default search action
Dongxi Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j32]Kerry Anne Farrea, Zubair A. Baig, Robin Ram Mohan Doss, Dongxi Liu:
Provably secure optimal homomorphic signcryption for satellite-based internet of things. Comput. Networks 250: 110516 (2024) - [j31]Nan Wang, Dongxi Liu:
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. Proc. Priv. Enhancing Technol. 2024(3): 59-74 (2024) - [c77]Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Improved Multimodal Private Signatures from Lattices. ACISP (2) 2024: 3-23 - [c76]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. ACISP (2) 2024: 124-143 - [c75]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures. CRYPTO (1) 2024: 3-38 - [c74]Yuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou, Dongxi Liu:
Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review. ICECCS 2024: 346-366 - [c73]Nan Wang, Sid Chi-Kin Chau, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. SP 2024: 1832-1848 - [i38]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures. IACR Cryptol. ePrint Arch. 2024: 868 (2024) - [i37]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. IACR Cryptol. ePrint Arch. 2024: 985 (2024) - [i36]Nan Wang, Dongxi Liu:
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. IACR Cryptol. ePrint Arch. 2024: 1441 (2024) - 2023
- [j30]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023) - [c72]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c71]Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
WinkFuzz: Model-based Script Synthesis for Fuzzing. ASSS@AsiaCCS 2023: 2:1-2:12 - [c70]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. CRYPTO (5) 2023: 484-517 - [c69]Jiafan Wang, Dongxi Liu:
Poster: Multi-Writer Searchable Encryption with Fast Search and Post-Quantum Security. ICDCS 2023: 1-2 - [i35]M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David:
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy. CoRR abs/2306.03379 (2023) - [i34]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - [i33]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i32]Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu:
model-based script synthesis for fuzzing. CoRR abs/2308.04115 (2023) - [i31]Nan Wang, Sid Chi-Kin Chau, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. IACR Cryptol. ePrint Arch. 2023: 1185 (2023) - 2022
- [j29]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j28]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IEEE Trans. Dependable Secur. Comput. 19(4): 2609-2621 (2022) - [c68]Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning. ESORICS (1) 2022: 195-216 - [c67]Zian Liu, Chao Chen, Ejaz Ahmed, Dongxi Liu, Jun Zhang:
Automated Binary Analysis: A Survey. ICA3PP 2022: 392-411 - [i30]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning in Industrial Settings. CoRR abs/2202.06053 (2022) - [i29]Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor:
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches. CoRR abs/2202.10320 (2022) - [i28]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. IACR Cryptol. ePrint Arch. 2022: 141 (2022) - 2021
- [j27]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy preserving distributed machine learning with federated learning. Comput. Commun. 171: 112-125 (2021) - [j26]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. Comput. Commun. 173: 192-205 (2021) - [j25]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j24]Zhi Zhang, Yueqiang Cheng, Yansong Gao, Surya Nepal, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. IEEE Trans. Inf. Forensics Secur. 16: 16-27 (2021) - [j23]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [c66]Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c65]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Transparency or Anonymity Leak: Monero Mining Pools Data Publication. ACISP 2021: 433-450 - [c64]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - [c63]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CCS 2021: 337-350 - [c62]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yang-Wai Chow, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. ESORICS (2) 2021: 106-126 - [c61]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [i27]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CoRR abs/2105.05445 (2021) - [i26]Dongxi Liu:
Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption). IACR Cryptol. ePrint Arch. 2021: 1338 (2021) - 2020
- [j22]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. Comput. Secur. 97: 101951 (2020) - [j21]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets. IEEE Internet Things J. 7(4): 2651-2662 (2020) - [j20]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman:
Local Differential Privacy for Deep Learning. IEEE Internet Things J. 7(7): 5827-5842 (2020) - [j19]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. Inf. Sci. 527: 420-443 (2020) - [j18]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman:
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Informatics 16(9): 6092-6102 (2020) - [c60]Peter U. Eze, Udaya Parampalli, Robin J. Evans, Dongxi Liu:
A New Evaluation Method for Medical Image Information Hiding Techniques. EMBC 2020: 6119-6122 - [c59]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41 - [c58]Nan Li, Dongxi Liu, Surya Nepal, Guangyu Pei:
A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability. TPS-ISA 2020: 46-54 - [i25]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. CoRR abs/2001.01848 (2020) - [i24]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Distributed Machine Learning with Federated Learning. CoRR abs/2004.12108 (2020) - [i23]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. CoRR abs/2005.10486 (2020) - [i22]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. CoRR abs/2007.02013 (2020) - [i21]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020) - [i20]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IACR Cryptol. ePrint Arch. 2020: 20 (2020) - [i19]Dongxi Liu, Surya Nepal:
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions. IACR Cryptol. ePrint Arch. 2020: 974 (2020)
2010 – 2019
- 2019
- [j17]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. Secur. 87 (2019) - [j16]Xianmin Wang, Yu Zhang, Brij Bhooshan Gupta, Hongfei Zhu, Dongxi Liu:
An Identity-Based Signcryption on Lattice without Trapdoor. J. Univers. Comput. Sci. 25(3): 282-293 (2019) - [j15]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j14]Wei Li, Bonnie M. Liu, Dongxi Liu, Ren Ping Liu, Peishun Wang, Shoushan Luo, Wei Ni:
Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing. IEEE J. Biomed. Health Informatics 23(3): 1278-1289 (2019) - [c57]Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu:
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. ACISP 2019: 3-20 - [c56]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan, Dongxi Liu:
Location Based Encryption. ACISP 2019: 21-38 - [c55]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. ACISP 2019: 307-321 - [c54]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. ACNS 2019: 67-88 - [c53]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono:
Designing Smart Contract for Electronic Document Taxation. CANS 2019: 199-213 - [c52]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Limerlina:
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol. CANS 2019: 235-246 - [c51]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. AsiaCCS 2019: 41-54 - [c50]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. CCS 2019: 567-584 - [c49]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu:
On The Unforkability of Monero. AsiaCCS 2019: 621-632 - [c48]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. CRYPTO (1) 2019: 115-146 - [c47]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. ESORICS (1) 2019: 215-233 - [c46]Peter U. Eze, Udaya Parampalli, Robin J. Evans, Dongxi Liu:
Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography. ICMR 2019: 53-57 - [c45]Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:
Exploit in Smart Devices: A Case Study. SocialSec 2019: 152-164 - [i18]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i17]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search. CoRR abs/1905.04501 (2019) - [i16]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. CoRR abs/1906.08149 (2019) - [i15]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams. CoRR abs/1907.13498 (2019) - [i14]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Local Differential Privacy for Deep Learning. CoRR abs/1908.02997 (2019) - [i13]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets. CoRR abs/1911.05927 (2019) - [i12]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang:
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique. CoRR abs/1912.03076 (2019) - [i11]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. IACR Cryptol. ePrint Arch. 2019: 445 (2019) - [i10]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption supporting to Group Messaging Service. IACR Cryptol. ePrint Arch. 2019: 1078 (2019) - [i9]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. IACR Cryptol. ePrint Arch. 2019: 1287 (2019) - 2018
- [j13]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam:
Privacy Preserving User Based Web Service Recommendations. IEEE Access 6: 56647-56657 (2018) - [j12]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient data perturbation for privacy preserving and accurate data stream mining. Pervasive Mob. Comput. 48: 1-19 (2018) - [c44]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762 - [c43]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen:
Anonymity Reduction Attacks to Monero. Inscrypt 2018: 86-100 - [c42]Peter U. Eze, Udaya Parampalli, Robin J. Evans, Dongxi Liu:
Spread Spectrum Steganographic Capacity Improvement for Medical Image Security in Teleradiology. EMBC 2018: 1-4 - [c41]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. RAID 2018: 691-710 - [c40]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. TrustCom/BigDataSE 2018: 1196-1201 - [i8]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS. CoRR abs/1802.07062 (2018) - [i7]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining. CoRR abs/1806.06151 (2018) - [i6]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. IACR Cryptol. ePrint Arch. 2018: 348 (2018) - [i5]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures. IACR Cryptol. ePrint Arch. 2018: 773 (2018) - [i4]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018) - 2017
- [j11]Nan Li, Dongxi Liu, Surya Nepal:
Lightweight Mutual Authentication for IoT and Its Applications. IEEE Trans. Sustain. Comput. 2(4): 359-370 (2017) - [c39]Wei Li, Wei Ni, Dongxi Liu, Ren Ping Liu, Peishun Wang, Shoushan Luo:
Fine-Grained Access Control for Personal Health Records in Cloud Computing. VTC Spring 2017: 1-5 - [c38]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino:
Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516 - [i3]Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal:
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication. IACR Cryptol. ePrint Arch. 2017: 685 (2017) - 2016
- [j10]Li Duan, Yang Zhang, Shiping Chen, Shuai Zhao, Shiyao Wang, Dongxi Liu, Ren Ping Liu, Bo Cheng, Junliang Chen:
Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations. IEEE Access 4: 3454-3468 (2016) - [j9]Li Duan, Dongxi Liu, Yang Zhang, Shiping Chen, Ren Ping Liu, Bo Cheng, Junliang Chen:
Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems. ACM Trans. Internet Techn. 16(4): 23:1-23:17 (2016) - [c37]Dongxi Liu:
Efficient Processing of Encrypted Data in Honest-but-Curious Clouds. CLOUD 2016: 970-974 - [c36]Jane Li, John Zic, Nerolie Oakes, Dongxi Liu, Chen Wang:
Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing. CDVE 2016: 185-193 - [c35]Shenlu Wang, Muhammad Aamir Cheema, Xuemin Lin, Ying Zhang, Dongxi Liu:
Efficiently computing reverse k furthest neighbors. ICDE 2016: 1110-1121 - [c34]Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu:
Towards privacy-preserving classification in neural networks. PST 2016: 392-399 - 2015
- [c33]John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen:
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations. ARES 2015: 642-651 - [c32]Li Duan, Shiping Chen, Yang Zhang, Chunhong Liu, Dongxi Liu, Ren Ping Liu, Junliang Chen:
Automated Policy Combination for Data Sharing across Multiple Organizations. SCC 2015: 226-233 - [c31]Fang-Yu Rao, Bharath K. Samanthula, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-user K-Means Clustering. CIC 2015: 80-89 - [c30]Dongxi Liu, John Zic:
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. TrustCom/BigDataSE/ISPA (1) 2015: 897-904 - [i2]Dongxi Liu:
Practical Fully Homomorphic Encryption without Noise Reduction. IACR Cryptol. ePrint Arch. 2015: 468 (2015) - 2014
- [c29]Danan Thilakanathan, Shiping Chen, Surya Nepal, Rafael A. Calvo, Dongxi Liu, John Zic:
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices. IEEE CLOUD 2014: 224-231 - [c28]