Runhua Xu (许,润华)
is a Professor in
the School of
Computer Science and Engineering at
Beihang University.
Prior to that, he served as a Research Staff Member
at IBM
Research (AI S&P Solutions team).
He earned his Ph.D. in Information Security from
the School of Computing and
Information,
University of
Pittsburgh,
under the guidance of IEEE Fellow, Prof. James Joshi.
He also holds an M.S. in Computer Science from
Beihang University,
where he was advised by Prof. Bo Lang,
and a B.E. in Software Engineering from
NWPU.
Privacy Enhancing Technologies, Federated Learning, Privacy-Preserving Collaborative Learning
Applied Crypto, Blockchain, Access Control
Security and Privacy Issues in Edge/Cloud Computing
2015-2020, Ph.D. in Information Security, University of Pittsburgh, Pittsburgh, U.S.
2011-2014, M.S. in Computer Science, Beihang University, Beijing, China
2007-2011, B.E. in Software Engineering, Northwestern Polytechnical University, Xi'an, China
2024 |
Eyal Kushnir, Hayim Shaul, Omri Soceanu, Ehud Aharoni, Nathalie Baracaldo Angel, Runhua Xu, Heiko H Ludwig. "Secure reordering using tensor of indicators." Patent Application 17/895,711, filed March 14, 2024. [ Link ] |
all-pub, patent-pub | |
---|---|---|---|
2024 |
Runhua Xu, Nathalie Baracaldo Angel, Hayim Shaul, Omri Soceanu. "Private vertical federated learning" Patent Application 17/875,987, filed Feberary 1, 2024. [ Link ] |
all-pub, patent-pub | |
2024 |
Runhua Xu, Bo Li, Chao Li, James Joshi, Shuai Ma, Tyler Zhou, Jin Dong and Jianxin Li. "TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning." IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). [ IEEE Early Access ] [ DOI ] |
all-pub, selected-pub, journal-pub | |
2023 |
Ali Anwar, Yi Zhou, Nathalie Baracaldo Angel, Runhua Xu, Yuya Jeremy Ong, Annie K Abay, Heiko H Ludwig, Gegi Thomas, Jayaram Kallapalayam Radhakrishnan, Laura Wynter. "Grouped aggregation in federated learning." Patent Application 17/807,871, filed December 21, 2023. [ Link ] |
all-pub, patent-pub | |
2023 |
Shiqiang Wang, Timothy John Castiglia, Nathalie Baracaldo Angel, Stacy Elizabeth Patterson, Runhua Xu,Yi Zhou. "Vertical federated learning with secure aggregation." Patent Application 17/838,445, filed December 14, 2023. [ Link ] |
all-pub, patent-pub | |
2023 |
Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu and Wei Wang. “How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance”. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Association for Computing Machinery, New York, NY, USA, 150-164. (Distinguished Paper Award) [ arXiv ] [ ACM ] [ DOI ] |
all-pub, conference-pub, selected-pub | |
2023 |
Chao Li, Runhua Xu, and Li Duan. “Liquid democracy in DPoS blockchains”. Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 1148-52. [ arXiv ] [ DOI ] |
all-pub, conference-pub | |
2023 |
Chao Li, Runhua Xu, and Li Duan. “Characterizing Coin-Based Voting Governance in DPoS Blockchains”. Proceedings of the International AAAI Conference on Web and Social Media, Vol. 17, pp. 1148-52. [ PDF ] [ DOI ] |
all-pub, conference-pub | |
2023 |
Chao Li, Balaji Palanisamy, Runhua Xu, and Li Duan. “Cross-Consensus Measurement of Individual-level Decentralization in Blockchains”. IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity 2023), New York, NY, USA, 2023, pp. 45-50. [ IEEE ] [ DOI ] |
all-pub, conference-pub | |
2023 |
Nathalie Baracaldo, Runhua Xu, Yi Zhou, Ali Anwar, and Heiko Ludwig. "Efficient private vertical federated learning." U.S. Patent 11,588,621, issued February 21, 2023. [ Link ] |
all-pub, patent-pub | |
2022 |
Runhua Xu, Chao Li and James Joshi. "Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 3, pp. 2302-2313, 1 May-June 2023. doi: 10.1109/TDSC.2022.3179698. [ pdf ] [ arXiv ] [ IEEE ] [ DOI ] |
all-pub, selected-pub, journal-pub | |
2022 |
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Heiko Ludwig. "DeTrust-FL: Efficient Privacy-Preserving Federated Learning in Decentralized Trust Setting." In 2022 IEEE International Conference on Cloud Computing (IEEE CLOUD 2022), Hybrid event in Barcelona, Spain, IEEE 2022. (Best Paper Award) [ pdf ] [ arXiv ] [ slides ] |
all-pub, selected-pub, conference-pub | |
2022 |
Nathalie Baracaldo and Runhua Xu. "Protecting Against Data Leakage in Federated Learning: What Approach Should You Choose?" Federated Learning: A Comprehensive Overview of Methods and Applications. Ludwig, H., Baracaldo, N. (eds). Springer, Cham. pp.281–312. 2022. [ Springer Link ] |
all-pub, selected-pub, chapter-pub | |
2022 |
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Annie Abay, and Ali Anwar. "Privacy-Preserving Vertical Federated Learning." Federated Learning: A Comprehensive Overview of Methods and Applications. Ludwig, H., Baracaldo, N. (eds). Springer, Cham. pp.417-438. 2022. [ Springer Link ] |
all-pub, selected-pub, chapter-pub | |
2021 |
Runhua Xu, Nathalie Baracaldo and James B.D. Joshi. "Privacy-Preserving Machine Learning: Methods, Challenges and Directions ." (preprint) [ arXiv ] |
all-pub, selected-pub, manuscript-pub | |
2021 |
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig. "FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data." In Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security (AISec'21), pp. 181-192. 2021. [ arXiv ] [ S&P2021 Poster] |
all-pub, selected-pub, workshop-pub | |
2021 |
Nathalie Baracaldo, Runhua Xu, Yi Zhou, Ali Anwar, and Heiko Ludwig. "Efficient private vertical federated learning." Patent Application 16/706,328, filed June 10, 2021. [ Link ] |
all-pub, patent-pub | |
2021 |
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, and Heiko Ludwig. "Privacy-preserving federated learning." U.S. Patent Application 16/682,927, filed May 13, 2021. [ Link ] |
all-pub, patent-pub | |
2021 |
Runhua Xu, James B.D. Joshi and Chao Li. "NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets." IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). IEEE 2021. [ arXiv ] [ appendix ] |
all-pub, selected-pub, journal-pub | |
2021 |
Chao Li, Balaji Palanisamy, Runhua Xu, Jinlai Xu and Jingzhe Wang. “SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.” In 11th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 21), Virtual Event, USA. [ pdf ] [ dataset ] |
all-pub, selected-pub, conference-pub | |
2020 |
Runhua Xu and James B.D. Joshi “Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.” In The 2ed IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), IEEE 2020. [ pdf ] [ slides ] |
all-pub, selected-pub, conference-pub | |
2020 |
Chao Li, Balaji Palanisamy, Runhua Xu , Jian Wang, Jiqiang Liu “NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.” 2020 International Symposium on Reliable Distributed Systems (SRDS20), Shanghai, China. IEEE 2020. [ pdf ] |
all-pub, conference-pub | |
2020 |
Runhua Xu and James B.D. Joshi “Trustworthy and Transparent Third Party Authority.” ACM Transactions on Internet Technology (ACM TOIT). ACM 2020. [ pdf ] |
all-pub, selected-pub, journal-pub | |
2019 |
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig. "HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning." In 12th ACM Workshop on Artificial Intelligence and Security(AISec’19), November 15, 2019, London, United Kingdom. ACM 2019. [ pdf ] |
all-pub, selected-pub, workshop-pub | |
2019 |
Runhua Xu, James B.D. Joshi and Prashant Krishnamurthy. “An Integrated Privacy Preserving Attribute Based Access Control Framework Supporting Secure Deduplication.” IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). IEEE 2019. [ pdf ] |
all-pub, selected-pub, journal-pub | |
2019 |
Runhua Xu, James B.D. Joshi and Chao Li. "CryptoNN : Training Neural Networks over Encrypted Data." In The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Dallas, USA. IEEE 2019. [ arXiv ] [ slides ] |
all-pub, selected-pub, conference-pub | |
2019 |
Chao Li, Balaji Palanisamy, and Runhua Xu. “Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts.” In The First International Workshop on Blockchain and Data Management (BlockDM 2019), Macau SAR, China, IEEE 2019. [ arXiv ] [ slides ] |
all-pub, selected-pub, workshop-pub | |
2018 |
Runhua Xu, Balaji Palanisamy and James B.D. Joshi. “QueryGuard: Privacy-preserving Latency-aware Query Optimization for Edge Computing.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom-18), New York, USA. 2018. [ pdf ] [ slides ] |
all-pub, selected-pub, conference-pub | |
2017 |
Runhua Xu, James B.D. Joshi, Prashant Krishnamurthy and David Tipper. “Insider Threat Mitigation in Attribute based Encryption.” In 9th Annual National Cyber Summit (Research Track), Von Braun Center, Huntsville, AL, USA. 2017. [ pdf ] [ slides ] |
all-pub, workshop-pub | |
2016 |
Runhua Xu and James B.D. Joshi. “Enabling Attribute Based Encryption as an Internet Service.” In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, USA. pp. 417-426.IEEE, 2016. [ pdf ] [ slides ] |
all-pub, conference-pub | |
2016 |
Runhua Xu and James B.D. Joshi. “An Integrated Privacy Preserving Attribute Based Access Control Framework.” In 2016 IEEE 9th International Conference on Cloud Computing (IEEE CLOUD 2016) (Research Track), San Francisco, USA. pp. 68-76. IEEE, 2016 [ pdf ] [ slides ] |
all-pub, conference-pub | |
2015 |
Runhua Xu, and Bo Lang. “A CP-ABE scheme with hidden policy and its application in cloud computing.” International Journal of Cloud Computing, Advanced Cloud and Big Data. vol. 4, no. 4, pp. 279-298. 2015. [ pdf ] |
all-pub, journal-pub | |
2014 |
Bo Lang, Runhua Xu, and Yawei Duan. “Self-contained Data Protection Scheme Based on CP-ABE.” EBusiness and Telecommunications, Communications in Computer and Information Science. pp. 306-321. 2014. [ pdf ] |
all-pub, journal-pub | |
2013 |
Runhua Xu, Yang Wang, and Bo Lang. “A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.” In Advanced Cloud and Big Data (CBD), 2013 International Conference on, Nanjing, China. pp. 51-57. IEEE, 2013. [ pdf ] [ slides ] |
all-pub, conference-pub | |
2013 |
Bo Lang, Runhua Xu, and Yawei Duan. “Extending the ciphertext-policy attribute based encryption scheme for supporting flexible access control.” In Security and Cryptography (SECRYPT), 2013 International Conference on, Reykjavik, Iceland. pp. 1-11. IEEE, 2013. [ pdf ] [ slides ] |
all-pub, conference-pub |
Organization and Service
Journal Review
IEEE Transactions on Information Forensics and Security(TIFS);
IEEE Transactions on Dependable and Secure Computing (TDSC);
IEEE Transactions on Services Computing (TSC);
IEEE Transactions on Mobile Computing (TMC);
IEEE Transactions on Computers (TC);
IEEE Transactions on Parallel and Distributed Systems (TPDS);
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI);
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD);
IEEE Transactions on Knowledge and Data Engineering (TKDE);
IEEE Transactions on Industrial Informatics (TII);
IEEE Transactions on Neural Networks and Learning Systems(TNNLS);
IEEE Transactions on Emerging Topics in Computing (TETC);
IEEE Transactions on Cloud Computing (TCC);
IEEE Transactions on Big Data (TBD);
IEEE Transactions on Green Communications and Networking (TGCN);
IEEE Transactions on Network Science and Engineering (TNSE);
IEEE Transactions on Consumer Electronics (TCE);
IEEE Transactions on Emerging Topics in Computing (TETC);
IEEE Transactions on Artificial Intelligence (TAI);
IEEE Journal on Selected Areas in Communications (JSAC);
IEEE Security and Privacy;
IEEE Intelligent Systems;
ACM Transactions on Internet Technology (TOIT);
ACM Transactions on Knowledge Discovery from Data (TKDD);
ACM Digital Threats: Research and Practice (DTRAP);
ACM Transactions on Privacy and Security (TOPS);
Computers & Security (COSE);
Neural Processing Letters (NEPL);
Frontiers of Computer Science (FCS);
Journal of Computer Science and Technology (JCST);
Information Sciences (IS);
Information Processing Letters (IPL);
Expert Systems with Applications (ESWA);
Computer
Blockchain: Research and Applications (BRA);
Computer Networks (COMNET);
Pervasive and Mobile Computing (PMC);
Tsinghua Science and Technology (TST);