Weiran Liu

Orcid: 0000-0002-1466-7418

According to our database1, Weiran Liu authored at least 54 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A fault localization approach based on multi-system PCA and dynamic SDG: Application in train lifting equipment.
Robotics Comput. Integr. Manuf., June, 2024

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024

Privacy Enhancement Via Dummy Points in the Shuffle Model.
IEEE Trans. Dependable Secur. Comput., 2024

Practical EMI Attacks on Smartphones With Users' Commands Cancelled.
IEEE Trans. Dependable Secur. Comput., 2024

Unbalanced Private Set Union with Reduced Computation and Communication.
IACR Cryptol. ePrint Arch., 2024

Efficient Differentially Private Set Intersection.
IACR Cryptol. ePrint Arch., 2024

MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation.
CoRR, 2024

Federated Graph Analytics with Differential Privacy.
CoRR, 2024

The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning.
CoRR, 2024

Private Set Operations from Multi-query Reverse Private Membership Test.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Engineering Strategies for Advancing Optical Signal Outputs in Smartphone-Enabled Point-of-Care Diagnostics.
Adv. Intell. Syst., June, 2023

Efficient Private Multiset ID Protocols.
IACR Cryptol. ePrint Arch., 2023

Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023

Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval.
IACR Cryptol. ePrint Arch., 2023

Linear Private Set Union from Multi-Query Reverse Private Membership Test.
Proceedings of the 32nd USENIX Security Symposium, 2023

ShapleyFL: Robust Federated Learning Based on Shapley Value.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference.
Proceedings of the IEEE INFOCOM 2023, 2023

Shared Foundations: Modernizing Meta's Data Lakehouse.
Proceedings of the 13th Conference on Innovative Data Systems Research, 2023

2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022

Optimal Private Set Union from Multi-Query Reverse Private Membership Test.
IACR Cryptol. ePrint Arch., 2022

An Improved Semantic Link Based Cyber Community Discovery Model on Social Network.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Scape: Scalable Collaborative Analytics System on Private Database with Malicious Security.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Strengthening Order Preserving Encryption with Differential Privacy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Novel Face Forgery Detection Method Based on Augmented Dual-Stream Networks.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

Attention-based BiLSTM model for stock price prediction.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

2021
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices.
Int. J. Inf. Sec., 2020

Silent Two-party Computation Assisted by Semi-trusted Hardware.
IACR Cryptol. ePrint Arch., 2020

A Framework of Private Set Intersection Protocols.
IACR Cryptol. ePrint Arch., 2020

DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model.
CoRR, 2020

Intertwining Order Preserving Encryption and Differential Privacy.
CoRR, 2020

2019
Procella: Unifying serving and analytical data at YouTube.
Proc. VLDB Endow., 2019

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

2017
Energy Efficiency Optimization for Communication of Air-Based Information Network with Guaranteed Timing Constraints.
J. Signal Process. Syst., 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
SAKE: scalable authenticated key exchange for mobile e-health networks.
Secur. Commun. Networks, 2016

Survey on key security technologies for space information networks.
J. Commun. Inf. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Gener. Comput. Syst., 2016

Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Identity-Based Group Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Optimization for Communication Energy Efficiency of Air-Based Information Network While Satisfying Timing Constraints.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Energy Optimization of Air-Based Information Network with Guaranteed Security Protection.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
On-chip manipulating and impedance spectroscopy sensing of single mouse embryo.
Proceedings of the 9th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2011
Tenzing A SQL Implementation On The MapReduce Framework.
Proc. VLDB Endow., 2011


  Loading...