Weiran Liu
Orcid: 0000-0002-1466-7418
According to our database1,
Weiran Liu
authored at least 54 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A fault localization approach based on multi-system PCA and dynamic SDG: Application in train lifting equipment.
Robotics Comput. Integr. Manuf., June, 2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation.
CoRR, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
2023
Engineering Strategies for Advancing Optical Signal Outputs in Smartphone-Enabled Point-of-Care Diagnostics.
Adv. Intell. Syst., June, 2023
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 13th Conference on Innovative Data Systems Research, 2023
2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Knowledge Science, Engineering and Management, 2022
Scape: Scalable Collaborative Analytics System on Private Database with Malicious Security.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022
2021
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Int. J. Inf. Sec., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
2019
2018
2017
Energy Efficiency Optimization for Communication of Air-Based Information Network with Guaranteed Timing Constraints.
J. Signal Process. Syst., 2017
Comput. J., 2017
Proceedings of the Provable Security, 2017
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Secur. Commun. Networks, 2016
J. Commun. Inf. Networks, 2016
Int. J. Inf. Sec., 2016
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016
Future Gener. Comput. Syst., 2016
Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Optimization for Communication Energy Efficiency of Air-Based Information Network While Satisfying Timing Constraints.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Energy Optimization of Air-Based Information Network with Guaranteed Security Protection.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Proceedings of the 9th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2014
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2011