Name
Affiliation
Papers
QIULIANG XU
Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
116
Collaborators
Citations 
PageRank 
129
157
42.71
Referers 
Referees 
References 
380
1664
1244
Search Limit
1001000
Title
Citations
PageRank
Year
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles00.342022
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices00.342022
Postquantum Cut-And-Choose Oblivious Transfer Protocol Based On Lwe00.342021
Quantum Secure Multi-Party Summation Based On Entanglement Swapping10.372021
Lightweight Threshold Private Set Intersection via Oblivious Transfer00.342021
An Efficient Outsourced Oblivious Transfer Extension Protocol And Its Applications00.342020
Lattice-Based Linearly Homomorphic Signature Scheme over F 200.342020
Research on Key Exchange Protocol Based on LWE00.342019
Decentralization is Vulnerable Under the Gap Game10.632019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications00.342019
Privacy preserved wireless sensor location protocols based on mobile edge computing10.362019
ID-Based Strong Designated Verifier Signature over -SIS Assumption00.342019
Keyword guessing on multi-user searchable encryption00.342019
New Empirical Traceability Analysis of CryptoNote-Style Blockchains.10.352019
Efficient and secure outsourced approximate pattern matching protocol.00.342018
Position based cryptography with location privacy: A step for Fog Computing.00.342018
Towards leakage-resilient fine-grained access control in fog computing.70.422018
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.00.342018
Analysis on the Block Reward of Fork After Withholding (FAW).00.342018
Unforgeable Watermarking Schemes with Public Extraction.00.342018
An ORAM-based privacy preserving data sharing scheme for cloud storage.10.352018
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.00.342018
Towards Security Authentication for IoT Devices with Lattice-Based ZK.00.342018
Decentralized Blacklistable Anonymous Credentials with Reputation.00.342018
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency50.402018
Lattice-Based Universal Accumulator With Nonmembership Arguments00.342018
A New Post-Quantum Blind Signature From Lattice Assumptions.00.342018
Multi-user searchable encryption with a designated server.10.362017
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.00.342017
An Efficient CPA-Secure Encryption Scheme with Equality Test00.342017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.00.342017
k-out-of-n oblivious transfer protocol with security against malicious adversaries.00.342017
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.00.342016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks30.422016
Practical Server-Aided K-Out-Of-N Oblivious Transfer Protocol00.342016
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries00.342016
Leakage-Resilient Functional Encryption via Pair Encodings.40.372016
Improved Power Analysis Attack Based On The Preprocessed Power Traces00.342016
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries00.342016
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol00.342016
Public-key encryption with keyword search secure against continual memory attacks10.352016
Social rational secure multi-party computation80.462016
File sharing in cloud computing using win stay lose shift strategy10.352015
Performance evaluation of twisted Edwards‐form elliptic curve cryptography for wireless sensor nodes00.342015
The Electronic Voting in the Presence of Rational Voters00.342015
Several Oblivious Transfer Variants in Cut-and-Choose Scenario.00.342015
Weak Leakage Resilient Extractable Hash Proof System And Construction For Weak Leakage Resilient Cca-Secure Public-Key Encryption00.342015
Cut-and-Choose Bilateral Oblivious Transfer and Its Application20.402015
Achieving fairness by sequential equilibrium in rational two‐party computation under incomplete information00.342015
Cut-and-Choose Bilateral Oblivious Transfer and Its Application00.342015
  • 1
  • 2