Zhe Liu

Orcid: 0000-0001-8578-2635

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
  • University of Waterloo, Institute for Quantum Computing / Department of Combinatorics and Optimization, ON, Canada (former)
  • University of Luxembourg, Laboratory of Algorithmics, Cryptology and Security, Luxembourg (PhD 2015)


According to our database1, Zhe Liu authored at least 240 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Regularized Simple Multiple Kernel k-Means With Kernel Average Alignment.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

RARE: Robust Masked Graph Autoencoder.
IEEE Trans. Knowl. Data Eng., October, 2024

FairCMS: Cloud Media Sharing With Fair Copyright Protection.
IEEE Trans. Comput. Soc. Syst., October, 2024

Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks.
Peer Peer Netw. Appl., July, 2024

Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey.
IEEE Internet Things J., July, 2024

Deep Fusion Clustering Network With Reliable Structure Preservation.
IEEE Trans. Neural Networks Learn. Syst., June, 2024

Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks.
IEEE Trans. Ind. Informatics, May, 2024

ELXGB: An Efficient and Privacy-Preserving XGBoost for Vertical Federated Learning.
IEEE Trans. Serv. Comput., 2024

High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature.
IEEE Trans. Parallel Distributed Syst., 2024

cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location.
IEEE Trans. Inf. Forensics Secur., 2024

Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024

A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024

iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks.
Inf. Sci., 2024

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024

GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning.
Comput. Secur., 2024

Efficient Large-Scale Multi-party Computation Based on Garbled Circuit.
Proceedings of the Information Security Practice and Experience, 2024

DVSAI: Diverse View-Shared Anchors Based Incomplete Multi-View Clustering.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Attribute-Missing Graph Clustering Network.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Simple multiple kernel k-means with kernel weight regularization.
Inf. Fusion, December, 2023

Tips: towards automating patch suggestion for vulnerable smart contracts.
Autom. Softw. Eng., November, 2023

Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512.
ACM Trans. Embed. Comput. Syst., September, 2023

BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing.
IEEE Trans. Computers, August, 2023

Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair.
ACM Trans. Softw. Eng. Methodol., July, 2023

CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things.
IEEE Trans. Computers, July, 2023

Privacy-Preserving Classification in Multiple Clouds eHealthcare.
IEEE Trans. Serv. Comput., 2023

Lightweight Privacy-Preserving Federated Incremental Decision Trees.
IEEE Trans. Serv. Comput., 2023

VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations.
IEEE Trans. Inf. Forensics Secur., 2023

Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023

Efficient transformer with code token learner for code clone detection.
J. Syst. Softw., 2023

Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU.
IACR Cryptol. ePrint Arch., 2023

Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023

G<sup>2</sup>uardFL: Safeguarding Federated Learning Against Backdoor Attacks through Attributed Client Graph Clustering.
CoRR, 2023

RARE: Robust Masked Graph Autoencoder.
CoRR, 2023

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023

Limits of I/O Based Ransomware Detection: An Imitation Based Attack.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Poster Abstract: CNN-guardian: Secure Neural Network Inference Acceleration on Edge GPU.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023

Practical Single-Round Secure Wildcard Pattern Matching.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

Consistency of Multiple Kernel Clustering.
Proceedings of the International Conference on Machine Learning, 2023

Sparse Federated Training of Object Detection in the Internet of Vehicles.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient and Privacy-Preserving Neural Network Prediction Scheme with TEE.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Layer Feature Division Transferable Adversarial Attack.
Proceedings of the IEEE International Conference on Acoustics, 2023

Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences.
Proceedings of the IEEE Global Communications Conference, 2023

V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Privacy-Preserving Federated Learning via Disentanglement.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Interpretability-Based Cross-Silo Federated Learning.
Proceedings of the Artificial Intelligence - Third CAAI International Conference, 2023

E-NER: Evidential Deep Learning for Trustworthy Named Entity Recognition.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Auto-Weighted Multi-View Clustering for Large-Scale Data.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Let the Data Choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-View Clustering.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification.
IEEE Trans. Serv. Comput., 2022

The Classification and Detection of Malware Using Soft Relevance Evaluation.
IEEE Trans. Reliab., 2022

Revisiting Error-Correction in Precommitment Distance-Bounding Protocols.
IEEE Trans. Ind. Informatics, 2022

Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022

EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2.
ACM Trans. Embed. Comput. Syst., 2022

CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy.
IEEE Trans. Dependable Secur. Comput., 2022

A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

HF-TPE: High-Fidelity Thumbnail- Preserving Encryption.
IEEE Trans. Circuits Syst. Video Technol., 2022

Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Improved Plantard Arithmetic for Lattice-based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform.
IEEE Trans. Computers, 2022

Efficient Software Implementation of the SIKE Protocol Using a New Data Representation.
IEEE Trans. Computers, 2022

WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations.
IEEE Trans. Computers, 2022

A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022

Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics.
Inf. Softw. Technol., 2022

Robust privacy-preserving federated learning framework for IoT devices.
Int. J. Intell. Syst., 2022

A Privacy-Preserving Data Feed Scheme for Smart Contracts.
IEICE Trans. Inf. Syst., 2022

CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes.
IACR Cryptol. ePrint Arch., 2022

Simplified isogeny formulas on twisted Jacobi quartic curves.
Finite Fields Their Appl., 2022

High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature.
CoRR, 2022

A Survey of Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection.
CoRR, 2022

An Efficient Soft Analytical Side-Channel Attack on Ascon.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

PATA: Fuzzing with Path Aware Taint Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Minerva: browser API fuzzing with dynamic mod-ref analysis.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

PromptAttack: Prompt-Based Attack for Language Models via Gradient Search.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

A Deep Looking at the Code Changes in OpenHarmony.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Semantic Learning and Emulation Based Cross-Platform Binary Vulnerability Seeker.
IEEE Trans. Software Eng., 2021

A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme.
ACM Trans. Reconfigurable Technol. Syst., 2021

A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021

Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities.
ACM Trans. Internet Techn., 2021

A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks.
IEEE Trans. Ind. Informatics, 2021

Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack.
IEEE Trans. Inf. Forensics Secur., 2021

ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Advances in privacy-preserving computing.
Peer-to-Peer Netw. Appl., 2021

A critical review on the evaluation of automated program repair systems.
J. Syst. Softw., 2021

Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things.
IEEE Internet Things J., 2021

Time-memory Trade-offs for Saber+ on Memory-constrained RISC-V.
IACR Cryptol. ePrint Arch., 2021

CREAMS: Copyrighted Cloud Media Sharing.
CoRR, 2021

Toward Native Artificial Intelligence in 6G Networks: System Design, Architectures, and Paradigms.
CoRR, 2021

Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of Things.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

Revisiting Test Cases to Boost Generate-and-Validate Program Repair.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

Efficient Implementation of Kyber on Mobile Devices.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Multi-Level IoT Device Identification.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

PAVFuzz: State-Sensitive Fuzz Testing of Protocols in Autonomous Vehicles.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

ActAnyware - Blockchain-Based Software Licensing Scheme.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT.
IEEE Trans. Serv. Comput., 2020

Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools.
IEEE/ACM Trans. Netw., 2020

SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020

Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020

Blockchain-Based Anonymous Reporting Scheme With Anonymous Rewarding.
IEEE Trans. Engineering Management, 2020

Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020

Persistent Fault Attack in Practice.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Efficient Software Implementation of Ring-LWE Encryption on IoT Processors.
IEEE Trans. Computers, 2020

Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE.
IEEE Trans. Computers, 2020

Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020

A semi-autonomous distributed blockchain-based framework for UAVs system.
J. Syst. Archit., 2020

A blockchain based decentralized data security mechanism for the Internet of Things.
J. Parallel Distributed Comput., 2020

An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network.
IEEE Internet Things J., 2020

PADL: Privacy-Aware and Asynchronous Deep Learning for IoT Applications.
IEEE Internet Things J., 2020

A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020

Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020

Faster Software Implementation of the SIKE Protocol Based on A New Data Representation.
IACR Cryptol. ePrint Arch., 2020

3D Invisible Cloak.
CoRR, 2020

Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020

A privacy preserve big data analysis system for wearable wireless sensor network.
Comput. Secur., 2020

BlueDoor: breaking the secure information flow via BLE vulnerability.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Towards Pattern-aware Privacy-preserving Real-time Data Collection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

An Efficient and Scalable Sparse Polynomial Multiplication Accelerator for LAC on FPGA.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Privacy-aware and Resource-saving Collaborative Learning for Healthcare in Cloud Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Generative Neural Networks for Anomaly Detection in Crowded Scenes.
IEEE Trans. Inf. Forensics Secur., 2019

IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms.
IEEE Trans. Inf. Forensics Secur., 2019

Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019

Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman.
IEEE Trans. Computers, 2019

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019

Game theoretic security of quantum bit commitment.
Inf. Sci., 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019

High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2019

Automatic fine-grained access control in SCADA by machine learning.
Future Gener. Comput. Syst., 2019

GasFuzz: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability.
CoRR, 2019

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019

Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019

Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture.
Proceedings of the Network and System Security - 13th International Conference, 2019

VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

All the HIGHT You Need on Cortex-M4.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End Microcontrollers.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

An efficient access control scheme for smart lock based on asynchronous communication.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018

SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances.
IEEE Trans. Computers, 2018

Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018

Secure GCM implementation on AVR.
Discret. Appl. Math., 2018

Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Commun. Mag., 2018

Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities.
IEEE Commun. Mag., 2018

A Family of Lightweight Twisted Edwards Curves for the Internet of Things.
Proceedings of the Information Security Theory and Practice, 2018

CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones.
Proceedings of the Information Security Practice and Experience, 2018

Design and Optimization of Modular Multiplication for SIDH.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers.
ACM Trans. Embed. Comput. Syst., 2017

Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers.
ACM Trans. Embed. Comput. Syst., 2017

Efficient Elliptic Curve Cryptography for Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2017

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things.
IEEE Trans. Computers, 2017

Implementing RSA for sensor nodes in smart cities.
Pers. Ubiquitous Comput., 2017

FourQ on embedded devices with strong countermeasures against side-channel attacks.
IACR Cryptol. ePrint Arch., 2017

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017

Personal identification number entry for Google glass.
Comput. Electr. Eng., 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

Hidden-Token Searchable Public-Key Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Secure Multi-label Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2017

Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite.
Proceedings of the Information Security Practice and Experience, 2017

Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Multiprecision Multiplication on ARMv8.
Proceedings of the 24th IEEE Symposium on Computer Arithmetic, 2017

Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
IEEE Trans. Inf. Forensics Secur., 2016

Hybrid Montgomery Reduction.
ACM Trans. Embed. Comput. Syst., 2016

Rational computing protocol based on fuzzy theory.
Soft Comput., 2016

Binary field multiplication on ARMv8.
Secur. Commun. Networks, 2016

Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
Secur. Commun. Networks, 2016

A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges.
J. Comput. Sci. Technol., 2016

Implementation of a leakage-resilient ElGamal key encapsulation mechanism.
J. Cryptogr. Eng., 2016

Identity-based aggregate signcryption in the standard model from multilinear maps.
Frontiers Comput. Sci., 2016

Social rational secure multi-party computation.
Concurr. Comput. Pract. Exp., 2016

Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Lightweight Public-Key Cryptography for Wireless Sensor Nodes.
PhD thesis, 2015

Optimized Karatsuba squaring on 8-bit AVR processors.
Secur. Commun. Networks, 2015

Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.
Secur. Commun. Networks, 2015

Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
Secur. Commun. Networks, 2015

The impact of social cloud reputation and structure on rational computation.
J. High Speed Networks, 2015

A brief survey on secure multi-party computing in the presence of rational parties.
J. Ambient Intell. Humaniz. Comput., 2015

Secure Binary Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Faster ECC over F<sub>2<sup>571</sup></sub> (feat. PMULL).
IACR Cryptol. ePrint Arch., 2015

Compact Implementations of LEA Block Cipher for Low-End Microprocessors.
IACR Cryptol. ePrint Arch., 2015

NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture.
IACR Cryptol. ePrint Arch., 2015

VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism.
IACR Cryptol. ePrint Arch., 2015

Efficient Ring-LWE Encryption on 8-bit AVR Processors.
IACR Cryptol. ePrint Arch., 2015

Montgomery multiplication and squaring for Optimal Prime Fields.
Comput. Secur., 2015

Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices.
Sci. China Inf. Sci., 2015

Open Sesame! Hacking the Password.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Compact Implementations of LSH.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Small Private Key <i>MQ</i>PKS on an Embedded Microprocessor.
Sensors, 2014

New rational parties relying on reputation.
Secur. Commun. Networks, 2014

Montgomery Modular Multiplication on ARM-NEON Revisited.
IACR Cryptol. ePrint Arch., 2014

Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2014

Improved Modular Multiplication for Optimal Prime Fields.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Rational Secure Two-party Computation in Social Cloud.
Proceedings of the Network and System Security - 8th International Conference, 2014

High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit.
Proceedings of the Information Security Practice and Experience, 2014

Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Sensors, 2013

New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers.
IACR Cryptol. ePrint Arch., 2013

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013

Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Fair Computation with Tit-for-Tat Strategy.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Parallel Implementations of LEA.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes.
IACR Cryptol. ePrint Arch., 2012

Multi-party Computation with Social Rational Parties.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012


  Loading...