


Остановите войну!
for scientists:


default search action
Willy Susilo
Person information

- affiliation: University of Wollongong, Centre for Computer and Information Security Research, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j356]Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo:
Geometric Searchable Encryption Without False Positive And Its Applications. Comput. J. 66(9): 2155-2168 (2023) - [j355]Shijin Chen, Willy Susilo
, Yudi Zhang, Bo Yang, Mingwu Zhang
:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j354]Zhen Zhao
, Willy Susilo
, Fuchun Guo
, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j353]Hoonyong Park, Taeguen Kim, Daniel Gerbi Duguma, Jiyoon Kim, Ilsun You, Willy Susilo
:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. Comput. Syst. Sci. Eng. 45(2): 1145-1165 (2023) - [j352]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo
, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j351]Gang Shen
, Zhiqiang Fu, Yumin Gui, Willy Susilo, Mingwu Zhang:
Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system. Inf. Sci. 647: 119261 (2023) - [j350]Jinguang Han
, Liqun Chen, Willy Susilo
, Liquan Chen, Ge Wu
:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [j349]Yang-Wai Chow
, Willy Susilo
, Yannan Li
, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [j348]Guohua Tian
, Jianghong Wei
, Miroslaw Kutylowski
, Willy Susilo
, Xinyi Huang, Xiaofeng Chen
:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j347]Yudi Zhang
, Fuchun Guo
, Willy Susilo
, Guomin Yang
:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j346]Jun Shen
, Xiaofeng Chen
, Jianghong Wei
, Fuchun Guo
, Willy Susilo
:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j345]Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien:
A new attack on some RSA variants. Theor. Comput. Sci. 960: 113898 (2023) - [j344]Mingwu Zhang
, Yu Chen
, Willy Susilo
:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3988-4001 (2023) - [j343]Hongbo Li
, Qiong Huang
, Jianye Huang
, Willy Susilo
:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [j342]Hua Shen
, Ge Wu
, Zhe Xia
, Willy Susilo
, Mingwu Zhang
:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j341]Intae Kim
, Willy Susilo
, Joonsang Baek
, Jongkil Kim
, Yang-Wai Chow
:
PCSF: Privacy-Preserving Content-Based Spam Filter. IEEE Trans. Inf. Forensics Secur. 18: 2856-2869 (2023) - [j340]Jun Shen
, Xiaofeng Chen
, Zheli Liu
, Willy Susilo
:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - [j339]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Kai He
, Robert H. Deng
, Jian Weng
:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j338]Jianghong Wei
, Xiaofeng Chen
, Jianfeng Wang
, Xinyi Huang
, Willy Susilo
:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [j337]Zhenhua Chen
, Jingjing Nie
, Li Zhan-Li, Willy Susilo
, Chunpeng Ge
:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. IEEE Trans. Serv. Comput. 16(4): 2672-2684 (2023) - [c356]Jia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. ACISP 2023: 199-219 - [c355]Mengdie Huang
, Yi Xie
, Xiaofeng Chen
, Jin Li
, Changyu Dong
, Zheli Liu
, Willy Susilo
:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c354]Shang Wang
, Yansong Gao
, Anmin Fu
, Zhi Zhang
, Yuqing Zhang
, Willy Susilo
, Dongxi Liu
:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c353]Shen Lin, Xiaoyu Zhang, Chenyang Chen, Xiaofeng Chen, Willy Susilo:
ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer. CVPR 2023: 20147-20155 - [c352]Jacob Neil Taylor
, Ngoc T. Le
, Joonsang Baek
, Willy Susilo
:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. ICCCN 2023: 1-10 - [c351]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c350]Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. SP 2023: 1667-1683 - [i90]Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2023: 180 (2023) - [i89]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - 2022
- [j336]Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen, Willy Susilo
:
Lattice-based group encryptions with only one trapdoor. Sci. China Inf. Sci. 65(5): 1-18 (2022) - [j335]Parvin Rastegari, Willy Susilo
:
On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes. Comput. J. 65(12): 3049-3061 (2022) - [j334]Boyu Kuang, Anmin Fu
, Willy Susilo
, Shui Yu
, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Comput. Secur. 112: 102498 (2022) - [j333]Anmin Fu
, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo
, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. Comput. Secur. 116: 102666 (2022) - [j332]Jongkil Kim, Yang-Wai Chow
, Willy Susilo
, Joonsang Baek, Intae Kim
:
Functional Encryption for Pattern Matching with a Hidden String. Cryptogr. 6(1): 1 (2022) - [j331]Yulin Wu
, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j330]Yulin Wu, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Junyi Li
, Xueqiao Liu
:
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Comput. Stand. Interfaces 80: 103570 (2022) - [j329]Yulin Wu, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang, Hao Wang, Tong Wu
:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - [j328]Hanchao Ku, Willy Susilo
, Yudi Zhang, Wenfen Liu, Mingwu Zhang:
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 80: 103583 (2022) - [j327]Haiyan Wang
, Yuan Li, Willy Susilo
, Dung Hoang Duong, Fucai Luo:
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82: 103635 (2022) - [j326]Meixia Miao
, Jianghong Wei
, Jiaojiao Wu
, Kuan-Ching Li
, Willy Susilo
:
Verifiable data streaming with efficient update for intelligent automation systems. Int. J. Intell. Syst. 37(2): 1322-1338 (2022) - [j325]Mahdi Fahmideh
, John Grundy, Ghassan Beydoun
, Didar Zowghi
, Willy Susilo
, Davoud Mougouei:
A model-driven approach to reengineering processes in cloud computing. Inf. Softw. Technol. 144: 106795 (2022) - [j324]Zhen Zhao
, Fuchun Guo
, Ge Wu
, Willy Susilo
, Baocang Wang
:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j323]Jianchang Lai, Fuchun Guo, Willy Susilo
, Peng Jiang, Guomin Yang
, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j322]Wei Zong
, Yang-Wai Chow
, Willy Susilo
, Jongkil Kim
, Ngoc T. Le
:
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. J. Imaging 8(12): 324 (2022) - [j321]Willy Susilo
, Fuchun Guo
, Zhen Zhao
, Ge Wu
:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1476-1488 (2022) - [j320]Fucai Luo
, Saif M. Al-Kuwari
, Willy Susilo
, Dung Hoang Duong
:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. IEEE Trans. Cloud Comput. 10(4): 2398-2408 (2022) - [j319]Minh Thuy Truc Pham, Ngoc Ai Van Nguyen, Mei Jiang
, Dung Hoang Duong, Willy Susilo
:
Wildcarded identity-based encryption from lattices. Theor. Comput. Sci. 902: 41-53 (2022) - [j318]Dung Hoang Duong, Partha Sarathi Roy
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Arnaud Sipasseuth
:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022) - [j317]Pairat Thorncharoensri
, Willy Susilo
, Yang-Wai Chow
:
Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theor. Comput. Sci. 916: 1-21 (2022) - [j316]Priyanka Dutta
, Willy Susilo
, Dung Hoang Duong, Partha Sarathi Roy
:
Puncturable identity-based and attribute-based encryption from lattices. Theor. Comput. Sci. 929: 18-38 (2022) - [j315]Partha Sarathi Roy
, Dung Hoang Duong
, Willy Susilo
, Arnaud Sipasseuth
, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor. Comput. Sci. 929: 124-139 (2022) - [j314]Xinjian Chen, Qiong Huang, Hongbo Li, Zhijian Liao, Willy Susilo
:
A novel identity-based multi-signature scheme over NTRU lattices. Theor. Comput. Sci. 933: 163-176 (2022) - [j313]Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Dongxi Liu, Xiaojiang Du
, Mohsen Guizani
:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j312]Jianting Ning
, Xinyi Huang
, Willy Susilo
, Kaitai Liang
, Ximeng Liu
, Yinghui Zhang
:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j311]Jianye Huang
, Willy Susilo
, Fuchun Guo
, Ge Wu
, Zhen Zhao
, Qiong Huang
:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [j310]Hongbo Li
, Qiong Huang
, Willy Susilo
:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. IEEE Trans. Dependable Secur. Comput. 19(3): 1532-1543 (2022) - [j309]Intae Kim
, Willy Susilo
, Joonsang Baek, Jongkil Kim:
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption. IEEE Trans. Dependable Secur. Comput. 19(3): 1856-1870 (2022) - [j308]Willy Susilo
, Peng Jiang
, Jianchang Lai
, Fuchun Guo
, Guomin Yang
, Robert H. Deng
:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j307]Chunpeng Ge
, Willy Susilo
, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang
:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2864-2872 (2022) - [j306]Chunpeng Ge
, Willy Susilo
, Joonsang Baek, Zhe Liu, Jinyue Xia
, Liming Fang
:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2907-2919 (2022) - [j305]Liming Fang
, Minghui Li
, Zhe Liu
, Changting Lin
, Shouling Ji
, Anni Zhou, Willy Susilo
, Chunpeng Ge
:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. IEEE Trans. Dependable Secur. Comput. 19(5): 3564-3578 (2022) - [j304]Guohua Tian
, Yunhan Hu, Jianghong Wei
, Zheli Liu
, Xinyi Huang
, Xiaofeng Chen
, Willy Susilo
:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [j303]Thomas Plantard
, Arnaud Sipasseuth
, Willy Susilo
, Vincent Zucca
:
Tight Bound on NewHope Failure Probability. IEEE Trans. Emerg. Top. Comput. 10(4): 1955-1965 (2022) - [j302]Peng Xu
, Willy Susilo
, Wei Wang
, Tianyang Chen, Qianhong Wu
, Kaitai Liang
, Hai Jin
:
ROSE: Robust Searchable Encryption With Forward and Backward Security. IEEE Trans. Inf. Forensics Secur. 17: 1115-1130 (2022) - [j301]Meiyan Xiao
, Hongbo Li, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. IEEE Trans. Inf. Forensics Secur. 17: 1868-1883 (2022) - [j300]Junjie Jiang
, Willy Susilo
, Joonsang Baek:
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks". IEEE Trans. Inf. Forensics Secur. 17: 3006-3007 (2022) - [j299]Ying Miao
, Qiong Huang
, Meiyan Xiao
, Willy Susilo
:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 3663-3676 (2022) - [j298]Anmin Fu
, Zhenzhu Chen
, Yi Mu
, Willy Susilo
, Yinxia Sun
, Jie Wu
:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - [j297]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Rongmao Chen
, Xixiang Lv
:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Trans. Serv. Comput. 15(3): 1664-1677 (2022) - [j296]Jianchang Lai
, Fuchun Guo
, Willy Susilo
, Xinyi Huang
, Peng Jiang
, Futai Zhang
:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - [j295]Meiyan Xiao
, Qiong Huang
, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. IEEE Trans. Serv. Comput. 15(6): 3143-3155 (2022) - [j294]Mahdi Fahmideh
, Aakash Ahmad
, Ali Behnaz, John Grundy
, Willy Susilo
:
Software Engineering for Internet of Things: The Practitioners' Perspective. IEEE Trans. Software Eng. 48(8): 2857-2878 (2022) - [j293]Parvin Rastegari, Willy Susilo
:
On delegatability of MDVS schemes. J. Comput. Virol. Hacking Tech. 18(2): 71-80 (2022) - [c349]Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien:
A Generalized Attack on the Multi-prime Power RSA. AFRICACRYPT 2022: 537-549 - [c348]Priyanka Dutta, Mei Jiang
, Dung Hoang Duong, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. AsiaCCS 2022: 408-422 - [c347]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
:
Public-Key Watermarking Schemes for Pseudorandom Functions. CRYPTO (2) 2022: 637-667 - [c346]Khoa Nguyen
, Fuchun Guo
, Willy Susilo
, Guomin Yang
:
Multimodal Private Signatures. CRYPTO (2) 2022: 792-822 - [c345]Wei Zong, Yang-Wai Chow
, Willy Susilo
:
High Quality Audio Adversarial Examples Without Using Psychoacoustics. CSS 2022: 163-177 - [c344]Kien Do
, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana
, Dang Nguyen, Willy Susilo
, Svetha Venkatesh:
Towards Effective and Robust Neural Trojan Defenses via Input Filtering. ECCV (5) 2022: 283-300 - [c343]Willy Susilo
, Yannan Li
, Fuchun Guo
, Jianchang Lai
, Ge Wu
:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. ESORICS (2) 2022: 65-85 - [c342]Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo
, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. ESORICS (2) 2022: 86-104 - [c341]Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Josef Pieprzyk
:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. ESORICS (1) 2022: 283-302 - [c340]Tuong Ngoc Nguyen
, Anh The Ta
, Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c339]Mei Jiang
, Dung Hoang Duong
, Willy Susilo
:
Puncturable Signature: A Generic Construction and Instantiations. ESORICS (2) 2022: 507-527 - [c338]Yi Xie, Mengdie Huang
, Xiaoyu Zhang, Changyu Dong, Willy Susilo
, Xiaofeng Chen:
GAME: Generative-Based Adaptive Model Extraction Attack. ESORICS (1) 2022: 570-588 - [c337]Fuchun Guo
, Willy Susilo
:
Optimal Tightness for Chain-Based Unique Signatures. EUROCRYPT (2) 2022: 553-583 - [c336]Gang Tang
, Dung Hoang Duong
, Antoine Joux
, Thomas Plantard
, Youming Qiao
, Willy Susilo
:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. EUROCRYPT (3) 2022: 582-612 - [c335]Willy Susilo:
Keynote Speech. ISPA/BDCloud/SocialCom/SustainCom 2022: xxv - [c334]Priyanka Dutta
, Dung Hoang Duong
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. ProvSec 2022: 121-136 - [c333]Zhaojie Wang
, Willy Susilo
, Jianan Guo
, Yilei Wang
, Minghao Zhao
:
Reinforcement-Mining: Protecting Reward in Selfish Mining. ProvSec 2022: 199-209 - [c332]Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. SERVICES 2022: 31 - [c331]Intae Kim
, Willy Susilo
, Joonsang Baek
, Jongkil Kim
, Yang-Wai Chow
:
TLS Goes Low Cost: When TLS Meets Edge. WISA 2022: 102-113 - [e20]Khoa Nguyen
, Guomin Yang
, Fuchun Guo
, Willy Susilo
:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6 [contents] - [e19]Xiaofeng Chen, Jian Shen
, Willy Susilo
:
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings. Lecture Notes in Computer Science 13547, Springer 2022, ISBN 978-3-031-18066-8 [contents] - [e18]Willy Susilo
, Xiaofeng Chen
, Fuchun Guo
, Yudi Zhang
, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1 [contents] - [i88]Kien Do, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana, Dang Nguyen, Willy Susilo
, Svetha Venkatesh:
Towards Effective and Robust Neural Trojan Defenses via Input Filtering. CoRR abs/2202.12154 (2022) - [i87]Shang Wang, Yansong Gao, Anmin Fu
, Zhi Zhang, Yuqing Zhang, Willy Susilo
:
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. CoRR abs/2206.00145 (2022) - [i86]Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo
, Svetha Venkatesh:
Defense Against Multi-target Trojan Attacks. CoRR abs/2207.03895 (2022) - [i85]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. IACR Cryptol. ePrint Arch. 2022: 95 (2022) - [i84]Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo:
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing. IACR Cryptol. ePrint Arch. 2022: 199 (2022) - [i83]Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. IACR Cryptol. ePrint Arch. 2022: 267 (2022) - [i82]Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. IACR Cryptol. ePrint Arch. 2022: 526 (2022) - [i81]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2022: 768 (2022) - [i80]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. IACR Cryptol. ePrint Arch. 2022: 1008 (2022) - [i79]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - [i78]Zhili Chen, Dung Hoang Duong, Tuong Ngoc Nguyen, Youming Qiao, Willy Susilo, Gang Tang:
On digital signatures based on isomorphism problems: QROM security and ring signatures. IACR Cryptol. ePrint Arch. 2022: 1184 (2022) - 2021
- [j292]Hua Shen
, Mingwu Zhang
, Hao Wang
, Fuchun Guo
, Willy Susilo
:
Efficient and Privacy-Preserving Massive Data Processing for Smart Grids. IEEE Access 9: 70616-70627 (2021) - [j291]