Kaitai Liang
Orcid: 0000-0003-0262-7678
According to our database1,
Kaitai Liang
authored at least 147 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
FEVERLESS: Fast and Secure Vertical Federated Learning Based on XGBoost for Decentralized Labels.
IEEE Trans. Big Data, December, 2024
IEEE Trans. Dependable Secur. Comput., 2024
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Proc. Priv. Enhancing Technol., 2024
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
IEEE Trans. Artif. Intell., October, 2023
Comput. J., May, 2023
IEEE Trans. Inf. Forensics Secur., 2023
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2023
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization.
IEEE Trans. Cloud Comput., 2023
FTA: Stealthy and Adaptive Backdoor Attack with Flexible Triggers on Federated Learning.
CoRR, 2023
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership.
J. Syst. Softw., 2022
IEEE Internet Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022
Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks.
CoRR, 2022
CoRR, 2022
CoRR, 2022
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent.
Proceedings of the Computer Security - ESORICS 2022, 2022
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Asian Conference on Machine Learning, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Distributed additive encryption and quantization for privacy preserving federated deep learning.
Neurocomputing, 2021
Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts.
Computer, 2021
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
Comput. Secur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum.
Proceedings of the CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 2021
2020
IEEE Wirel. Commun., 2020
Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics.
IEEE Trans. Ind. Informatics, 2020
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Informatics, 2020
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020
Future Gener. Comput. Syst., 2020
Comput. Secur., 2020
An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation.
IEEE Access, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
ACM Trans. Intell. Syst. Technol., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019
IEEE Syst. J., 2019
Secur. Commun. Networks, 2019
J. Univers. Comput. Sci., 2019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. J., 2019
IEEE Access, 2019
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment.
IEEE Access, 2019
IEEE Access, 2019
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
2018
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018
Soft Comput., 2018
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018
An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Gener. Comput. Syst., 2018
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
2017
Pers. Ubiquitous Comput., 2017
Int. J. Found. Comput. Sci., 2017
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017
Proceedings of the Provable Security, 2017
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing.
Proceedings of the Information Security Practice and Experience, 2017
A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Computers, 2016
Pervasive Mob. Comput., 2016
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Provable Security, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Computers, 2015
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Secur. Commun. Networks, 2015
IEEE Netw., 2015
IEEE Internet Comput., 2015
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurr. Comput. Pract. Exp., 2015
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012