default search action
Kaitai Liang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j86]Yanqi Qiao, Dazhuang Liu, Rui Wang, Kaitai Liang:
Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 661-672 (2024) - [j85]Rui Wang, Xingkai Wang, Huanhuan Chen, Jérémie Decouchant, Stjepan Picek, Nikolaos Laoutaris, Kaitai Liang:
MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering. Proc. ACM Meas. Anal. Comput. Syst. 8(3): 40:1-40:41 (2024) - [j84]Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, Bo Luo:
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. Proc. Priv. Enhancing Technol. 2024(3): 477-494 (2024) - [j83]Rui Wang, Oguzhan Ersoy, Hangyu Zhu, Yaochu Jin, Kaitai Liang:
FEVERLESS: Fast and Secure Vertical Federated Learning Based on XGBoost for Decentralized Labels. IEEE Trans. Big Data 10(6): 1001-1015 (2024) - [j82]Lingyuan Yin, Jing Xu, Kaitai Liang, Zhenfeng Zhang:
Sidechains With Optimally Succinct Proof. IEEE Trans. Dependable Secur. Comput. 21(4): 3375-3389 (2024) - [c52]Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. CSF 2024: 311-323 - [c51]Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang:
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages. ESORICS (4) 2024: 105-126 - [c50]Tjard Langhout, Huanhuan Chen, Kaitai Liang:
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures. ESORICS (3) 2024: 424-443 - [c49]Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang:
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. USENIX Security Symposium 2024 - [c48]Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang:
Query Recovery from Easy to Hard: Jigsaw Attack against SSE. USENIX Security Symposium 2024 - [e8]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5 [contents] - [e7]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3 [contents] - [e6]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4 [contents] - [e5]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4 [contents] - [i30]Yanqi Qiao, Dazhuang Liu, Rui Wang, Kaitai Liang:
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm. CoRR abs/2402.15653 (2024) - [i29]Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang:
Query Recovery from Easy to Hard: Jigsaw Attack against SSE. CoRR abs/2403.01155 (2024) - [i28]Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang:
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. CoRR abs/2403.01182 (2024) - [i27]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i26]Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis:
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm. CoRR abs/2411.19075 (2024) - [i25]Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. IACR Cryptol. ePrint Arch. 2024: 515 (2024) - [i24]Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang:
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages. IACR Cryptol. ePrint Arch. 2024: 516 (2024) - [i23]Tjard Langhout, Huanhuan Chen, Kaitai Liang:
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures. IACR Cryptol. ePrint Arch. 2024: 1000 (2024) - 2023
- [j81]Luming Yang, Shaojing Fu, Yongjun Wang, Kaitai Liang, Fan Mo, Bo Liu:
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic. Comput. J. 66(5): 1213-1227 (2023) - [j80]Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu:
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. Comput. Secur. 125: 103048 (2023) - [j79]Junwei Zhou, Botian Lei, Huile Lang, Emmanouil Panaousis, Kaitai Liang, Jianwen Xiang:
Secure genotype imputation using homomorphic encryption. J. Inf. Secur. Appl. 72: 103386 (2023) - [j78]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang:
PIVODL: Privacy-Preserving Vertical Federated Learning Over Distributed Labels. IEEE Trans. Artif. Intell. 4(5): 988-1001 (2023) - [j77]E. Chen, Yan Zhu, Kaitai Liang, Hongjian Yin:
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization. IEEE Trans. Cloud Comput. 11(1): 579-594 (2023) - [j76]Lili Wang, Ye Lin, Ting Yao, Hu Xiong, Kaitai Liang:
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 20(6): 5130-5142 (2023) - [j75]Wenting Li, Ping Wang, Kaitai Liang:
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication. IEEE Trans. Inf. Forensics Secur. 18: 1596-1609 (2023) - [j74]Wei Wang, Dongli Liu, Peng Xu, Laurence Tianruo Yang, Kaitai Liang:
Keyword Search Shareable Encryption for Fast and Secure Data Replication. IEEE Trans. Inf. Forensics Secur. 18: 5537-5552 (2023) - [c47]Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang:
CCA-1 Secure Updatable Encryption with Adaptive Security. ASIACRYPT (5) 2023: 374-406 - [c46]Wenting Li, Jiahong Yang, Haibo Cheng, Ping Wang, Kaitai Liang:
Improved Wordpcfg for Passwords with Maximum Probability Segmentation. ICASSP 2023: 1-5 - [c45]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c44]Ali Reza Ghavamipour, Fatih Turkmen, Rui Wang, Kaitai Liang:
Federated Synthetic Data Generation with Stronger Security Guarantees. SACMAT 2023: 31-42 - [c43]Roland Kromes, João Rodrigues, Duarte M. Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang:
A New Design for Self-Encryption. TrustCom 2023: 1645-1652 - [c42]Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang:
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. USENIX Security Symposium 2023: 5953-5970 - [e4]Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - [i22]Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang:
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. CoRR abs/2302.05628 (2023) - [i21]Yanqi Qiao, Dazhuang Liu, Congwen Chen, Rui Wang, Kaitai Liang:
FTA: Stealthy and Adaptive Backdoor Attack with Flexible Triggers on Federated Learning. CoRR abs/2309.00127 (2023) - 2022
- [j73]Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis:
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. IEEE Access 10: 104671-104685 (2022) - [j72]Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. Comput. J. 65(9): 2430-2438 (2022) - [j71]Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:
Practical algorithm substitution attack on extractable signatures. Des. Codes Cryptogr. 90(4): 921-937 (2022) - [j70]Daojing He, Runmeng Du, Shanshan Zhu, Min Zhang, Kaitai Liang, Sammy Chan:
Secure Logistic Regression for Vertical Federated Learning. IEEE Internet Comput. 26(2): 61-68 (2022) - [j69]Hai Lu, Ruyun Yu, Yan Zhu, Xiao He, Kaitai Liang, William Cheng-Chung Chu:
Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership. J. Syst. Softw. 188: 111271 (2022) - [j68]George Theodorakopoulos, Emmanouil Panaousis, Kaitai Liang, George Loukas:
On-the-Fly Privacy for Location Histograms. IEEE Trans. Dependable Secur. Comput. 19(1): 566-578 (2022) - [j67]Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Trans. Dependable Secur. Comput. 19(2): 862-878 (2022) - [j66]Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j65]Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, Hai Jin:
ROSE: Robust Searchable Encryption With Forward and Backward Security. IEEE Trans. Inf. Forensics Secur. 17: 1115-1130 (2022) - [j64]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - [c41]Yuhang Tian, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang:
FLVoogd: Robust And Privacy Preserving Federated Learning. ACML 2022: 1022-1037 - [c40]Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. ACSAC 2022: 684-698 - [c39]Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract. BlockTEA 2022: 3-18 - [c38]Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
Combining ID's, Attributes, and Policies in Hyperledger Fabric. BlockTEA 2022: 32-48 - [c37]Zhendong Zhao, Xiaojun Chen, Yuexin Xuan, Ye Dong, Dakui Wang, Kaitai Liang:
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints. CVPR 2022: 15192-15201 - [c36]Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. ESORICS (2) 2022: 86-104 - [c35]Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang:
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption. ESORICS (2) 2022: 105-125 - [c34]Huanhuan Chen, Shihui Fu, Kaitai Liang:
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent. ESORICS (1) 2022: 387-407 - [c33]Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang:
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents. ESORICS (1) 2022: 653-676 - [c32]Jiahong Xie, Haibo Cheng, Rong Zhu, Ping Wang, Kaitai Liang:
WordMarkov: A New Password Probability Model of Semantics. ICASSP 2022: 3034-3038 - [c31]Xiaoxi He, Haibo Cheng, Jiahong Xie, Ping Wang, Kaitai Liang:
Passtrans: An Improved Password Reuse Model Based on Transformer. ICASSP 2022: 3044-3048 - [i20]Jing Xu, Rui Wang, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. CoRR abs/2202.03195 (2022) - [i19]Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang:
MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution. CoRR abs/2206.12178 (2022) - [i18]Gregor Schram, Rui Wang, Kaitai Liang:
Using Autoencoders on Differentially Private Federated Learning GANs. CoRR abs/2206.12270 (2022) - [i17]Ignjat Pejic, Rui Wang, Kaitai Liang:
Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks. CoRR abs/2207.00263 (2022) - [i16]Yuhang Tian, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang:
FLVoogd: Robust And Privacy Preserving Federated Learning. CoRR abs/2207.00428 (2022) - [i15]Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
Combining ID's, Attributes, and Policies in Hyperledger Fabric. CoRR abs/2207.01599 (2022) - [i14]Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
ID-based self-encryption via Hyperledger Fabric based smart contract. CoRR abs/2207.01605 (2022) - [i13]Rui Wang, Xingkai Wang, Huanhuan Chen, Stjepan Picek, Zhen Liu, Kaitai Liang:
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering. CoRR abs/2208.10161 (2022) - [i12]Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang:
Volume and Access Pattern Leakage-abuse Attack with Leaked Documents. IACR Cryptol. ePrint Arch. 2022: 947 (2022) - [i11]Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang:
Stronger and Simpler Updatable Encryption. IACR Cryptol. ePrint Arch. 2022: 1339 (2022) - 2021
- [j63]E. Chen, Yan Zhu, Guizhen Zhu, Kaitai Liang, Rongquan Feng:
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors. Comput. Secur. 107: 102318 (2021) - [j62]Yan Zhu, Qian Guo, Hongjian Yin, Kaitai Liang, Stephen S. Yau:
Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts. Computer 54(12): 72-80 (2021) - [j61]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang, Jianting Ning:
Distributed additive encryption and quantization for privacy preserving federated deep learning. Neurocomputing 463: 309-327 (2021) - [j60]Wenting Li, Haibo Cheng, Ping Wang, Kaitai Liang:
Practical Threshold Multi-Factor Authentication. IEEE Trans. Inf. Forensics Secur. 16: 3573-3588 (2021) - [j59]Ke Zhang, Jiahuan Long, Xiaofen Wang, Hong-Ning Dai, Kaitai Liang, Muhammad Imran:
Lightweight Searchable Encryption Protocol for Industrial Internet of Things. IEEE Trans. Ind. Informatics 17(6): 4248-4259 (2021) - [j58]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim-Kwang Raymond Choo:
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021) - [j57]Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao:
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Trans. Serv. Comput. 14(5): 1357-1369 (2021) - [c30]Kevin Tjiam, Rui Wang, Huanhuan Chen, Kaitai Liang:
Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum. CYSARM@CCS 2021: 25-35 - [c29]Haibo Cheng, Wenting Li, Ping Wang, Kaitai Liang:
Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction. ICASSP 2021: 2690-2694 - [c28]Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. USENIX Security Symposium 2021: 857-874 - [i10]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang:
PIVODL: Privacy-preserving vertical federated learning over distributed labels. CoRR abs/2108.11444 (2021) - [i9]Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis:
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. CoRR abs/2111.02364 (2021) - 2020
- [j56]Yuanbo Cui, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, Kaitai Liang:
An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation. IEEE Access 8: 99024-99036 (2020) - [j55]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j54]Xi Jun Lin, Lin Sun, Haipeng Qu, Kaitai Liang:
Leakage-free ID-Based Signature, Revisited. Comput. J. 63(8): 1263-1270 (2020) - [j53]Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. Comput. Secur. 88 (2020) - [j52]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j51]Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020) - [j50]Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j49]Guangquan Xu, Wei Wang, Litao Jiao, Xiaotong Li, Kaitai Liang, James Xi Zheng, Wenjuan Lian, Hequn Xian, Honghao Gao:
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications. IEEE Internet Things J. 7(4): 2539-2552 (2020) - [j48]Guangquan Xu, Wenjuan Zhou, Arun Kumar Sangaiah, Yao Zhang, Xi Zheng, Qiang Tang, Naixue Xiong, Kaitai Liang, Xiaokang Zhou:
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs. IEEE Netw. 34(2): 22-29 (2020) - [j47]Meikang Qiu, Hongning Dai, Arun Kumar Sangaiah, Kaitai Liang, Xi Zheng:
Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics. IEEE Trans. Ind. Informatics 16(3): 2029-2030 (2020) - [j46]Qi Feng, Debiao He, Sherali Zeadally, Kaitai Liang:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j45]Guangquan Xu, Bingyan Liu, Litao Jiao, Xiaotong Li, Meiqi Feng, Kaitai Liang, Lei Ma, Xi Zheng:
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks. IEEE Wirel. Commun. 27(3): 72-78 (2020) - [c27]Guangquan Xu, Miao Li, Xiaotong Li, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Qiang Tang, Shaoying Liu:
Defending Use-After-Free via Relationship Between Memory and Pointer. CollaborateCom (1) 2020: 583-597 - [c26]Junwei Zhou, Junjiong Li, Emmanouil Panaousis, Kaitai Liang:
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data. CSCloud/EdgeCom 2020: 160-167 - [e3]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e2]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents] - [e1]Guangquan Xu, Kaitai Liang, Chunhua Su:
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings. Communications in Computer and Information Science 1286, Springer 2020, ISBN 978-981-15-9738-1 [contents] - [i8]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang, Jianting Ning:
Distributed Additive Encryption and Quantization for Privacy Preserving Federated Deep Learning. CoRR abs/2011.12623 (2020)
2010 – 2019
- 2019
- [j44]Zhenhu Ning, Guangquan Xu, Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang:
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things. IEEE Access 7: 30112-30125 (2019) - [j43]Kai He, Yijun Mao, Jianting Ning, Kaitai Liang, Xinyi Huang, Emmanouil Panaousis, George Loukas:
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7: 50658-50668 (2019) - [j42]Shanchen Pang, Qian Gao, Ting Liu, Hua He, Guangquan Xu, Kaitai Liang:
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment. IEEE Access 7: 56492-56503 (2019) - [j41]Guangquan Xu, Yao Zhang, Litao Jiao, Emmanouil Panaousis, Kaitai Liang, Hao Wang, Xiaotong Li:
DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost. IEEE Access 7: 174740-174749 (2019) - [j40]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j39]Mengmeng Yang, Tianqing Zhu, Kaitai Liang, Wanlei Zhou, Robert H. Deng:
A blockchain-based location privacy-preserving crowdsensing system. Future Gener. Comput. Syst. 94: 408-418 (2019) - [j38]Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. Future Gener. Comput. Syst. 99: 154-163 (2019) - [j37]Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. Future Gener. Comput. Syst. 100: 797-810 (2019) - [j36]Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [j35]Jinguang Han, Liqun Chen, Willy Susilo, Xinyi Huang, Aniello Castiglione, Kaitai Liang:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j34]Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme. J. Univers. Comput. Sci. 25(3): 245-269 (2019) - [j33]Yi Zhao, Kaitai Liang, Bo Yang, Liqun Chen:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [j32]Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [j31]Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j30]Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [j29]Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen:
Using Sparse Representation to Detect Anomalies in Complex WSNs. ACM Trans. Intell. Syst. Technol. 10(6): 64:1-64:18 (2019) - [c25]Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos:
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation. NetSoft 2019: 84-92 - [c24]Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang:
Cryptanalysis of Raindrop and FBC. NSS 2019: 536-551 - [i7]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2018
- [j28]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j27]Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:
An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78: 753-762 (2018) - [j26]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j25]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [j24]Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen:
Expressive attribute-based keyword search with constant-size ciphertext. Soft Comput. 22(15): 5163-5177 (2018) - [j23]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(1): 94-105 (2018) - [j22]Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3618-3627 (2018) - [c23]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS 2018: 516-534 - [i6]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. IACR Cryptol. ePrint Arch. 2018: 330 (2018) - [i5]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - 2017
- [j21]Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017) - [j20]Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j19]Cong Zuo, Kaitai Liang, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [c22]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292 - [c21]Guanghui Zhao, Xingyan Zi, Kaitai Liang, Panyi Yun, Junwei Zhou:
A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes. GPC 2017: 222-236 - [c20]Ye Li, Kaitai Liang, Chunhua Su, Wei Wu:
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. GPC 2017: 611-626 - [c19]Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang:
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing. ISPEC 2017: 118-135 - [c18]Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56 - 2016
- [j18]Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang:
Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016) - [j17]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016) - [j16]Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang:
Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mob. Comput. 28: 113-121 (2016) - [j15]Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang:
Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016) - [j14]Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(8): 1661-1673 (2016) - [j13]Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 11(10): 2365-2376 (2016) - [c17]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang:
Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119 - [c16]Kaitai Liang, Atsuko Miyaji, Chunhua Su:
Secure and Traceable Framework for Data Circulation. ACISP (1) 2016: 376-388 - [c15]Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang:
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. ACISP (1) 2016: 525-540 - [c14]Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94 - [c13]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605 - [c12]Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Gonçalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos:
A data hiding approach for sensitive smartphone data. UbiComp 2016: 557-468 - [c11]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu:
While Mobile Encounters with Clouds. NSS 2016: 3-18 - [c10]Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo:
A New Transitive Signature Scheme. NSS 2016: 156-167 - [c9]Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243 - [i4]Emiliano De Cristofaro, Kaitai Liang, Yuruo Zhang:
Privacy-Preserving Genetic Relatedness Test. CoRR abs/1611.03006 (2016) - [i3]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 1140 (2016) - 2015
- [j12]Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015) - [j11]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8): 2004-2027 (2015) - [j10]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j9]Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong:
Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Comput. 19(2): 58-63 (2015) - [j8]Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [j7]Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Networks 8(16): 2836-2849 (2015) - [j6]Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j5]Kaitai Liang, Willy Susilo, Joseph K. Liu:
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Inf. Forensics Secur. 10(8): 1578-1589 (2015) - [j4]Kaitai Liang, Willy Susilo:
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 10(9): 1981-1992 (2015) - [c8]Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166 - [c7]Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477 - 2014
- [j3]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 3-28 (2014) - [j2]Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014) - [j1]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [c6]Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272 - [c5]Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c4]Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205 - 2013
- [c3]Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559 - [c2]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146 - [i2]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptol. ePrint Arch. 2013: 115 (2013) - [i1]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2013: 236 (2013) - 2012
- [c1]Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint