Dongxi Liu

Orcid: 0000-0002-0221-2571

According to our database1, Dongxi Liu authored at least 126 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup.
Proc. Priv. Enhancing Technol., 2024

DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
IACR Cryptol. ePrint Arch., 2024

Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2024

Provably secure optimal homomorphic signcryption for satellite-based internet of things.
Comput. Networks, 2024

Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

Improved Multimodal Private Signatures from Lattices.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More.
IACR Cryptol. ePrint Arch., 2023

model-based script synthesis for fuzzing.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

VulMatch: Binary-level Vulnerability Detection Through Signature.
CoRR, 2023

OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy.
CoRR, 2023

Poster: Multi-Writer Searchable Encryption with Fast Search and Post-Quantum Security.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

WinkFuzz: Model-based Script Synthesis for Fuzzing.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs.
IACR Cryptol. ePrint Arch., 2022

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches.
CoRR, 2022

Local Differential Privacy for Federated Learning in Industrial Settings.
CoRR, 2022

Automated Binary Analysis: A Survey.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Local Differential Privacy for Federated Learning.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Privacy Preserving Location-Aware Personalized Web Service Recommendations.
IEEE Trans. Serv. Comput., 2021

Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability.
IEEE Trans. Dependable Secur. Comput., 2021

Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption).
IACR Cryptol. ePrint Arch., 2021

PPaaS: Privacy Preservation as a Service.
Comput. Commun., 2021

Privacy preserving distributed machine learning with federated learning.
Comput. Commun., 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Transparency or Anonymity Leak: Monero Mining Pools Data Publication.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Concise Mercurial Subvector Commitments: Definitions and Constructions.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2020

Efficient privacy preservation of big data for accurate data mining.
Inf. Sci., 2020

Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020

Local Differential Privacy for Deep Learning.
IEEE Internet Things J., 2020

Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions.
IACR Cryptol. ePrint Arch., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

Privacy Preserving Face Recognition Utilizing Differential Privacy.
Comput. Secur., 2020

A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability.
Proceedings of the Second IEEE International Conference on Trust, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

A New Evaluation Method for Medical Image Information Hiding Techniques.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing.
IEEE J. Biomed. Health Informatics, 2019

Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies.
IEEE Netw., 2019

An Identity-Based Signcryption on Lattice without Trapdoor.
J. Univers. Comput. Sci., 2019

Puncturable Proxy Re-Encryption supporting to Group Messaging Service.
IACR Cryptol. ePrint Arch., 2019

MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
IACR Cryptol. ePrint Arch., 2019

Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
IACR Cryptol. ePrint Arch., 2019

TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019

Local Differential Privacy for Deep Learning.
CoRR, 2019

GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

An efficient and scalable privacy preserving algorithm for big data and data streams.
Comput. Secur., 2019

Exploit in Smart Devices: A Case Study.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019

On The Unforkability of Monero.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Designing Smart Contract for Electronic Document Taxation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Risk of Asynchronous Protocol Update: Attacks to Monero Protocols.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Location Based Encryption.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Efficient data perturbation for privacy preserving and accurate data stream mining.
Pervasive Mob. Comput., 2018

Monero Ring Attack: Recreating Zero Mixin Transaction Effect.
IACR Cryptol. ePrint Arch., 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2018

Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures.
IACR Cryptol. ePrint Arch., 2018

A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Spread Spectrum Steganographic Capacity Improvement for Medical Image Security in Teleradiology.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

Anonymity Reduction Attacks to Monero.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Lightweight Mutual Authentication for IoT and Its Applications.
IEEE Trans. Sustain. Comput., 2017

Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Fine-Grained Access Control for Personal Health Records in Cloud Computing.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

2016
Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems.
ACM Trans. Internet Techn., 2016

Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations.
IEEE Access, 2016

Towards privacy-preserving classification in neural networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Efficiently computing reverse k furthest neighbors.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016

Efficient Processing of Encrypted Data in Honest-but-Curious Clouds.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Practical Fully Homomorphic Encryption without Noise Reduction.
IACR Cryptol. ePrint Arch., 2015

Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Automated Policy Combination for Data Sharing across Multiple Organizations.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

User-Controlled Identity Provisioning for Secure Account Sharing.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Nonlinear order preserving index for encrypted database query in service cloud environments.
Concurr. Comput. Pract. Exp., 2013

A Performance Evaluation of Public Cloud Using TPC-C.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

Verifying an Aircraft Proximity Characterization Method in Coq.
Proceedings of the Formal Methods and Software Engineering, 2013

2012
Hardware Security Device Facilitated Trusted Energy Services.
Mob. Networks Appl., 2012

A New Cloud Architecture of Virtual Trusted Platform Modules.
IEICE Trans. Inf. Syst., 2012

Servicization of Australian Privacy Act for Improving Business Compliance.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Query encrypted databases practically.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Programmable Order-Preserving Secure Index for Encrypted Database Query.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Semantic based aspect-oriented programming for context-aware Web service composition.
Inf. Syst., 2011

A mobile and portable trusted computing platform.
EURASIP J. Wirel. Commun. Netw., 2011

Secure Multi-party Collaboration Systems in Supply Chain Management.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 3, Beijing, China, 8, 2011

Cloud#: A Specification Language for Modeling Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
End-to-End Service Support for Mashups.
IEEE Trans. Serv. Comput., 2010

XQuery meets Datalog: Data Relevance Query for workflow trustworthiness.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010

Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

User Authentication for Online Applications Using a USB-Based Trust Device.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

A Framework for Delivering Rigorously Trusted Services.
Proceedings of the IEEE International Conference on Web Services, 2010

Managing Web Services: An Application in Bioinformatics.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Trusted Computing Platform in Your Pocket.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Cloud Architecture of Virtual Trusted Platform Modules.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hardware security device facilitated trusted residential energy services.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Semantic Weaving for Context-Aware Web Service Composition.
Proceedings of the Web Information Systems Engineering, 2009

Logic-based verification for Web services composition with TLA.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

2008
Secure and Conditional Resource Coordination for Successful Collaborations.
Proceedings of the Collaborative Computing: Networking, 2008

2007
A Java Library for Bidirectional XML Transformation.
Inf. Media Technol., 2007

A Web Service Architecture for Bidirectional XML Updating.
Proceedings of the Advances in Data and Web Management, 2007

Bidirectional interpretation of XQuery.
Proceedings of the 2007 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2007

Towards automatic model synchronization from model transformations.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Bytecode Verification for Enhanced JVM Access Control.
Proceedings of the The Second International Conference on Availability, 2007

2005
An environment for maintaining computation dependency in XML documents.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005

2004
A Method to Obtain Signatures from Honeypots Data.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Normalizing Traffic Pattern with Anonymity for Mission Critical Applications.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004

2002
An Attack-Finding Algorithm for Security Protocols.
J. Comput. Sci. Technol., 2002

2001
An Intelligent Intruder Model for Security Protocol Analysis.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...