Zhe Liu
Orcid: 0000-0001-8578-2635Affiliations:
- Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- University of Waterloo, Institute for Quantum Computing / Department of Combinatorics and Optimization, ON, Canada (former)
- University of Luxembourg, Laboratory of Algorithmics, Cryptology and Security, Luxembourg (PhD 2015)
According to our database1,
Zhe Liu
authored at least 240 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on wwwen.uni.lu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Neural Networks Learn. Syst., November, 2024
IEEE Trans. Comput. Soc. Syst., October, 2024
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks.
Peer Peer Netw. Appl., July, 2024
Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey.
IEEE Internet Things J., July, 2024
IEEE Trans. Neural Networks Learn. Syst., June, 2024
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks.
IEEE Trans. Ind. Informatics, May, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Parallel Distributed Syst., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024
A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024
iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks.
Inf. Sci., 2024
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning.
Comput. Secur., 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Inf. Fusion, December, 2023
Autom. Softw. Eng., November, 2023
ACM Trans. Embed. Comput. Syst., September, 2023
IEEE Trans. Computers, August, 2023
ACM Trans. Softw. Eng. Methodol., July, 2023
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things.
IEEE Trans. Computers, July, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations.
IEEE Trans. Inf. Forensics Secur., 2023
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023
J. Syst. Softw., 2023
IACR Cryptol. ePrint Arch., 2023
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023
G<sup>2</sup>uardFL: Safeguarding Federated Learning Against Backdoor Attacks through Attributed Client Graph Clustering.
CoRR, 2023
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Poster Abstract: CNN-guardian: Secure Neural Network Inference Acceleration on Edge GPU.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the Artificial Intelligence - Third CAAI International Conference, 2023
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Let the Data Choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-View Clustering.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Reliab., 2022
IEEE Trans. Ind. Informatics, 2022
Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2.
ACM Trans. Embed. Comput. Syst., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IEEE Trans. Computers, 2022
Efficient Software Implementation of the SIKE Protocol Using a New Data Representation.
IEEE Trans. Computers, 2022
IEEE Trans. Computers, 2022
A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics.
Inf. Softw. Technol., 2022
Int. J. Intell. Syst., 2022
IEICE Trans. Inf. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Finite Fields Their Appl., 2022
CoRR, 2022
A Survey of Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection.
CoRR, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the Natural Language Processing and Chinese Computing, 2022
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IEEE Trans. Software Eng., 2021
ACM Trans. Reconfigurable Technol. Syst., 2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021
ACM Trans. Internet Techn., 2021
A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks.
IEEE Trans. Ind. Informatics, 2021
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack.
IEEE Trans. Inf. Forensics Secur., 2021
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
J. Syst. Softw., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
Toward Native Artificial Intelligence in 6G Networks: System Design, Architectures, and Paradigms.
CoRR, 2021
Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT.
IEEE Trans. Serv. Comput., 2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Engineering Management, 2020
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
IEEE Trans. Computers, 2020
IEEE Trans. Computers, 2020
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020
J. Syst. Archit., 2020
J. Parallel Distributed Comput., 2020
An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020
Faster Software Implementation of the SIKE Protocol Based on A New Data Representation.
IACR Cryptol. ePrint Arch., 2020
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
An Efficient and Scalable Sparse Polynomial Multiplication Accelerator for LAC on FPGA.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Privacy-aware and Resource-saving Collaborative Learning for Healthcare in Cloud Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Computers, 2019
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019
IEEE Internet Things J., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
An efficient access control scheme for smart lock based on asynchronous communication.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances.
IEEE Trans. Computers, 2018
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Commun. Mag., 2018
Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities.
IEEE Commun. Mag., 2018
Proceedings of the Information Security Theory and Practice, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers.
ACM Trans. Embed. Comput. Syst., 2017
ACM Trans. Embed. Comput. Syst., 2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things.
IEEE Trans. Computers, 2017
IACR Cryptol. ePrint Arch., 2017
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
Proceedings of the 24th IEEE Symposium on Computer Arithmetic, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
Secur. Commun. Networks, 2016
A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges.
J. Comput. Sci. Technol., 2016
J. Cryptogr. Eng., 2016
Frontiers Comput. Sci., 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Secur. Commun. Networks, 2015
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
Secur. Commun. Networks, 2015
J. High Speed Networks, 2015
J. Ambient Intell. Humaniz. Comput., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Secur., 2015
Sci. China Inf. Sci., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Sensors, 2013
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers.
IACR Cryptol. ePrint Arch., 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012