2025
SMPCache: Towards More Efficient SQL Queries in Multi-Party Collaborative Data Analysis.
IEEE Trans. Knowl. Data Eng., April, 2025
LUNA: Efficient Backward-Private Dynamic Symmetric Searchable Encryption Scheme With Secure Deletion in Encrypted Database.
IEEE Trans. Knowl. Data Eng., April, 2025
Practical Poisoning Attacks against Retrieval-Augmented Generation.
CoRR, April, 2025
Slark: A Performance Robust Decentralized Inter-Datacenter Deadline-Aware Coflows Scheduling Framework With Local Information.
IEEE Trans. Parallel Distributed Syst., February, 2025
Fratricide! Hijacking in Android Multi-Window.
IEEE Trans. Dependable Secur. Comput., 2025
Traceback of Poisoning Attacks to Retrieval-Augmented Generation.
Proceedings of the ACM on Web Conference 2025, 2025
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
2024
${\sf NetDPI}$NetDPI: Efficient Deep Packet Inspection via Filtering-Plus-Verification in Programmable 5G Data Plane for Multi-Access Edge Computing.
IEEE Trans. Mob. Comput., December, 2024
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study.
ACM Trans. Softw. Eng. Methodol., September, 2024
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
IEEE Trans. Inf. Forensics Secur., 2024
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes.
IEEE Trans. Inf. Forensics Secur., 2024
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2024
New approach for efficient malicious multiparty private set intersection.
Inf. Sci., 2024
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases.
IACR Cryptol. ePrint Arch., 2024
DISCO: Dynamic Searchable Encryption with Constant State.
IACR Cryptol. ePrint Arch., 2024
Rethinking Software Misconfigurations in the Real World: An Empirical Study and Literature Analysis.
CoRR, 2024
Your Fixed Watermark is Fragile: Towards Semantic-Aware Watermark for EaaS Copyright Protection.
CoRR, 2024
Prompt-Guided Internal States for Hallucination Detection of Large Language Models.
CoRR, 2024
A Survey on Consumer IoT Traffic: Security and Privacy.
CoRR, 2024
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals.
Comput. Commun., 2024
BadActs: A Universal Backdoor Defense in the Activation Space.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Total variation distance privacy: Accurately measuring inference attacks and improving utility.
Inf. Sci., May, 2023
Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng., March, 2023
LiDetector: License Incompatibility Detection for Open Source Software.
ACM Trans. Softw. Eng. Methodol., January, 2023
QoS-Aware Diversified Service Selection.
IEEE Trans. Serv. Comput., 2023
Verifiable and Redactable Blockchains With Fully Editing Operations.
IEEE Trans. Inf. Forensics Secur., 2023
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
The influence of explanation designs on user understanding differential privacy and making data-sharing decision.
Inf. Sci., 2023
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study.
IACR Cryptol. ePrint Arch., 2023
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves.
IACR Cryptol. ePrint Arch., 2023
LiSum: Open Source Software License Summarization with Multi-Task Learning.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
LiResolver: License Incompatibility Resolution for Open Source Software.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Differentially Private Byzantine-Robust Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022
Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications.
IEEE Trans. Ind. Informatics, 2022
Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications.
IEEE Trans. Ind. Informatics, 2022
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2022
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF.
IACR Cryptol. ePrint Arch., 2022
Editorial: Security of cloud service for the manufacturing industry.
Trans. Emerg. Telecommun. Technol., 2022
New Differential Privacy Communication Pipeline and Design Framework.
CoRR, 2022
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Proceedings of the 31st USENIX Security Symposium, 2022
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022
Privacy-Preserving Machine Learning
Springer, ISBN: 978-981-16-9138-6, 2022
2021
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021
Reinforcement Learning Based Advertising Strategy Using Crowdsensing Vehicular Data.
IEEE Trans. Intell. Transp. Syst., 2021
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2021
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.
IEEE Trans. Green Commun. Netw., 2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021
Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021
Frequency-Hiding Order-Preserving Encryption with Small Client Storage.
Proc. VLDB Endow., 2021
Editorial: Security and Privacy in Computing and Communications.
Mob. Networks Appl., 2021
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage.
Inf. Sci., 2021
A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks.
Comput. Networks, 2021
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021
Backdoor Filter: Mitigating Visible Backdoor Triggers in Dataset.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021
2020
Reversible Information Hiding Algorithm Based on Multikey Encryption.
Wirel. Commun. Mob. Comput., 2020
RACE: Reinforced Cooperative Autonomous Vehicle Collision Avoidance.
IEEE Trans. Veh. Technol., 2020
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020
NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme.
IEEE Trans. Knowl. Data Eng., 2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems.
Inf. Process. Manag., 2020
An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm.
Int. J. Inf. Comput. Secur., 2020
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020
Unbalanced private set intersection cardinality protocol with low communication cost.
Future Gener. Comput. Syst., 2020
ADA: Adaptive Deep Log Anomaly Detector.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
Secure Deduplication System with Active Key Update and Its Application in IoT.
ACM Trans. Intell. Syst. Technol., 2019
FSSE: Forward secure searchable encryption with keyed-block chains.
Inf. Sci., 2019
HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019
An efficient DDoS detection based on SU-Genetic feature selection.
Clust. Comput., 2019
OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics, 2018
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Sensors, 2018
Outsourced privacy-preserving classification service over encrypted data.
J. Netw. Comput. Appl., 2018
Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018
Channel State Information-Based Detection of Sybil Attacks in Wireless Networks.
J. Internet Serv. Inf. Secur., 2018
DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018
Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018
Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst., 2018
A Distributed Anomaly Detection System for In-Vehicle Network Using HTM.
IEEE Access, 2018
Data Provenance With Retention of Reference Relations.
IEEE Access, 2018
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices.
IEEE Access, 2018
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Syst. J., 2017
CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017
Constant bandwidth ORAM with small block size using PIR operations.
IACR Cryptol. ePrint Arch., 2017
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptol. ePrint Arch., 2017
A Mutation Approach of Detecting SQL Injection Vulnerabilities.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Efficient Format-Preserving Encryption Mode for Integer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Partition ORAMS Combined with Novel Client Eviction Mechanism.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
ShadowPWD: practical browser-based password manager with a security token.
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage.
IEEE Trans. Computers, 2016
Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016
On modeling microscopic vehicle fuel consumption using radial basis function neural network.
Soft Comput., 2016
New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016
Degradation and encryption for outsourced PNG images in cloud storage.
Int. J. Grid Util. Comput., 2016
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016
DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Generalized Format-Preserving Encryption for Character Data.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud.
Trans. Comput. Collect. Intell., 2015
Service-oriented mobile malware detection system based on mining strategies.
Pervasive Mob. Comput., 2015
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015
Improved collaborative filtering with intensity-based contraction.
J. Ambient Intell. Humaniz. Comput., 2015
A Secure Architecture for Data Storage in the Cloud Environments.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
General Multi-key Searchable Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014
SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
Int. J. Data Warehous. Min., 2014
Privacy-preserving data utilization in hybrid clouds.
Future Gener. Comput. Syst., 2014
Enabling efficient and secure data sharing in cloud computing.
Concurr. Comput. Pract. Exp., 2014
Multi-key Searchable Encryption without Random Oracle.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
New Data Publishing Framework in the Big Data Environments.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Cycle-walking revisited: consistency, security, and efficiency.
Secur. Commun. Networks, 2013
Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013
Multi-user Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Format-Preserving Fuzzy Query Mechanism.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Format Compliant Degradation for PNG Image.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Data Masking Generic Model.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013
2012
Format-Preserving Encryption for Character Data.
J. Networks, 2012
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012
A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2010
Efficient Identity-based Broadcast Encryption without Random Oracles.
J. Comput., 2010