Chang Liu

Orcid: 0000-0003-2621-2776

Affiliations:
  • Beijing Institute of Technology, School of Computer Science and Technology, China
  • University of Technology Sydney, Faculty of Engineering and IT, Australia (former)


According to our database1, Chang Liu authored at least 46 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
Swing: Providing Long-Range Lossless RDMA via PFC-Relay.
IEEE Trans. Parallel Distributed Syst., 2023

Identifying Performance Bottleneck in Shared In-Network Aggregation during Distributed Training.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
FlyMon: enabling on-the-fly task reconfiguration for network measurement.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

2021
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data.
IEEE Trans. Dependable Secur. Comput., 2021

2019
Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework.
IEEE Trans. Cloud Comput., 2019

2018
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.
Secur. Commun. Networks, 2018

2017
Searchable symmetric encryption: attacks, constructions, and extensions
PhD thesis, 2017

Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud.
IEEE Trans. Sustain. Comput., 2017

Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud.
J. Netw. Comput. Appl., 2017

2016
Privacy Knowledge Modelling for Internet of Things: A Look Back.
CoRR, 2016

HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing.
Concurr. Comput. Pract. Exp., 2016

Privacy-Knowledge Modeling for the Internet of Things: A Look Back.
Computer, 2016

Open Issues in Scheduling Microservices in the Cloud.
IEEE Cloud Comput., 2016

2015
A Big Picture of Integrity Verification of Big Data in Cloud Computing.
Proceedings of the Handbook on Data Centers, 2015

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud.
IEEE Trans. Computers, 2015

MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud.
IEEE Trans. Computers, 2015

A cloud-based framework for Home-diagnosis service over big medical data.
J. Syst. Softw., 2015

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud.
IACR Cryptol. ePrint Arch., 2015

External integrity verification for outsourced big data in cloud and IoT: A big picture.
Future Gener. Comput. Syst., 2015

2014
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
IEEE Trans. Parallel Distributed Syst., 2014

Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates.
IEEE Trans. Parallel Distributed Syst., 2014

A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.
J. Comput. Syst. Sci., 2014

A spatiotemporal compression based approach for efficient big data processing on Cloud.
J. Comput. Syst. Sci., 2014

Search pattern leakage in searchable encryption: Attacks and new construction.
Inf. Sci., 2014

2013
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud.
J. Comput. Syst. Sci., 2013

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions.
IACR Cryptol. ePrint Arch., 2013

CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing.
Future Gener. Comput. Syst., 2013

SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud.
Concurr. Comput. Pract. Exp., 2013

Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Querying Streaming XML Big Data with Multiple Filters on Cloud.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Public Auditing for Big Data Storage in Cloud Computing - A Survey.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

A User Demand Uncertainty Based Approach for Cloud Resource Management.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012

Efficient Data Collection with Spatial Clustering in Time Constraint WSN Applications.
Proceedings of the Pervasive Computing and the Networked World, 2012

Key Research Issues for Privacy Protection and Preservation in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Privacy-Preserving Layer over MapReduce on Cloud.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A CSMA-based approach for detecting composite data aggregate events with collaborative sensors in WSN.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

Fuzzy keyword search on encrypted cloud storage data with small index.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
A collaborative trust model of firewall-through based on Cloud Computing.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010


  Loading...