Follow
saiyu qi
saiyu qi
Associate professor, Xi'an Jiaotong University
Verified email at connect.ust.hk
Title
Cited by
Cited by
Year
Efficient data access control with fine-grained data protection in cloud-assisted IIoT
S Qi, Y Lu, W Wei, X Chen
IEEE Internet of Things Journal 8 (4), 2886-2899, 2020
872020
Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain
S Qi, Y Lu, Y Zheng, Y Li, X Chen
IEEE Transactions on Industrial Informatics 17 (4), 2376-2387, 2020
812020
Scalable industry data access control in RFID-enabled supply chain
S Qi, Y Zheng, M Li, Y Liu, J Qiu
IEEE/ACM Transactions on networking 24 (6), 3551-3564, 2016
682016
Crypt-DAC: Cryptographically enforced dynamic access control in the cloud
S Qi, Y Zheng
IEEE Transactions on Dependable and Secure Computing 18 (2), 765-779, 2019
362019
Accelerating at the edge: A storage-elastic blockchain for latency-sensitive vehicular edge computing
Y Lu, J Zhang, Y Qi, S Qi, Y Zheng, Y Liu, H Song, W Wei
IEEE transactions on intelligent transportation systems 23 (8), 11862-11876, 2021
342021
Secure and private RFID-enabled third-party supply chain systems
S Qi, Y Zheng, M Li, L Lu, Y Liu
IEEE Transactions on Computers 65 (11), 3413-3426, 2016
292016
Say no to price discrimination: decentralized and automated incentives for price auditing in ride-hailing services
Y Lu, Y Qi, S Qi, Y Li, H Song, Y Liu
IEEE transactions on Mobile computing 21 (2), 663-680, 2020
272020
Mptee: bringing flexible and efficient memory protection to intel sgx
W Zhao, K Lu, Y Qi, S Qi
Proceedings of the Fifteenth European Conference on Computer Systems, 1-15, 2020
242020
COLLECTOR: A secure RFID-enabled batch recall protocol
S Qi, Y Zheng, M Li, L Lu, Y Liu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1510-1518, 2014
222014
Practical volume-hiding encrypted multi-maps with optimal overhead and beyond
J Wang, SF Sun, T Li, S Qi, X Chen
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
192022
Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding
Q Li, Q Hu, Y Qi, S Qi, X Liu, P Gao
Knowledge-Based Systems 218, 106802, 2021
182021
Ants can carry cheese: secure and private RFID-enabled third-party distribution
S Qi, Y Zheng, X Chen, W Wei
IEEE Transactions on Dependable and Secure Computing 19 (3), 1505-1517, 2020
182020
Secure deduplication-based storage systems with resistance to side-channel attacks via fog computing
Y Lu, Y Qi, S Qi, F Zhang, W Wei, X Yang, J Zhang, X Dong
IEEE Sensors Journal 22 (18), 17529-17541, 2021
172021
Adversarial adaptive neighborhood with feature importance-aware convex interpolation
Q Li, Y Qi, Q Hu, S Qi, Y Lin, JS Dong
IEEE Transactions on Information Forensics and Security 16, 2447-2460, 2020
172020
Pbsx: A practical private boolean search using Intel SGX
Q Jiang, Y Qi, S Qi, W Zhao, Y Lu
Information Sciences 521, 174-194, 2020
162020
Scalable data access control in RFID-enabled supply chain
S Qi, Y Zheng, M Li, Y Liu, J Qiu
2014 IEEE 22nd International Conference on Network Protocols, 71-82, 2014
152014
Truth: A blockchain-aided secure reputation system with genuine feedbacks
S Qi, Y Li, W Wei, Q Li, K Qiao, Y Qi
IEEE Transactions on Engineering Management, 2022
132022
Understanding and defending against White-box membership inference attack in deep learning
D Wu, S Qi, Y Qi, Q Li, B Cai, Q Guo, J Cheng
Knowledge-Based Systems 259, 110014, 2023
122023
Rphx: Result pattern hiding conjunctive query over private compressed index using Intel SGX
Q Jiang, EC Chang, Y Qi, S Qi, P Wu, J Wang
IEEE Transactions on Information Forensics and Security 17, 1053-1068, 2022
122022
Safety warning! Decentralised and automated incentives for disqualified drivers auditing in ride-hailing services
Y Lu, J Zhang, Y Qi, S Qi, Y Li, H Song, Y Liu
IEEE Transactions on Mobile Computing 22 (3), 1748-1762, 2021
112021
The system can't perform the operation now. Try again later.
Articles 1–20