Xuefeng Liu

ORCID: 0000-0002-7343-6302
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Business Strategy and Innovation
  • Blockchain Technology Applications and Security
  • Biometric Identification and Security
  • Organ Transplantation Techniques and Outcomes
  • Geotechnical Engineering and Soil Mechanics
  • Face recognition and analysis
  • Liver physiology and pathology
  • IoT and Edge/Fog Computing
  • Geotechnical Engineering and Underground Structures
  • Complex Network Analysis Techniques
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Security and Verification in Computing
  • Speech Recognition and Synthesis
  • Security in Wireless Sensor Networks
  • Cardiac, Anesthesia and Surgical Outcomes
  • Topic Modeling
  • Smart Grid Security and Resilience
  • Model Reduction and Neural Networks
  • Matrix Theory and Algorithms

Xidian University
2015-2025

Civil Aviation University of China
2020-2024

China University of Petroleum, East China
2023

Xiamen University
2015-2020

Niigata University
2020

Loyola University Maryland
2019

Hebei University of Science and Technology
2019

Chinese University of Hong Kong
2010-2017

University of Hong Kong
2010-2017

Chang'an University
2017

With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among users. Unfortunately, data in a multi-owner manner while preserving identity privacy from untrusted is still challenging issue, due to frequent change membership. In this paper, we propose secure scheme, named Mona, dynamic groups cloud. By leveraging signature broadcast encryption techniques, any user can anonymously share with others. Meanwhile, storage...

10.1109/tpds.2012.331 article EN IEEE Transactions on Parallel and Distributed Systems 2012-12-05

Current knowledge on the shear wave velocity (V s ) and associated stiffness (G 0 of sand is built mainly results extensive laboratory studies clean quartz sands. Often natural sands are not clean, but contain a certain amount fines. The role fines in altering matter great concern, yet remains poorly understood. This paper presents an investigation into problem through well-controlled experiments conjunction with analysis interpretation at macro micro scale. were conducted for sequence...

10.1680/jgeot.15.p.205 article EN Géotechnique 2016-02-17

Mobile crowdsensing (MCS) has gained popularity for its potential to leverage individual mobile devices sense, collect, and analyze data instead of deploying sensors. As the sensing become increasingly fine-grained complicated, there is a tendency enhance MCS with edge computing paradigm reduce time delays high bandwidth costs. The may reveal personal information, thus it great significance preserve privacy participants. However, preserving hinder process handling malicious In this paper, we...

10.1109/tsc.2018.2825986 article EN IEEE Transactions on Services Computing 2018-04-12

Encrypted data search allows cloud to offer fundamental information retrieval service its users in a privacypreserving way.In most existing schemes, result is returned by semi-trusted server and usually considered authentic.However, practice, the may malfunction or even be malicious itself.Therefore, need verification mechanism detect potential misbehavior this computation outsourcing model rebuild their confidence whole process.On other hand, typically hosts large outsourced of storage.The...

10.1109/infocom.2015.7218596 article EN 2015-04-01

In this paper, we investigate the problem of integrity auditing for cloud deduplication storage. Specifically, in addition to outsourced data confidentiality, also aim ensure deduplicated With existing works based on Provable Data Possession (PDP)/Proof Retrievability (PoR), are either required rely a fully trusted proxy server or inevitably sacrifice privacy and efficiency. contrast, present novel message-locked scheme without an additional server, which is applicable both file-level...

10.1109/infocom.2017.8056999 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

With the massive deployment of Internet Things (IoT) devices, many data analysis applications emerge for large amount accumulated by IoT. Federated learning (FedL) on IoT devices is an appealing mode to train a precise model. However, existing FedL schemes either take expensive computation costs (e.g., public-key cryptographic operations) or number interactions among participants. Obviously, these are unsuitable due limited computational and communication resources. In this work, we propose...

10.1109/jiot.2021.3127886 article EN IEEE Internet of Things Journal 2021-11-15

10.1109/tifs.2025.3561662 article EN IEEE Transactions on Information Forensics and Security 2025-01-01

ABSTRACT By integrating the traditional grid with advanced communication and information technologies, smart can provide a reliable efficient energy service for our modern society. Data aggregation plays an important role in evaluating current usage of consumer domains, based on which operation center accommodate distributed power sources to maximize utilization efficiency. However, it also incurs potential risk privacy. In this paper, we propose anonymous multi‐dimensional data systems....

10.1002/sec.761 article EN Security and Communication Networks 2013-03-21

IEEE 802.16 m is now under consideration by the ITU to become IMT-Advanced standard. However, handover authentication a critical issue in this area. In letter, we propose fast mechanism based on ticket for m. The credential of Mobile Station (MS) issued access Base (BS) using multi-BS group key during initial authentication. When MS moves from service BS target BS, it can show its and authenticate without communicating with any other third party (e.g., previous server). Our analysis shows...

10.1109/lcomm.2010.12.100818 article EN IEEE Communications Letters 2010-11-09

Extensible Authentication Protocol (EAP) is a framework which aims to provide flexible authentication for wireless networks. Due the involvement of an EAP server and several round trips between mobile node (MN) server, full takes about 1000ms unacceptable in handover process. This paper proposes privacy preserving scheme EAP-based We use proxy signature accomplish MN access point (AP) without involving third party. The detailed security analysis shows that our can achieve forward/backward...

10.1109/glocom.2011.6133722 article EN 2011-12-01

The face recognition has become a common means of identity authentication because the advantages uniqueness, non-invasive and not easy to be stolen. outsourcing service provider is typical manner nowadays. However, it raises vital concerns about privacy server due sensitivity data. Therefore, frame based on technology privacy-preserving presented in this paper. convolutional neural network used for feature extraction. To overcome issue leaked, method secure nearest neighbor that can compute...

10.1109/access.2019.2894535 article EN cc-by-nc-nd IEEE Access 2019-01-01

Tight sandstone reservoirs are characterized by multi-scale pore space and high clay content, resulting in intricate rock physical responses. In this work, imaging techniques, including computed tomography stitched scanning electron microscopy, applied to identify the large intergranular pores micropores within major minerals. The structure of tight sandstones is quantitatively investigated using images. Besides, multi-mineral digital rocks constructed performing registration segmentation...

10.46690/ager.2023.07.07 article EN ADVANCES IN GEO-ENERGY RESEARCH 2023-07-16

Abstract To provide secure roaming services for mobile users in Global Mobility Networks, many schemes have been proposed recent years. However, most of them focus only on authentication and fail to satisfy practical security requirements such as user anonymity untraceability. address this problem, we propose a privacy‐preserving scheme based elliptic curve cryptography. The is provably under formal model that satisfies all requirements. Compared with existing schemes, ours enjoys better...

10.1002/sec.1209 article EN Security and Communication Networks 2015-02-09

In the design and construction of large-scale earth structures such as hydraulic fills for artificial islands or tailings dams, a major concern is susceptibility sand to flow failure liquefaction. The big challenge in liquefaction evaluation evaluate situ state sand, because it extremely difficult obtain high-quality undisturbed samples that purpose. Here an attractive framework presented, which allows direct states sands with varying quantity fines through shear wave velocity measurements....

10.1680/jgeot.16.p.254 article EN Géotechnique 2017-07-13

This paper investigates improving lightly supervised acoustic model training for an archive of broadcast data.Standard uses automatically derived decoding hypotheses using a biased language model.However, as the actual speech can deviate significantly from original programme scripts that are supplied, quality standard be poor.To address this issue, word and segment level combination approaches used between transcripts which yield improved transcriptions.Experimental results show systems...

10.21437/interspeech.2013-516 article EN Interspeech 2022 2013-08-25

Uploading data streams to a resource-rich cloud server for inner product evaluation, an essential building block in many popular stream applications (e.g., statistical monitoring), is appealing companies and individuals. On the other hand, verifying result of remote computation plays crucial role addressing issue trust. Since outsourced collection likely comes from multiple sources, it desired system be able pinpoint originator errors by allotting each source unique secret key, which...

10.1109/tsc.2016.2531665 article EN IEEE Transactions on Services Computing 2016-02-18

Privacy concerns of using sensitive biometric data as credentials arise with the wide adoption user-friendly face authentication. To protect facial features users, two important functions, i.e., <i>revocability</i> and <i>reusability</i> , are anticipated to be realized in a privacy-preserving authentication design. Revocability requires an effective approach deregister or replace user when server is compromised; For reusability, same should appear independently non-cooperating applications....

10.1109/tdsc.2021.3083970 article EN IEEE Transactions on Dependable and Secure Computing 2021-05-26

Smart living is a trending lifestyle that envisions lower energy consumption, sound public services, and better quality of life for human being. The Internet Things (IoT) compelling platform connecting various sensors around us to the Internet, providing great opportunities realization smart living. Spintronic with superb measuring ability multiple unique advantages can be an important piece cornerstone IoT. In this review, we discuss successful applications spintronic in electrical current...

10.48550/arxiv.1611.00317 preprint EN other-oa arXiv (Cornell University) 2016-01-01

As cloud computing is becoming prevalent, data owners are motivated to delegate complex managements the commercial for economic savings. Sensitive usually encrypted before being uploaded cloud, which unfortunately makes frequently-used search function a challenging problem. In this paper, we present new multi-keyword dynamic scheme with result ranking make over more secure and practical. scheme, employ powerful function-hiding inner product encryption enhance security by preventing leakage...

10.1109/cc.2016.7733045 article EN China Communications 2016-10-01
Coming Soon ...