Qin Liu

Orcid: 0000-0003-0236-4513

Affiliations:
  • Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
  • Temple University, Department of Computer and Information Sciences, Philadelphia, PA, USA (former)
  • Central South University, School of Information Science and Engineering, Changsha, China (PhD 2012)


According to our database1, Qin Liu authored at least 105 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization.
ACM Trans. Sens. Networks, July, 2024

MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain.
IEEE Trans. Knowl. Data Eng., July, 2024

Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning.
IEEE Trans. Mob. Comput., June, 2024

Edge-Intelligence-Based Computation Offloading Technology for Distributed Internet of Unmanned Aerial Vehicles.
IEEE Internet Things J., June, 2024

Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing.
IEEE Trans. Mob. Comput., May, 2024

veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases.
IEEE Trans. Knowl. Data Eng., May, 2024

$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient Request Scheduling in Cross-Regional Edge Collaboration via Digital Twin Networks.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
ALPS: Achieving accuracy-aware location privacy service via assisted regions.
Future Gener. Comput. Syst., August, 2023

SlimBox: Lightweight Packet Inspection over Encrypted Traffic.
IEEE Trans. Dependable Secur. Comput., 2023

A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse.
J. Syst. Archit., 2023

EKDF: An Ensemble Knowledge Distillation Framework for Robust Collaborative Inference on Heterogeneous Edge Devices.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Collaborative Edge Service Placement for Maximizing QoS with Distributed Data Cleaning.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

2022
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data.
IEEE Trans. Serv. Comput., 2022

Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search.
IEEE Trans. Serv. Comput., 2022

Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications.
Future Gener. Comput. Syst., 2022

On authenticated skyline query processing over road networks.
Concurr. Comput. Pract. Exp., 2022

A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks.
Ad Hoc Networks, 2022

When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2021

SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems.
J. Syst. Archit., 2021

Efficient personalized search over encrypted data for mobile edge-assisted cloud storage.
Comput. Commun., 2021

A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of Vehicles.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks.
Sci. Program., 2020

Preface: Security & privacy in social big data.
J. Parallel Distributed Comput., 2020

Dynamic multi-client searchable symmetric encryption with support for boolean queries.
Inf. Sci., 2020

2019
Topic-based rank search with verifiable social data outsourcing.
J. Parallel Distributed Comput., 2019

Intelligent route planning on large road networks with efficiency and privacy.
J. Parallel Distributed Comput., 2019

Enabling Cooperative Privacy-preserving Personalized search in cloud environments.
Inf. Sci., 2019

A hybrid filtering-based network document recommendation system in cloud storage.
Int. J. Comput. Sci. Eng., 2019

Multidimensional privacy preservation in location-based services.
Future Gener. Comput. Syst., 2019

Efficient Authentication of Multi-Dimensional Top-k Queries.
IEEE Access, 2019

2018
A trajectory privacy-preserving scheme based on query exchange in mobile social networks.
Soft Comput., 2018

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
IEEE Internet Things J., 2018

An Anonymous Offline RFID Grouping-Proof Protocol.
Future Internet, 2018

Enhancing privacy through uniform grid and caching in location-based services.
Future Gener. Comput. Syst., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data.
IEEE Access, 2018

Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud.
IEEE Access, 2018

Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing.
IEEE Access, 2018

Achieving Secure and Effective Search Services in Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Privacy-Preserving Principal Component Analysis Outsourcing Framework.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Authentication of Skyline Query over Road Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distributed Syst., 2017

Enhanced Location Privacy Preserving Scheme in Location-Based Services.
IEEE Syst. J., 2017

Effective Query Grouping Strategy in Clouds.
J. Comput. Sci. Technol., 2017

Collaborative trajectory privacy preserving scheme in location-based services.
Inf. Sci., 2017

Dynamic access policy in cloud-based personal health record (PHR) systems.
Inf. Sci., 2017

Anonymizing popularity in online social networks with full utility.
Future Gener. Comput. Syst., 2017

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017

Preface: Security and privacy in big data clouds.
Future Gener. Comput. Syst., 2017

A Multilevel Access Control Scheme for Data Security in Transparent Computing.
Comput. Sci. Eng., 2017

Secure hitch in location based social networks.
Comput. Commun., 2017

Achieving reliable and secure services in cloud computing environments.
Comput. Electr. Eng., 2017

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An ECC-Based Off-line Anonymous Grouping-Proof Protocol.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Verifiable Ranked Search over dynamic encrypted data in cloud computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Attribute-Based Encryption with Personalized Search.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Lightweight Privacy Aware Friend Locator in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Achieving Flow-Oriented Reliable Services in Cloud Computing.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

DABKS: Dynamic attribute-based keyword search in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Commun. Lett., 2016

A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing Location Privacy through User-Defined Grid in Location-Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A secure hierarchical deduplication system in cloud storage.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016

2015
Efficient and privacy-preserving search in multi-source personal health record clouds.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

User-Controlled Security Mechanism in Data-Centric Clouds.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Towards Differential Query Services in Cost-Efficient Clouds.
IEEE Trans. Parallel Distributed Syst., 2014

Consistency as a Service: Auditing Cloud Consistency.
IEEE Trans. Netw. Serv. Manag., 2014

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.
Inf. Sci., 2014

Secure and Efficient Video Surveillance in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Secure distributed keyword search in multiple clouds.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2013
A scalable encryption scheme for multi-privileged group communications.
J. Supercomput., 2013

A secure self-destructing scheme for electronic data.
J. Comput. Syst. Sci., 2013

Outsourcing privacy-preserving social networks to a cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Privacy Preserving for Location-Based Services Using Location Transformation.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Cooperative private searching in clouds.
J. Parallel Distributed Comput., 2012

Secure and privacy preserving keyword searching for cloud storage services.
J. Netw. Comput. Appl., 2012

Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Dynamic Grouping Strategy in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
Achieving fine-grained access control for secure data sharing on cloud servers.
Concurr. Comput. Pract. Exp., 2011

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.
Comput. Secur., 2011

Reliable Re-Encryption in Unreliable Clouds.
Proceedings of the Global Communications Conference, 2011

Secure Locking for Untrusted Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
A Scalable Encryption Scheme for Multi-Privileged Group Communications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Efficient Sharing of Secure Cloud Storage Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...