Jin Li

Orcid: 0000-0003-0385-8793

Affiliations:
  • Guangzhou University, School of Computational Science & Education Software, China
  • Illinois Institute of Technology, IL, USA (former)
  • KAIST, Daejon, South Korea (former)
  • Sun Yat-Sen University, Hangzhou, China (PhD 2007)


According to our database1, Jin Li authored at least 310 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024

Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures.
ACM Comput. Surv., June, 2024

Cross-Shaped Adversarial Patch Attack.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

Privacy Amplification via Shuffling: Unified, Simplified, and Tightened.
Proc. VLDB Endow., April, 2024

A Secure and Flexible Blockchain-Based Offline Payment Protocol.
IEEE Trans. Computers, February, 2024

DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.
ACM Trans. Priv. Secur., 2024

Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset.
IEEE Trans. Inf. Forensics Secur., 2024

Building a Lightweight Trusted Execution Environment for Arm GPUs.
IEEE Trans. Dependable Secur. Comput., 2024

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024

Blockchain-based public auditing with deep reinforcement learning for cloud storage.
Expert Syst. Appl., 2024

Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024

UM-PIM: DRAM-based PIM with Uniform & Shared Memory Space.
Proceedings of the 51st ACM/IEEE Annual International Symposium on Computer Architecture, 2024

2023
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023

A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems.
Int. J. Inf. Sec., October, 2023

A novel extended multimodal AI framework towards vulnerability detection in smart contracts.
Inf. Sci., July, 2023

GATrust: A Multi-Aspect Graph Attention Network Model for Trust Assessment in OSNs.
IEEE Trans. Knowl. Data Eng., June, 2023

Load balancing inside programmable data planes based on network modeling prediction using a GNN with network behaviors.
Comput. Networks, May, 2023

Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023

Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng., March, 2023

GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Blockchain-Based Secure Key Management for Mobile Edge Computing.
IEEE Trans. Mob. Comput., 2023

Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos.
IEEE Trans. Image Process., 2023

Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

Secret-to-Image Reversible Transformation for Generative Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy.
IEEE Trans. Dependable Secur. Comput., 2023

Defending Against Membership Inference Attacks With High Utility by GAN.
IEEE Trans. Dependable Secur. Comput., 2023

Secure Aggregation is Insecure: Category Inference Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Relation-aware Graph Contrastive Learning.
Parallel Process. Lett., 2023

Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023

GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Differential Aggregation against General Colluding Attackers.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Fine-Grained Private Knowledge Distillation.
Proceedings of the IEEE International Conference on Acoustics, 2023

FirewaLLM: A Portable Data Protection and Recovery Framework for LLM Services.
Proceedings of the Data Mining and Big Data - 8th International Conference, 2023

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022

A Novel Rank Learning Based No-Reference Image Quality Assessment Method.
IEEE Trans. Multim., 2022

The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks.
IEEE Trans. Knowl. Data Eng., 2022

MAS-Encryption and its Applications in Privacy-Preserving Classifiers.
IEEE Trans. Knowl. Data Eng., 2022

EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022

Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol., 2022

Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit., 2022

Special issue on new advanced techniques in security of artificial intelligence.
J. Ambient Intell. Humaniz. Comput., 2022

Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning.
IEEE Internet Things J., 2022

Contrastive distortion-level learning-based no-reference image-quality assessment.
Int. J. Intell. Syst., 2022

BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022

Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp., 2022

Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming.
Sci. China Inf. Sci., 2022

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022

Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022

StrongBox: A GPU TEE on Arm Endpoints.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Privacy-Preserving Machine Learning
Springer, ISBN: 978-981-16-9138-6, 2022

2021
Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng., 2021

Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2021

NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021

Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole.
IEEE Trans. Circuits Syst. Video Technol., 2021

TrajectoryCNN: A New Spatio-Temporal Feature Learning Network for Human Motion Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2021

Editorial: Security and Privacy in Computing and Communications.
Mob. Networks Appl., 2021

Security and Privacy in New Computing Environments (SPNCE 2016).
Mob. Networks Appl., 2021

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021

PNAS: A privacy preserving framework for neural architecture search services.
Inf. Sci., 2021

Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021

Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021

Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021

Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
Proceedings of the Provable and Practical Security, 2021

Hiding Numerical Vectors in Local Private and Shuffled Messages.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Reverse Attack: Black-box Attacks on Collaborative Recommendation.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020

ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020

NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme.
IEEE Trans. Knowl. Data Eng., 2020

Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl., 2020

Toward supervised shape-based behavioral authentication on smartphones.
J. Inf. Secur. Appl., 2020

A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020

MAN: Mutual Attention Neural Networks Model for Aspect-Level Sentiment Classification in SIoT.
IEEE Internet Things J., 2020

How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020

Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020

Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism.
Digit. Commun. Networks, 2020

Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts.
Comput. Secur., 2020

TruNeo: an integrated pipeline improves personalized true tumor neoantigen identification.
BMC Bioinform., 2020

Attackability Characterization of Adversarial Evasion Attack on Discrete Data.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

(τ, ϵ)-Greedy Reinforcement Learning For Anti-Jamming Wireless Communications.
Proceedings of the IEEE Global Communications Conference, 2020

Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Secure Deduplication System with Active Key Update and Its Application in IoT.
ACM Trans. Intell. Syst. Technol., 2019

Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels.
IEEE Trans. Inf. Forensics Secur., 2019

The security of machine learning in an adversarial setting: A survey.
J. Parallel Distributed Comput., 2019

Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019

Special issue on advances in security and privacy in IoT.
J. Netw. Comput. Appl., 2019

HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput., 2019

Multilevel similarity model for high-resolution remote sensing image registration.
Inf. Sci., 2019

HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019

Special Issue on Security and Privacy in Machine Learning.
Inf. Sci., 2019

Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

A secure versatile light payment system based on blockchain.
Future Gener. Comput. Syst., 2019

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019

Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci., 2019

Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019

Controllable List-wise Ranking for Universal No-reference Image Quality Assessment.
CoRR, 2019

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019

Security and privacy in IoT communication.
Ann. des Télécommunications, 2019

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing.
IEEE Access, 2019

Predicting Users' Emotional Intelligence with Social Networking Data.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Secure Multiparty Learning from Aggregation of Locally Trained Models.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics, 2018

Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Ind. Informatics, 2018

Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

COD: caching on demand in information-centric networking.
Telecommun. Syst., 2018

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

Guest Editorial: Security and Privacy for Multimedia in the Internet of Things (IoT).
Multim. Tools Appl., 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018

Special issue on security in cloud computing.
J. Netw. Comput. Appl., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018

DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Computational Intelligence and its Applications in New Computing Models.
Inf. Sci., 2018

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018

Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability.
IEEE Internet Things J., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch., 2018

Big Data and Internet of Things - Fusion for different services and its impacts.
Future Gener. Comput. Syst., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst., 2018

Internet of Things: Security and privacy in a connected world.
Future Gener. Comput. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Gener. Comput. Syst., 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Comput. Secur., 2018

Privacy-preserving outsourced classification in cloud computing.
Clust. Comput., 2018

A Covert Channel Over VoLTE via Adjusting Silence Periods.
IEEE Access, 2018

A Short Linearly Homomorphic Proxy Signature Scheme.
IEEE Access, 2018

IoT based smart interaction framework for elearning.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Comput., 2017

Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics.
Soft Comput., 2017

Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

Model approach to grammatical evolution: deep-structured analyzing of model and representation.
Soft Comput., 2017

Flexible neural trees based early stage identification for IP traffic.
Soft Comput., 2017

Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Syst. J., 2017

Towards privacy protection and malicious behavior traceability in smart health.
Pers. Ubiquitous Comput., 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

Multi-resource scheduling and power simulation for cloud computing.
Inf. Sci., 2017

Insight of the protection for data security under selective opening attacks.
Inf. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017

FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptol. ePrint Arch., 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Gener. Comput. Syst., 2017

Identifying opinion leaders in social networks with topic limitation.
Clust. Comput., 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

An Ensemble Random Forest Algorithm for Insurance Big Data Analysis.
IEEE Access, 2017

Multi-party Security Computation with Differential Privacy over Outsourced Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017

Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Mutation Approach of Detecting SQL Injection Vulnerabilities.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Multi-source Homomorphic Network Coding Signature in the Standard Model.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Inf. Forensics Secur., 2016

Hierarchical and Shared Access Control.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Auditing and Deduplicating Data in Cloud.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
Soft Comput., 2016

Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016

A secure cloud storage system supporting privacy-preserving fuzzy deduplication.
Soft Comput., 2016

Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Secur. Commun. Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive Mob. Comput., 2016

Special issue on security and privacy techniques in mobile cloud computing.
J. Ambient Intell. Humaniz. Comput., 2016

N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intell. Autom. Soft Comput., 2016

Fully secure fuzzy identity-based encryption for secure IoT communications.
Comput. Stand. Interfaces, 2016

Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Rekeying for Encrypted Deduplication Storage.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Hybrid Cloud Approach for Secure Authorized Deduplication.
IEEE Trans. Parallel Distributed Syst., 2015

Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
J. Supercomput., 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Inf. Forensics Secur., 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Secur. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Comput., 2015

Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multim. Tools Appl., 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mob. Inf. Syst., 2015

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015

Emerging services and technologies in wireless networks.
J. High Speed Networks, 2015

Secure deduplication storage systems supporting keyword search.
J. Comput. Syst. Sci., 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

A brief survey on secure multi-party computing in the presence of rational parties.
J. Ambient Intell. Humaniz. Comput., 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

Special Issue: Advances in Secure Data Streaming Systems.
Informatica (Slovenia), 2015

Novel algorithms and equivalence optimisation for resource allocation in cloud computing.
Int. J. Web Grid Serv., 2015

New attribute-based authentication and its application in anonymous cloud access service.
Int. J. Web Grid Serv., 2015

Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing.
Int. J. Netw. Secur., 2015

Cloud Computing: Security, Privacy and Practice.
Future Gener. Comput. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Gener. Comput. Syst., 2015

A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Video Deduplication Scheme with Privacy Preservation in IoT.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

General Multi-key Searchable Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Strength-Constrained Weighted Evolution Model for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distributed Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distributed Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distributed Syst., 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
Int. J. Data Warehous. Min., 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

Advances in Security and Privacy in Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Privacy-preserving data utilization in hybrid clouds.
Future Gener. Comput. Syst., 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Gener. Comput. Syst., 2014

New and efficient conditional e-payment systems with transferability.
Future Gener. Comput. Syst., 2014

A short non-delegatable strong designated verifier signature.
Frontiers Comput. Sci., 2014

Enabling efficient and secure data sharing in cloud computing.
Concurr. Comput. Pract. Exp., 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Multi-key Searchable Encryption without Random Oracle.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Verifiable Data Deduplication Scheme in Cloud Computing.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Secure Deduplication Storage Systems with Keyword Search.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. Univers. Comput. Sci., 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

Outsourcing computation of modular exponentiations in cloud computing.
Clust. Comput., 2013

Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing.
Comput. Informatics, 2013

Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Efficient Proof of Retrievability with Public Auditing in Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Verifiable Evaluation of Private Polynomials.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Server-Aided Hierarchical Identity-Based Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Efficient Fair Conditional Payments for Outsourcing Computations.
IEEE Trans. Inf. Forensics Secur., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Generic security-amplifying methods of ordinary digital signatures.
Inf. Sci., 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Short Non-delegatable Strong Designated Verifier Signature.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Identity-based trapdoor mercurial commitments and applications.
Theor. Comput. Sci., 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
Mob. Networks Appl., 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Toward publicly auditable secure cloud data storage services.
IEEE Netw., 2010

Hidden attribute-based signatures without anonymity revocation.
Inf. Sci., 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Trusted Data Sharing over Untrusted Cloud Storage Providers.
Proceedings of the Cloud Computing, Second International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptol. ePrint Arch., 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Privacy-aware Attribute-based Encryption with User Accountability.
IACR Cryptol. ePrint Arch., 2009

A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

2008
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
J. Comput. Sci. Technol., 2008

Attribute-Based Ring Signatures.
IACR Cryptol. ePrint Arch., 2008

Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Practical Threshold Signatures Without Random Oracles.
Proceedings of the Provable Security, 2007

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Proceedings of the Provable Security, 2007

2006
A Generic Construction of Secure Signatures Without Random Oracles.
Proceedings of the Computational Science and Its Applications, 2006

BGN Authentication and Its Extension to Convey Message Commitments.
Proceedings of the Computational Science and Its Applications, 2006

Single Sign-On and Key Establishment for Ubiquitous Smart Environments.
Proceedings of the Computational Science and Its Applications, 2006

A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Strong Identity Based Key-Insulated Cryptosystem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Universal Designated Verifier Ring Signature (Proof) Without Random Oracles.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Generalization of the Selective-ID Security Model for HIBS Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...