Selected Publications
Muhammad Naveed Aman, Haroon Basheer, Jun Wen Wong, Jia Xu, Hoon Wei Lim, and Biplab Sikdar. (2022)Machine-learning based attestation for the internet of things using memory traces. IEEE Internet of Things Journal, 9(20):20431-20443, 2022.
Muhammad Naveen Aman, Mohamed Haroon Basheer, Siddhant Dash, Ashutosh Sancheti, Jun Wen Wong, Jia Xu, Hoon Wei Lim, and Biplab Sikdar (2021)PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices. IEEE Systems Journal, 2021.
Yiwen Gao, Jia Xu, and Hongbing Wang. (2021)cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope. Transactions on Parallel and Distributed Systems, 2021.
Muhammad Naveed Aman, Mohamed Haroon Basheer, Siddhant Dash, Jun Wen Wong, Jia Xu, Hoon Wei Lim, and Biplab Sikdar. (2020)HAtt: Hybrid Remote Attestation for the Internet of Things with High Availability. IEEE Internet of Things Journal, 7, 2020.
Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, and Weiyang Wong. (2020)Pbio: Enabling cross-organizational biometric authentication service through secure sharing of biometric templates. Cryptology ePrint Archive, Report 2020/1381, 2020.
https://eprint.iacr.org/2020/1381Jia Xu and Jianying Zhou. (2020)Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext. International Journal of Information Security, 2020.
Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, and Hoon Wei Lim. (2020)Psi-stats: Private set intersection protocols supporting secure statistical functions. Cryptology ePrint Archive, Report 2020/623, 2020.
https://eprint.iacr.org/2020/623Jianting Ning, Xu, Jia, Kaitai Liang, Fan Zhang, and Ee-Chien Chang. (2019)Passive Attacks Against Searchable Encryption. IEEE Transactions on Information Forensics and Security, 14:789–802, March 2019.
Hoon Wei Lim, Geong Sen Poh, Jia Xu, and Varsha Chittawar. (2019)Privatelink : Privacypreserving integration and sharing of datasets. In IEEE Transactions on Information Forensics and Security, pages 564–577, 2019.
Jia Xu and Jianying Zhou. (2019)Strong leakage resilient encryption by hiding partial ciphertext. In Applied Cryptography and Network Security Workshops, pages 172–191, 2019.
Jia Xu and Jianying Zhou. (2019)Virtually Isolated Network: A Hybrid Network to Achieve High Level Security. In Data and Applications Security and Privacy XXXII, DBSec, pages 324–343, 2018.
A. Yang, J. Xu, J. Weng, J. Zhou, and D. S. Wong. (2018)Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Transactions on Cloud Computing, 2018.
Dong Li, Huaqun Guo, and Jia Xu. (2016)Enhancing TPM Security by Integrating SRAM PUFs Technology. In ACM International Workshop on Cyber-Physical System Security, CPSS ’16, pages 82–93, 2016.
Jia Xu, Ee-Chien Chang, and Jianying Zhou. (2016)Directed Transitive Signature on Directed Tree. In Singapore Cyber-Security Conference (short paper), SG-CRC, pages 91–98, 2016. Full version in
http://eprint.iacr.org/2009/209Jia Xu, Anjia Yang, Jianying Zhou, and Duncan S. Wong. (2016)Lightweight Delegatable Proofs of Storage. In European Symposium on Research in Computer Security, ESORICS, pages 324–343, 2016.
http://eprint.iacr.org/2014/395Jia Xu, Jianying Zhou, and Liming Lu. (2016)Cyber and Physical Access Control in Legacy System Using Passwords. In Singapore Cyber-Security Conference, SG-CRC, pages 27–42, 2016.
http://eprint.iacr.org/2015/1161Jia Xu and Jianying Zhou. (2014)Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. In Applied Cryptography and Network Security, ACNS, pages 97–115, 2014.
Cheng-Kang Chu, Wen-Tao Zhu, Jin Han, Joseph K. Liu, Jia Xu, and Jianying Zhou. (2013)Security Concerns in Popular Cloud Storage Services. IEEE pervasive computing, 12(4):50–57, 2013.
Citation Count: 105.
Jia Xu, Ee-Chien Chang, and Jianying Zhou. (2013)Weak Leakage-resilient Client-side Deduplication of Encrypted Data in Cloud Storage. In ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS ’13, pages 195–206, 2013.
Citation Count: 263.
Jia Xu and Ee-Chien Chang. (2012)Towards Efficient Proofs of Retrievability. In ACM Symposium on Information, Computer and Communications Security, ASIACCS (Full paper), 2012.
Citation Count: 111.
Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, and Ee-Chien Chang. (2011)ID Repetition in Structured P2P Networks. The Computer Journal, 54(6):962–975, 2011.
Ee-Chien Chang, Chengfang Fang, and Jia Xu. (2010)A chameleon encryption scheme resistant to known-plaintext attack. In ACM workshop on Digital rights management, DRM, pages 25–34, 2010.
Ee-Chien Chang, Chee Liang Lim, and Jia Xu. (2009)Short Redactable Signatures Using Random Trees. In The Cryptographers’ Track at the RSA Conference on Topics in Cryptology, CTRSA, pages 133–147, 2009.
Citation Count: 81.
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, and Zhoujun Li. (2019)ID Repetition in Kad. In Peer-to-Peer Computing, P2P, pages 111–120, 2009.
Citation Count: 39.
Ee-Chien Chang and Jia Xu. (2008)Remote Integrity Check with Dishonest Storage Server. In European Symposium on Research in Computer Security, ESORICS, pages 223–237, 2008.
Citation Count: 137.
Jia Xu and Zhiyong Huang. (2006)HOPI: A Novel High Order Parametric Interpolation in 2D (FYP Result). In Eurographics (short paper), pages 99–102, 2006.