Runhua Xu (许,润华),
is a Research Staff Member in
He holds Ph.D. degree in Information Security from
School of Computing and Information
University of Pittsburgh
Prior to that, he received M.S. in Computer Science from
and B.E. in Software Engineer from
Northwestern Polytechnical University
... more about him
Runhua Xu and James B.D. Joshi “CryptoEdge: Practical Secure Aggregation over Encrypted Data at the Edge.” (under peer review)
[ arXiv ]
Runhua Xu, James B.D. Joshi and Chao Li. “NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets.” (under peer review)
[ arXiv ]
Runhua Xu, Chao Li and James B.D. Joshi. “T3AB: Transparent and Trustworthy Third-party Authority using Blockchain.” (under peer review)
Chao Li, Balaji Palanisamy, Runhua Xu, Jinlai Xu and Jingzhe Wang. “SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.” In 11th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 21), Virtual Event, USA.
Runhua Xu and James B.D. Joshi “Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.” In The 2ed IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), IEEE 2020.
[ pdf ]
Chao Li, Balaji Palanisamy, Runhua Xu , Jian Wang, Jiqiang Liu “NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.” 2020 International Symposium on Reliable Distributed Systems (SRDS-20), Shanghai, China. IEEE 2020.
[ pdf ]
Runhua Xu and James B.D. Joshi “Trustworthy and Transparent Third Party Authority.” ACM Transactions on Internet Technology (ACM TOIT). ACM 2020.
[ pdf ]
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig. "HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning." In 12th ACM Workshop on Artificial Intelligence and Security(AISec’19), November 15, 2019, London, United Kingdom. ACM 2019.
[ pdf ]
Runhua Xu, James B.D. Joshi and Prashant Krishnamurthy. “An Integrated Privacy Preserving Attribute Based Access Control Framework Supporting Secure Deduplication.” IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). IEEE 2019.
Runhua Xu, James B.D. Joshi and Chao Li. "CryptoNN : Training Neural Networks over Encrypted Data." In The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Dallas, USA. IEEE 2019.
Chao Li, Balaji Palanisamy, and Runhua Xu. “Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts.” In The First International Workshop on Blockchain and Data Management (BlockDM 2019), Macau SAR, China, IEEE 2019.
Runhua Xu, Balaji Palanisamy and James B.D. Joshi. “QueryGuard: Privacy-preserving Latency-aware Query Optimization for Edge Computing.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom-18), New York, USA. 2018.
Runhua Xu, James B.D. Joshi, Prashant Krishnamurthy and David Tipper. “Insider Threat Mitigation in Attribute based Encryption.” In 9th Annual National Cyber Summit (Research Track), Von Braun Center, Huntsville, AL, USA. 2017.
Runhua Xu and James B.D. Joshi. “Enabling Attribute Based Encryption as an Internet Service.” In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, USA. pp. 417-426.IEEE, 2016.
Runhua Xu and James B.D. Joshi. “An Integrated Privacy Preserving Attribute Based Access Control Framework.” In 2016 IEEE 9th International Conference on Cloud Computing (IEEE CLOUD 2016) (Research Track), San Francisco, USA. pp. 68-76. IEEE, 2016
[ pdf ]
Runhua Xu, and Bo Lang. “A CP-ABE scheme with hidden policy and its application in cloud computing.” International Journal of Cloud Computing, Advanced Cloud and Big Data. vol. 4, no. 4, pp. 279-298. 2015.
[ pdf ]
Bo Lang, Runhua Xu, and Yawei Duan. “Self-contained Data Protection Scheme Based on CP-ABE.” EBusiness and Telecommunications, Communications in Computer and Information Science. pp. 306-321. 2014
Runhua Xu, Yang Wang, and Bo Lang. “A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.” In Advanced Cloud and Big Data (CBD), 2013 International Conference on, Nanjing, China. pp. 51-57. IEEE, 2013.
Bo Lang, Runhua Xu, and Yawei Duan. “Extending the ciphertext-policy attribute based encryption scheme for supporting flexible access control.” In Security and Cryptography (SECRYPT), 2013 International Conference on, Reykjavik, Iceland. pp. 1-11. IEEE, 2013.