article{YWWSR-TIFS17,
      author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Anna Squicciarini and Kui Ren},
      title = {Privacy-preserving Similarity Joins Over Encrypted Data},
      journal = {IEEE Transactions on Information Forensics and Security (TIFS)},
      volume={12},
      number={11},
      pages={2763-2775},
      year = {2017},
      publisher={IEEE}
    }
    
  • Jinghua Jiang*, Yifeng Zheng*, Xingliang Yuan, Zhenkui Shi, Xiaolin Gui, Cong Wang, and Jing Yao,
    Towards Secure and Accurate Targeted Mobile Coupon Delivery
    IEEE ACCESS, vol. 4, pp. 8116-8126, 2016.
    [BibTeX] [Link]

    @article{JZYSGWY-ACCESS16,
      author  = {Jinghua Jiang and Yifeng Zheng and Xingliang Yuan and Zhenkui Shi and Xiaolin Gui and Cong Wang and Jing Yao},
      title   = {Towards Secure and Accurate Targeted Mobile Coupon Delivery},
      journal = {IEEE ACCESS},
      volume={4},
      pages={8116 - 8126},
      year = {2016},
      publisher={IEEE}
    }
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui,
    Towards Encrypted Cloud Media Centre with Secure Deduplication
    IEEE Transactions on Multimedia (TMM), vol. 19, no. 2, pp. 251-265, 2016.
    [BibTeX] [Link]

    @article{ZYWJWG-TMM16,
      author  = {Yifeng Zheng and Xingliang Yuan and Xinyu Wang and Jinghua Jiang and Cong Wang and Xiaolin Gui, },
      title   = {Towards Encrypted Cloud Media Centre with Secure Deduplication},
      journal = {IEEE Transactions on Multimedia (TMM)},
      volume={19},
      number={2},
      pages={251 - 265},
      year = {2016},
      publisher={IEEE}
    }
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, and Kui Ren,
    Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
    IEEE Transactions on Multimedia (TMM), vol. 18, no. 10, pp. 1-13, 2016.
    [BibTeX] [Link]

    @article{YWWWR-TMM16,
      author  = {Xingliang Yuan and Xinyu Wang and Cong Wang and Jian Weng and Kui Ren},
      title   = {Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing},
      journal = {IEEE Transactions on Multimedia (TMM)},
      volume={18},
      number={10},
      pages={1--13},
      year = {2016},
      publisher={IEEE}
    }
  • Helei Cui, Xingliang Yuan, and Cong Wang,
    Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing
    IEEE Transactions on Mobile Computing (TMC), vol. 16, no. 5, pp. 1315-1329, 2016.
    [BibTeX] [Link]

    @article{CYW-TMC16,
      author  = {Helei Cui and Xingliang Yuan and Cong Wang},
      title   = {Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing},
      journal = {IEEE Transactions on Mobile Computing (TMC)},
      volume={16},
      number={15},
      pages={1315--1329},
      year = {2016},
      publisher={IEEE}
    }
  • Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-Jose Montpetit, and Shucheng Liu,
    Enabling Secure and Efficient Video Delivery through Encrypted In-network Caching
    IEEE Journal on Selected Areas in Communications (JSAC), vol. 34, no. 8, pp. 1-14, 2016.
    [BibTeX] [Link]

    @article{YWWCWWML-JSAC16,
      author  = {Xingliang Yuan and Xinyu Wang and Jinfan Wang and Yilei Chu and Cong Wang and Jianping Wang and Marie-Jose Montpetit and Shucheng Liu},
      title   = {Enabling Secure and Efficient Video Delivery through Encrypted In-network Caching},
      journal = {IEEE Journal on Selected Areas in Communications (JSAC)},
      volume={34},
      number={8},
      pages={1--14},
      year = {2016},
      publisher={IEEE}
    }

Conference

  • Xiaoting Tang, Cong Wang, Xingliang Yuan, and Qian Wang,
    Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications
    IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 2018. (Acceptance ratio: 309/1606 = 19.2%)
    [BibTeX] [Link]

    @inproceedings{TYWW-INFOCOM18,
      author = {Xiaoting Tang and Cong Wang and Xingliang Yuan and Qian Wang},
      title = {Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications},
      booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
      year = {2018}
    }
    
  • Xu Yuan, Xingliang Yuan, Baochun Li, and Cong Wang,
    Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores
    IEEE Conference on Communications and Network Security (CNS), Las Vegas, USA, 2017.
    [BibTeX] [Link]

    @inproceedings{YYLW-CNS17,
      author = {Xu Yuan and Xingliang Yuan and Baochun Li and Cong Wang},
      title = {Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores},
      booktitle = {IEEE Conference on Communications and Network Security (CNS)},
      year = {2017}
    }
    
  • Chengjun Cai, Xingliang Yuan, and Cong Wang,
    Hardening Distributed and Encrypted Keyword Search via Blockchain
    IEEE Symposium on Privacy-Aware Computing (PAC), Washington, USA, 2017.
    [BibTeX] [Link]

    @inproceedings{CYW-PAC17,
      author = {Chengjun Cai and Xingliang Yuan and and Cong Wang},
      title = {Hardening Distributed and Encrypted Keyword Search via Blockchain},
      booktitle = {IEEE Symposium on Privacy-Aware Computing (PAC)},
      year = {2017}
    }
    
  • Xiaoning Liu, Xingliang Yuan, and Cong Wang,
    EncSIM: An Encrypted Similarity Search Service for Distributed High-dimensional Datasets
    IEEE/ACM International Symposium on Quality of Service (IWQoS), Barcelona, Spain, 2017. (Acceptance ratio: 29/149 = 19.5%)
    [BibTeX] [Link]

    @inproceedings{LYW-IWQOS17,
      author = {Xiaoning Liu and Xingliang Yuan and and Cong Wang},
      title = {EncSIM: An Encrypted Similarity Search Service for Distributed High-dimensional Datasets},
      booktitle = {IEEE/ACM International Symposium on Quality of Service (IWQoS)},
      year = {2017}
    }
    
  • Chengjun Cai, Xingliang Yuan, and Cong Wang,
    Towards Trustworthy and Private Keyword Search in Encrypted Decentralized Storage
    IEEE Communication and Information Systems Security Symposium (ICC), Paris, France, 2017.
    [BibTeX] [Link]

    @inproceedings{CYW-ICC17,
      author = {Chengjun Cai and Xingliang Yuan and and Cong Wang},
      title = {Towards Trustworthy and Private Keyword Search in Encrypted Decentralized Storage},
      booktitle = {IEEE Communication and Information Systems Security Symposium (ICC)},
      year = {2017}
    }
    
  • Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, and Xiaohua Jia,
    EncKV: An Encrypted Key-value Store with Rich Queries
    ACM Asia Conference on Computer and Communications Security (ASIACCS), Abu Dhabi, UAE, 2017. (Acceptance ratio: 67/359 = 18.6%)
    [BibTeX] [Link] [Code]

    @inproceedings{YGWWLJ-ASIACCS17,
      author = {Xingliang Yuan and Yu Guo and Xinyu Wang and Cong Wang and Baochun Li and and Xiaohua Jia},
      title = {EncKV: An Encrypted Key-value Store with Rich Queries},
      booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)},
      year = {2017}
    }
    
  • Xingliang Yuan, Huayi Duan, and Cong Wang,
    Bringing Execution Assurances of Pattern Matching in Outsourced Middleboxes
    IEEE International Conference on Network Protocols (ICNP), Singapore, 2016. (Acceptance ratio: 46/229 = 20%)
    [BibTeX] [Link]

    @inproceedings{YDW-ICNP16,
      author = {Xingliang Yuan and Huayi Duan and and Cong Wang},
      title = {Bringing Execution Assurances of Pattern Matching in Outsourced Middleboxes},
      booktitle = {IEEE International Conference on Network Protocols (ICNP)},
      year = {2016}
    }
    
  • Chengcheng Dai, Xingliang Yuan, and Cong Wang,
    Privacy-Preserving Ridesharing Recommendation in Geosocial Networks
    International Conference on Computational Social Networks (CSoNet), Ho Chi Minh City, Viet Nam, 2016. (Invited Paper)
    [BibTeX] [Link]

    @inproceedings{DYW-CSoNet16,
      author = {Chengcheng Dai and Xingliang Yuan and Cong Wang},
      title = {Privacy-Preserving Ridesharing Recommendation in Geosocial Networks},
      booktitle = {International Conference on Computational Social Networks (CSoNet)},
      year = {2016}
    }
    
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin,
    Building an Encrypted, Distributed, and Searchable Key-value Store
    ACM Asia Conference on Computer and Communications Security (ASIACCS), Xi'an, China, 2016. (Acceptance ratio: 73/350 = 20.9%)
    [BibTeX] [Link] [Code]

    @inproceedings{YWWQL-ASIACCS16,
      author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Chen Qian and and Jianxiong Lin},
      title = {Building an Encrypted, Distributed, and Searchable Key-value Store},
      booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)},
      year = {2016}
    }
    
  • Xingliang Yuan, Xinyu Wang, Jianxiong Lin, and Cong Wang,
    Privacy-preserving Deep Packet Inspection in Outsourced Middleboxes
    IEEE International Conference on Computer Communications (INFOCOM), San Francisco, USA, 2016. (Acceptance ratio: 300/1644 = 18.25%)
    [BibTeX] [Link]

    @inproceedings{YWLW-INFOCOM16,
      author = {Xingliang Yuan and Xinyu Wang and Jianxiong Lin and Cong Wang},
      title = {Privacy-preserving Deep Packet Inspection in Outsourced Middleboxes},
      booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
      year = {2016}
    }
    
  • Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang,
    Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
    IEEE International Conference on Computer Communications (INFOCOM), San Francisco, USA, 2016. (Acceptance ratio: 300/1644 = 18.25%)
    [BibTeX] [Link] [Code]

    @inproceedings{CYZW-INFOCOM16,
      author = {Helei Cui and Xingliang Yuan and Yifeng Zheng and Cong Wang},
      title = {Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage},
      booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
      year = {2016}
    }
    
  • Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, and Cong Wang,
    Towards Secure and Practical Targeted Mobile Advertising
    International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Shenzhen, China, 2015. (Best Paper Award)
    [BibTeX] [Link]

    @inproceedings{JGSYW-MSN16,
      author = {Jinghua Jiang and Xiaolin Gui and Zhenkui Shi and Xingliang Yuan and Cong Wang},
      title = {Towards Secure and Practical Targeted Mobile Advertising},
      booktitle = {International Conference on Mobile Ad-hoc and Sensor Networks (MSN)},
      year = {2015}
    }
    
  • Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang,
    Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records
    European Symposium on Research in Computer Security (ESORICS), Vienna, Austria, 2015. (Acceptance ratio: 58/293 = 19.8%)
    [BibTeX] [Link]

    @inproceedings{YCWW-ESORICS15,
      author = {Xingliang Yuan and Helei Cui and Xinyu Wang and Cong Wang},
      title = {Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records},
      booktitle = {European Symposium on Research in Computer Security (ESORICS)},
      year = {2015}
    }
    
  • Xingliang Yuan, Cong Wang and Kui Ren,
    Enabling IP Protection for Outsourced Integrated Circuit Design
    ACM Asia Conference on Computer and Communications Security (ASIACCS), Singapore, 2015. (Acceptance ratio for full papers: 48/269 = 17.8%)
    [BibTeX] [Link]

    @inproceedings{YWR-ASIACCS15,
      author = {Xingliang Yuan and Cong Wang and Kui Ren},
      title = {Enabling IP Protection for Outsourced Integrated Circuit Design},
      booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)},
      year = {2015}
    }
    
  • Yifeng Zheng*, Xingliang Yuan*, Xinyu Wang, Jinghua Jiang, Cong Wang and Xiaolin Gui,
    Enabling Encrypted Cloud Media Center with Secure Deduplication
    ACM Asia Conference on Computer and Communications Security (ASIACCS), Singapore, 2015. (Acceptance ratio for full papers: 48/269 = 17.8%)
    [BibTeX] [Link]

    @inproceedings{ZYWJWG-ASIACCS15,
      author = {Yifeng Zheng and Xingliang Yuan and Xinyu Wang and Jinghua Jiang and Cong Wang and Xiaolin Gui},
      title = {Enabling Encrypted Cloud Media Center with Secure Deduplication},
      booktitle = {ACM Asia Conference on Computer and Communications Security (AISACCS)},
      year = {2015}
    }
    
  • Helei Cui, Xingliang Yuan, and Cong Wang,
    Harnessing Encrypted Data in Cloud for Secure and Efficient Image Sharing from Mobile Devices
    IEEE International Conference on Computer Communications (INFOCOM), Hong Kong, China, 2015. (Acceptance ratio: 316/1640 = 19.2%)
    [BibTeX] [Link]

    @inproceedings{CYW-INFOCOM15,
      author = {Helei Cui and Xingliang Yuan and Cong Wang},
      title = {Harnessing Encrypted Data in Cloud for Secure and Efficient Image Sharing from Mobile Devices},
      booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
      year = {2015}
    }
    
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Squicciarini, and Kui Ren,
    Enabling Privacy-preserving Image-centric Social Discovery
    IEEE International Conference on Distributed Computing Systems (ICDCS), Madrid, Spain, 2014. (Acceptance ratio: 66/500+ = 13%)
    [BibTeX] [Link]

    @inproceedings{YWWSR-ICDCS14,
      author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Anna Squicciarini and Kui Ren},
      title = {Enabling Privacy-preserving Image-centric Social Discovery},
      booktitle = {IEEE International Conference on Distributed Computing Systems (ICDCS)},
      year = {2014}
    }
    
  • Xingliang Yuan, and Jia Wang,
    Statistical Timing Verification for Transparently Latched Circuits through Structural Graph Traversal
    Asia and South Pacific Design Automation Conference (ASPDAC), Taipei, Taiwan, 2010.
    [BibTeX] [Link]

    @inproceedings{YW-ASPDAC14,
      author = {Xingliang Yuan and Jia Wang},
      title = {Statistical Timing Verification for Transparently Latched Circuits through Structural Graph Traversal},
      booktitle = {Asia and South Pacific Design Automation Conference (ASPDAC)},
      year = {2010}
    }