Follow
Minghua Xu
Minghua Xu
Visa Research, Splunk, WSU
Verified email at splunk.com
Title
Cited by
Cited by
Year
Remote server encrypted data provisioning system and methods
A Guglani, S Sharma, J Chitalia, G Destremps, U Mardikar, M Xu, ...
US Patent 10,255,456, 2019
5722019
Methods and systems for PKI-based authentication
M Xu, JR Trevino, Y Hao
US Patent 9,832,024, 2017
1012017
Towards a two-tier hierarchical infrastructure: an offline payment system for central bank digital currencies
M Christodorescu, WC Gu, R Kumaresan, M Minaei, M Ozdayi, B Price, ...
arXiv preprint arXiv:2012.08003, 2020
322020
Methods and systems for PKI-based authentication
M Xu, JR Trevino, Y Hao
US Patent 10,153,907, 2018
312018
Mahashweta Das, Hao Yang, and Hanghang Tong. 2023. From Trainable Negative Depth to Edge Heterophily in Graphs
Y Yan, Y Chen, H Chen, M Xu
Thirty-seventh Conference on Neural Information Processing Systems, 0
10
From trainable negative depth to edge heterophily in graphs
Y Yan, Y Chen, H Chen, M Xu, M Das, H Yang, H Tong
Advances in Neural Information Processing Systems 36, 2024
92024
Decay function model for resource configuration and adaptive allocation on internet servers
M Xu, CZ Zu
Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004 …, 2004
92004
Can One Embedding Fit All? A Multi-Interest Learning Paradigm Towards Improving User Interest Diversity Fairness
Y Zhao, M Xu, H Chen, Y Chen, Y Cai, R Islam, Y Wang, T Derr
Proceedings of the ACM on Web Conference 2024, 1237-1248, 2024
72024
Enhancing Transformers without Self-supervised Learning: A Loss Landscape Perspective in Sequential Recommendation
V Lai, H Chen, CCM Yeh, M Xu, Y Cai, H Yang
Proceedings of the 17th ACM Conference on Recommender Systems, 791-797, 2023
72023
System, method, and computer program product for patient authentication and identity risk assessment
WJ Leddy III, S Gu, M Xu
US Patent 12,002,102, 2024
52024
Techniques For Providing Secure Federated Machine-Learning
M Xu
US Patent App. 17/782,063, 2023
52023
Method, system, and computer program product for detecting group activities in a network
L Wang, W Junpeng, C Chetia, S Cao, HS Majithiya, RA Samuel, M Xu, ...
US Patent 12,118,557, 2024
42024
A plug-n-play framework for scaling private set intersection to billion-sized sets
S Badrinarayanan, R Kumaresan, M Christodorescu, V Nagaraja, K Patel, ...
International Conference on Cryptology and Network Security, 443-467, 2023
42023
Optimal time-variant resource allocation for Internet servers with delay constraints
X Zhong, CZ Xu, M Xu, J Wei
11th IEEE Real Time and Embedded Technology and Applications Symposium, 22-31, 2005
42005
Distributed private key recovery
V Nagaraja, M Xu, KH Patel, S Gu, S Patranabis, S Badrinarayanan, ...
US Patent 11,991,282, 2024
32024
Secure and scalable private set intersection for large datasets
M Xu, M Christodorescu, W Sun, P Rindal, R Kumaresan, V Nagaraja, ...
US Patent App. 18/044,060, 2023
32023
Methods and systems for PKI-based authentication
M Xu, JR Trevino, Y Hao
US Patent 11,088,853, 2021
32021
Enhancing distribution and label consistency for graph out-of-distribution generalization
S Wang, X Yang, R Islam, H Chen, M Xu, J Li, Y Cai
arXiv preprint arXiv:2501.04102, 2025
22025
Masked graph transformer for large-scale recommendation
H Chen, Z Xu, CCM Yeh, V Lai, Y Zheng, M Xu, H Tong
Proceedings of the 47th International ACM SIGIR Conference on Research and …, 2024
22024
Agile cryptographic deployment service
V Nagaraja, M Xu, JR Trevino, G Watson, P Mukherjee, C Yilei, D Masny, ...
US Patent App. 18/551,773, 2024
22024
The system can't perform the operation now. Try again later.
Articles 1–20