Qiang Tang

Orcid: 0000-0002-6153-4255

Affiliations:
  • Luxembourg Institute of Science and Technology, Luxembourg
  • University of Twente, Enschede, The Netherlands (former)
  • University of London, UK (PhD 2007)


According to our database1, Qiang Tang authored at least 120 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation.
Future Internet, April, 2024

Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities.
IEEE Internet Things Mag., March, 2023

An Empirical Study of Deep Learning-Based SS7 Attack Detection.
Inf., 2023

Federated Learning without Full Labels: A Survey.
IEEE Data Eng. Bull., 2023

CodeLens: An Interactive Tool for Visualizing Code Representations.
CoRR, 2023

An Empirical Study of the Imbalance Issue in Software Vulnerability Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Another Look at Privacy-Preserving Automated Contact Tracing.
ACM Trans. Spatial Algorithms Syst., 2022

CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022

Privacy-preserving Federated Singular Value Decomposition.
IACR Cryptol. ePrint Arch., 2022

A Systematic Analysis of 5G Networks With a Focus on 5G Core Security.
IEEE Access, 2022

Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting.
IEEE Access, 2022

A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks.
Proceedings of the Information Security Practice and Experience, 2022

2021
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT.
IACR Cryptol. ePrint Arch., 2021

Towards Using Blockchain Technology to Prevent Diploma Fraud.
IEEE Access, 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

2020
Privacy-Preserving Contact Tracing: current solutions and open questions.
IACR Cryptol. ePrint Arch., 2020

2019
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data.
IEEE Trans. Dependable Secur. Comput., 2019

Together or Alone: The Price of Privacy in Collaborative Learning.
Proc. Priv. Enhancing Technol., 2019

Privacy-Preserving Decentralised Singular Value Decomposition.
IACR Cryptol. ePrint Arch., 2019

Novel Collaborative Filtering Recommender Friendly to Privacy Protection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Towards Blockchain-Enabled Searchable Encryption.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Privacy-Preserving Friendship-Based Recommender Systems.
IEEE Trans. Dependable Secur. Comput., 2018

Power of public-key function-private functional encryption.
IET Inf. Secur., 2018

CryptoRec: Secure Recommendations as a Service.
CoRR, 2018

Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE.
Comput. J., 2018

The Price of Privacy in Collaborative Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Privacy in Collaborative Recommenders.
Proceedings of the Collaborative Recommendations, 2018

2017
Together or Alone: The Price of Privacy in Joint Learning.
CoRR, 2017

Differentially Private Neighborhood-Based Recommender Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE.
IACR Cryptol. ePrint Arch., 2016

Privacy-preserving Hybrid Recommender System.
IACR Cryptol. ePrint Arch., 2016

Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations.
IACR Cryptol. ePrint Arch., 2016

Two More Efficient Variants of the J-PAKE Protocol.
IACR Cryptol. ePrint Arch., 2016

Updatable Functional Encryption.
IACR Cryptol. ePrint Arch., 2016

Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing.
IACR Cryptol. ePrint Arch., 2016

A Probabilistic View of Neighborhood-Based Recommendation Methods.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

2015
Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

Recommender Systems and their Security Concerns.
IACR Cryptol. ePrint Arch., 2015

Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions.
IACR Cryptol. ePrint Arch., 2015

On the Power of Public-key Functional Encryption with Function Privacy.
IACR Cryptol. ePrint Arch., 2015

Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2015

Extend the Concept of Public Key Encryption with Delegated Search.
Comput. J., 2015

From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data.
Comput. J., 2015

Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes.
Proceedings of the Information Security - 18th International Conference, 2015

Towards Forward Security Properties for PEKS and IBE.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

Methods to Mitigate Risk of Composition Attack in Independent Data Publications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distributed Syst., 2014

Nothing is for Free: Security in Searching Shared and Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2014

An Investigation of Some Forward Security Properties for PEKS and IBE.
IACR Cryptol. ePrint Arch., 2014

Nothing is for Free: Security in Searching Shared & Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptol. ePrint Arch., 2014

On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes.
IACR Cryptol. ePrint Arch., 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Privacy in Recommender Systems.
Proceedings of the Social Media Retrieval, 2013

Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
IACR Cryptol. ePrint Arch., 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

Proving Prêt à Voter Receipt Free Using Computational Security Models.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Towards a Privacy-Preserving Solution for OSNs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Public key encryption supporting plaintext equality test and user-specified authorization.
Secur. Commun. Networks, 2012

A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Public key encryption schemes supporting equality test with authorisation of different granularity.
Int. J. Appl. Cryptogr., 2012

Refine the Concept of Public Key Encryption with Delegated Search.
IACR Cryptol. ePrint Arch., 2012

Search in Encrypted Data: Theoretical Models and Practical Applications.
IACR Cryptol. ePrint Arch., 2012

Selective Document Retrieval from Encrypted Database.
Proceedings of the Information Security - 15th International Conference, 2012

Cryptographic framework for analyzing the privacy of recommender algorithms.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Privacy-preserving collaborative filtering based on horizontally partitioned dataset.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2011
Extended KCI attack against two-party key establishment protocols.
Inf. Process. Lett., 2011

Towards a security model for computational puzzle schemes.
Int. J. Comput. Math., 2011

Poster: privacy-preserving profile similarity computation in online social networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Privacy-preserving profile matching using the social graph.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Embedding renewable cryptographic keys into noisy data.
Int. J. Inf. Sec., 2010

Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records.
Int. J. Comput. Model. Algorithms Medicine, 2010

A Reflection on the Security of Two-Party Key Establishment Protocols.
IACR Cryptol. ePrint Arch., 2010

KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Efficient Client Puzzle Schemes to Mitigate DoS Attacks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Privacy preserving mapping schemes supporting comparison.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

User-friendly matching protocol for online social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security, 12th International Conference, 2009

Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the Information Security Practice and Experience, 2009

Public-Key Encryption with Registered Keyword Search.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Timed-Ephemerizer: Make Assured Data Appear and Disappear.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Data Is Key: Introducing the Data-Based Access Control Paradigm.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols.
J. Univers. Comput. Sci., 2008

A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008

Type-Based Proxy Re-encryption and Its Construction.
Proceedings of the Progress in Cryptology, 2008

Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Inter-domain Identity-Based Proxy Re-encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan.
IACR Cryptol. ePrint Arch., 2007

On The Security of a Group Key Agreement Protocol.
Comput. J., 2007

Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.
Proceedings of the Information Security, 10th International Conference, 2007

Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Cryptanalysis of a hybrid authentication protocol for large mobile networks.
J. Syst. Softw., 2006

Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability.
IACR Cryptol. ePrint Arch., 2006

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Efficient Compilers for Authenticated Group Key Exchange.
IACR Cryptol. ePrint Arch., 2005

Security properties of two provably secure conference key agreement protocols.
IACR Cryptol. ePrint Arch., 2005

Weaknesses in a leakage-resilient authenticated key transport protocol.
IACR Cryptol. ePrint Arch., 2005

On the security of some password-based key agreement schemes.
IACR Cryptol. ePrint Arch., 2005

Enhanced password-based key establishment protocol.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of two identification schemes based on an ID-based cryptosystem.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme.
IACR Cryptol. ePrint Arch., 2005

Weaknesses in two group Diffie-Hellman key exchange protocols.
IACR Cryptol. ePrint Arch., 2005

Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.
IACR Cryptol. ePrint Arch., 2005

Comments on two anonymous conference key distribution systems.
Comput. Stand. Interfaces, 2005

Comments on a cryptographic key assignment scheme.
Comput. Stand. Interfaces, 2005

Security Properties of Two Authenticated Conference Key Agreement Protocols.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Rethinking the security of some authenticated group key agreement schemes.
IACR Cryptol. ePrint Arch., 2004


  Loading...