Liang Zhao

Orcid: 0000-0002-8846-9473

Affiliations:
  • Sichuan University, School of Cyber Science and Engineering, Chengdu, China


According to our database1, Liang Zhao authored at least 13 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited.
IEEE Trans. Dependable Secur. Comput., 2024

2023
EPPSQ: Achieving efficient and privacy-preserving statistics queries over encrypted data in smart grids.
Future Gener. Comput. Syst., December, 2023

2022
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks.
Inf. Sci., 2022

2021
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Verifiable single-server private information retrieval from LWE with binary errors.
Inf. Sci., 2021

An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
IACR Cryptol. ePrint Arch., 2021

2020
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited.
IEEE Trans. Dependable Secur. Comput., 2020

On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation.
IEEE Trans. Cloud Comput., 2020

2019
Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Verifiable Single-Server Private Information Retrieval.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2015
A New Statistical Approach for Integral Attack.
Proceedings of the Network and System Security - 9th International Conference, 2015


  Loading...