Follow
Lei Xu
Lei Xu
Verified email at bit.edu.cn
Title
Cited by
Cited by
Year
Information security in big data: privacy and data mining
L Xu, C Jiang, J Wang, J Yuan, Y Ren
Ieee Access 2, 1149-1176, 2014
7842014
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
K Gai, Y Wu, L Zhu, L Xu, Y Zhang
IEEE Internet of Things Journal 6 (5), 7992-8004, 2019
3892019
Privacy or utility in data collection? A contract theoretic approach
L Xu, C Jiang, Y Chen, Y Ren, KJR Liu
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1256-1269, 2015
1122015
Energy efficient D2D communications: A perspective of mechanism design
L Xu, C Jiang, Y Shen, TQS Quek, Z Han, Y Ren
IEEE Transactions on Wireless Communications 15 (11), 7272-7285, 2016
702016
A framework for categorizing and applying privacy-preservation techniques in big data mining
L Xu, C Jiang, Y Chen, J Wang, Y Ren
Computer 49 (2), 54-62, 2016
662016
Trust-based collaborative privacy management in online social networks
L Xu, C Jiang, N He, Z Han, A Benslimane
IEEE Transactions on Information Forensics and Security 14 (1), 48-60, 2018
612018
Distributed data privacy preservation in IoT applications
J Du, C Jiang, E Gelenbe, L Xu, J Li, Y Ren
IEEE Wireless Communications 25 (6), 68-76, 2018
582018
Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards
L Xu, C Jiang, Y Qian, Y Zhao, J Li, Y Ren
IEEE Transactions on Information Forensics and Security 12 (2), 271-285, 2016
582016
Blockchain-based multimedia sharing in vehicular social networks with privacy protection
K Shi, L Zhu, C Zhang, L Xu, F Gao
Multimedia Tools and Applications 79, 8085-8105, 2020
402020
User participation in collaborative filtering-based recommendation systems: A game theoretic approach
L Xu, C Jiang, Y Chen, Y Ren, KJR Liu
IEEE transactions on cybernetics 49 (4), 1339-1352, 2018
392018
User association in heterogeneous networks: A social interaction approach
Y Meng, C Jiang, L Xu, Y Ren, Z Han
IEEE Transactions on Vehicular Technology 65 (12), 9982-9993, 2016
292016
Trust-based privacy-preserving photo sharing in online social networks
L Xu, T Bao, L Zhu, Y Zhang
IEEE Transactions on Multimedia 21 (3), 591-602, 2018
282018
Microblog dimensionality reduction—a deep learning approach
L Xu, C Jiang, Y Ren, HH Chen
IEEE Transactions on Knowledge and Data Engineering 28 (7), 1779-1789, 2016
282016
Graph-based ajax crawl: Mining data from rich internet applications
Z Peng, N He, C Jiang, Z Li, L Xu, Y Li, Y Ren
2012 International Conference on Computer Science and Electronics …, 2012
272012
Blockchain-enabled data provenance in cloud datacenter reengineering
H Li, K Gai, Z Fang, L Zhu, L Xu, P Jiang
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure …, 2019
222019
Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system
L Xu, C Jiang, N He, Y Qian, Y Ren, J Li
IEEE Internet of Things Journal 5 (5), 4178-4190, 2018
222018
Game theoretic data privacy preservation: Equilibrium and pricing
L Xu, C Jiang, J Wang, Y Ren, J Yuan, M Guizani
2015 IEEE International Conference on Communications (ICC), 7071-7076, 2015
182015
Successive point-of-interest recommendation with personalized local differential privacy
T Bao, L Xu, L Zhu, L Wang, T Li
IEEE Transactions on Vehicular Technology 70 (10), 10477-10488, 2021
172021
Privacy-accuracy trade-off in differentially-private distributed classification: A game theoretical approach
L Xu, C Jiang, Y Qian, J Li, Y Zhao, Y Ren
IEEE Transactions on Big Data 7 (4), 770-783, 2017
172017
A blockchain based access control scheme with hidden policy and attribute
N Wu, L Xu, L Zhu
Future Generation Computer Systems 141, 186-196, 2023
162023
The system can't perform the operation now. Try again later.
Articles 1–20