default search action
Zheli Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. Comput. Commun. 220: 138-148 (2024) - [j75]Siyi Lv, Yu Wei, Jingyu Jia, Xinhao Li, Tong Li, Zheli Liu, Xiaofeng Chen, Liang Guo:
New approach for efficient malicious multiparty private set intersection. Inf. Sci. 678: 120995 (2024) - [j74]Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. IEEE Trans. Inf. Forensics Secur. 19: 2501-2516 (2024) - [j73]Jingyu Jia, Xinhao Li, Tong Li, Zhewei Liu, Chang Tan, Siyi Lv, Liang Guo, Changyu Dong, Zheli Liu:
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes. IEEE Trans. Inf. Forensics Secur. 19: 8338-8352 (2024) - [j72]Xiangrui Cai, Yang Wang, Sihan Xu, Hao Li, Ying Zhang, Zheli Liu, Xiaojie Yuan:
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection. IEEE Trans. Inf. Forensics Secur. 19: 10157-10172 (2024) - [j71]Chengjin Zhou, Qiao Xiang, Lingjun Pu, Zheli Liu, Yuan Zhang, Xinjing Yuan, Jingdong Xu:
${\sf NetDPI}$NetDPI: Efficient Deep Packet Inspection via Filtering-Plus-Verification in Programmable 5G Data Plane for Multi-Access Edge Computing. IEEE Trans. Mob. Comput. 23(12): 15031-15047 (2024) - [c38]Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu:
BadActs: A Universal Backdoor Defense in the Activation Space. ACL (Findings) 2024: 5339-5352 - [c37]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. AsiaCCS 2024 - [c36]Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu:
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. CCS 2024: 854-868 - [i16]Xiangrui Cai, Yang Wang, Sihan Xu, Hao Li, Ying Zhang, Zheli Liu, Xiaojie Yuan:
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection. CoRR abs/2403.09209 (2024) - [i15]Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Fangming Wang, Yu Zhang, Zheli Liu:
A Survey on Consumer IoT Traffic: Security and Privacy. CoRR abs/2403.16149 (2024) - [i14]Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu:
BadActs: A Universal Backdoor Defense in the Activation Space. CoRR abs/2405.11227 (2024) - [i13]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. IACR Cryptol. ePrint Arch. 2024: 950 (2024) - [i12]Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu:
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. IACR Cryptol. ePrint Arch. 2024: 1433 (2024) - 2023
- [j70]Jingyu Jia, Chang Tan, Zhewei Liu, Xinhao Li, Zheli Liu, Siyi Lv, Changyu Dong:
Total variation distance privacy: Accurately measuring inference attacks and improving utility. Inf. Sci. 626: 537-558 (2023) - [j69]Zikai Alex Wen, Jingyu Jia, Hongyang Yan, Yaxing Yao, Zheli Liu, Changyu Dong:
The influence of explanation designs on user understanding differential privacy and making data-sharing decision. Inf. Sci. 642: 118799 (2023) - [j68]Jiqiang Gao, Boyu Hou, Xiaojie Guo, Zheli Liu, Ying Zhang, Kai Chen, Jin Li:
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 147-160 (2023) - [j67]Jun Shen, Xiaofeng Chen, Zheli Liu, Willy Susilo:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - [j66]Zijie Pan, Li Hu, Weixuan Tang, Jin Li, Yi He, Zheli Liu:
Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework. IEEE Trans. Knowl. Data Eng. 35(3): 2975-2986 (2023) - [j65]Sihan Xu, Ya Gao, Lingling Fan, Zheli Liu, Yang Liu, Hua Ji:
LiDetector: License Incompatibility Detection for Open Source Software. ACM Trans. Softw. Eng. Methodol. 32(1): 22:1-22:28 (2023) - [j64]Chenkai Guo, Weijie Zhang, Naipeng Dong, Zheli Liu, Yang Xiang:
QoS-Aware Diversified Service Selection. IEEE Trans. Serv. Comput. 16(3): 2085-2099 (2023) - [c35]Zhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm. AIS&P (1) 2023: 499-512 - [c34]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c33]Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu:
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. EUROCRYPT (1) 2023: 330-362 - [c32]Sihan Xu, Ya Gao, Lingling Fan, Linyu Li, Xiangrui Cai, Zheli Liu:
LiResolver: License Incompatibility Resolution for Open Source Software. ISSTA 2023: 652-663 - [c31]Linyu Li, Sihan Xu, Yang Liu, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu:
LiSum: Open Source Software License Summarization with Multi-Task Learning. ASE 2023: 787-799 - [e3]Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen:
Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14252, Springer 2023, ISBN 978-981-99-7355-2 [contents] - [i11]Sihan Xu, Ya Gao, Lingling Fan, Linyu Li, Xiangrui Cai, Zheli Liu:
LiResolver: License Incompatibility Resolution for Open Source Software. CoRR abs/2306.14675 (2023) - [i10]Linyu Li, Sihan Xu, Yang Liu, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu:
LiSum: Open Source Software License Summarization with Multi-Task Learning. CoRR abs/2309.05074 (2023) - [i9]Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, Zheli Liu:
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves. IACR Cryptol. ePrint Arch. 2023: 1528 (2023) - [i8]Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study. IACR Cryptol. ePrint Arch. 2023: 1764 (2023) - 2022
- [b1]Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li:
Privacy-Preserving Machine Learning. Springer 2022, ISBN 978-981-16-9138-6, pp. 1-88 - [j63]Xiaojie Guo, Jin Li, Zheli Liu, Yu Wei, Xiao Zhang, Changyu Dong:
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci. China Inf. Sci. 65(5): 1-14 (2022) - [j62]Xiaochun Cheng, Zheli Liu, Yongsheng Ning:
Editorial: Security of cloud service for the manufacturing industry. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j61]Zheli Liu, Siyi Lv, Jin Li, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. IEEE Trans. Dependable Secur. Comput. 19(3): 1579-1591 (2022) - [j60]Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, Changyu Dong:
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. IEEE Trans. Dependable Secur. Comput. 19(3): 2023-2037 (2022) - [j59]Guohua Tian, Yunhan Hu, Jianghong Wei, Zheli Liu, Xinyi Huang, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [j58]Boyu Hou, Jiqiang Gao, Xiaojie Guo, Thar Baker, Ying Zhang, Yanlong Wen, Zheli Liu:
Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications. IEEE Trans. Ind. Informatics 18(5): 3562-3571 (2022) - [j57]Jiqiang Gao, Baolei Zhang, Xiaojie Guo, Thar Baker, Min Li, Zheli Liu:
Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications. IEEE Trans. Ind. Informatics 18(9): 6340-6348 (2022) - [j56]Xu Ma, Xiaoqian Sun, Yuduo Wu, Zheli Liu, Xiaofeng Chen, Changyu Dong:
Differentially Private Byzantine-Robust Federated Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3690-3701 (2022) - [c30]Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing:
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion. USENIX Security Symposium 2022: 863-880 - [c29]Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li:
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. USENIX Security Symposium 2022: 1487-1504 - [i7]Sihan Xu, Ya Gao, Lingling Fan, Zheli Liu, Yang Liu, Hua Ji:
LiDetector: License Incompatibility Detection for Open Source Software. CoRR abs/2204.10502 (2022) - [i6]Jingyu Jia, Zikai Alex Wen, Zheli Liu, Changyu Dong:
New Differential Privacy Communication Pipeline and Design Framework. CoRR abs/2208.02759 (2022) - [i5]Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu:
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. IACR Cryptol. ePrint Arch. 2022: 1431 (2022) - 2021
- [j55]Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda:
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments. IEEE Access 9: 68880-68887 (2021) - [j54]Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, Changyu Dong:
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Sci. China Inf. Sci. 64(8) (2021) - [j53]Peizhuang Cong, Yuchao Zhang, Zheli Liu, Thar Baker, Hissam Tawfik, Wendong Wang, Ke Xu, Ruidong Li, Fuliang Li:
A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks. Comput. Networks 192: 108057 (2021) - [j52]Hongyang Yan, Li Hu, Xiaoyu Xiang, Zheli Liu, Xu Yuan:
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage. Inf. Sci. 548: 423-437 (2021) - [j51]Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu:
Editorial: Security and Privacy in Computing and Communications. Mob. Networks Appl. 26(4): 1407-1411 (2021) - [j50]Dongjie Li, Siyi Lv, Yanyu Huang, Yijing Liu, Tong Li, Zheli Liu, Liang Guo:
Frequency-Hiding Order-Preserving Encryption with Small Client Storage. Proc. VLDB Endow. 14(13): 3295-3307 (2021) - [j49]Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong, Wenjing Lou:
Searchable Symmetric Encryption with Forward Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(1): 460-474 (2021) - [j48]Tong Li, Jin Li, Xiaofeng Chen, Zheli Liu, Wenjing Lou, Y. Thomas Hou:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. IEEE Trans. Dependable Secur. Comput. 18(6): 2969-2982 (2021) - [j47]Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [j46]Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou, Changyu Dong, Thar Baker:
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning. IEEE Trans. Inf. Forensics Secur. 16: 1736-1751 (2021) - [j45]Xianmin Wang, Xiaohui Kuang, Jin Li, Jing Li, Xiaofeng Chen, Zheli Liu:
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching. IEEE Trans. Intell. Transp. Syst. 22(7): 4359-4366 (2021) - [j44]Kaihao Lou, Yongjian Yang, En Wang, Zheli Liu, Thar Baker, Ali Kashif Bashir:
Reinforcement Learning Based Advertising Strategy Using Crowdsensing Vehicular Data. IEEE Trans. Intell. Transp. Syst. 22(7): 4635-4647 (2021) - [c28]Ziqi Wei, Junjian Shi, Yihe Duan, Ranyang Liu, Ye Han, Zheli Liu:
Backdoor Filter: Mitigating Visible Backdoor Triggers in Dataset. DTPI 2021: 102-105 - [c27]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. USENIX Security Symposium 2021: 965-982 - 2020
- [j43]Siyi Lv, Jinhui Ye, Sijie Yin, Xiaochun Cheng, Chen Feng, Xiaoyan Liu, Rui Li, Zhaohui Li, Zheli Liu, Li Zhou:
Unbalanced private set intersection cardinality protocol with low communication cost. Future Gener. Comput. Syst. 102: 1054-1061 (2020) - [j42]Chundong Wang, Tong Zhao, Zheli Liu:
An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm. Int. J. Inf. Comput. Secur. 12(4): 397-415 (2020) - [j41]Quanyu Zhao, Siyi Chen, Zheli Liu, Thar Baker, Yuan Zhang:
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manag. 57(6): 102355 (2020) - [j40]Yu Chen, Fang Luo, Tong Li, Tao Xiang, Zheli Liu, Jin Li:
A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf. Sci. 522: 69-79 (2020) - [j39]Zheli Liu, Bo Li, Yanyu Huang, Jin Li, Yang Xiang, Witold Pedrycz:
NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme. IEEE Trans. Knowl. Data Eng. 32(4): 714-727 (2020) - [j38]Yanyu Huang, Bo Li, Zheli Liu, Jin Li, Siu-Ming Yiu, Thar Baker, Brij B. Gupta:
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Trans. Serv. Comput. 13(4): 602-612 (2020) - [j37]Yali Yuan, Robert Tasik, Sripriya Srikant Adhatarao, Yachao Yuan, Zheli Liu, Xiaoming Fu:
RACE: Reinforced Cooperative Autonomous Vehicle Collision Avoidance. IEEE Trans. Veh. Technol. 69(9): 9279-9291 (2020) - [j36]Zhaohui Li, Yiqing Wang, Zhi Wang, Zheli Liu, Jian Zhang, Min Li:
Reversible Information Hiding Algorithm Based on Multikey Encryption. Wirel. Commun. Mob. Comput. 2020: 8847559:1-8847559:10 (2020) - [c26]Yali Yuan, Sripriya Srikant Adhatarao, Mingkai Lin, Yachao Yuan, Zheli Liu, Xiaoming Fu:
ADA: Adaptive Deep Log Anomaly Detector. INFOCOM 2020: 2449-2458 - [e2]Yang Xiang, Zheli Liu, Jin Li:
Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings. Communications in Computer and Information Science 1298, Springer 2020, ISBN 978-981-15-9030-6 [contents] - [i4]Yali Yuan, Robert Tasik, Sripriya Srikant Adhatarao, Yachao Yuan, Zheli Liu, Xiaoming Fu:
RACE: Reinforced Cooperative Autonomous Vehicle Collision AvoidancE. CoRR abs/2004.01286 (2020) - [i3]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. IACR Cryptol. ePrint Arch. 2020: 1576 (2020)
2010 – 2019
- 2019
- [j35]Chundong Wang, Honglei Yao, Zheli Liu:
An efficient DDoS detection based on SU-Genetic feature selection. Clust. Comput. 22(Suppl 1): 2505-2515 (2019) - [j34]Bo Li, Yanyu Huang, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. Inf. Sci. 479: 651-663 (2019) - [j33]Yu Wei, Siyi Lv, Xiaojie Guo, Zheli Liu, Yanyu Huang, Bo Li:
FSSE: Forward secure searchable encryption with keyed-block chains. Inf. Sci. 500: 113-126 (2019) - [j32]Jin Li, Tong Li, Zheli Liu, Xiaofeng Chen:
Secure Deduplication System with Active Key Update and Its Application in IoT. ACM Trans. Intell. Syst. Technol. 10(6): 69:1-69:21 (2019) - [c25]Linru Zhang, Gongxian Zeng, Yuechen Chen, Nairen Cao, Siu-Ming Yiu, Zheli Liu:
OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm. ICETE (2) 2019: 149-160 - 2018
- [j31]Chundong Wang, Zhentang Zhao, Liangyi Gong, Likun Zhu, Zheli Liu, Xiaochun Cheng:
A Distributed Anomaly Detection System for In-Vehicle Network Using HTM. IEEE Access 6: 9091-9098 (2018) - [j30]Chongzhi Gao, Siyi Lv, Yu Wei, Zhi Wang, Zheli Liu, Xiaochun Cheng:
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices. IEEE Access 6: 38860-38869 (2018) - [j29]Chundong Wang, Lei Yang, Yijie Wu, Yuduo Wu, Xiaochun Cheng, Zhaohui Li, Zheli Liu:
Data Provenance With Retention of Reference Relations. IEEE Access 6: 77033-77042 (2018) - [j28]Zheli Liu, Tong Li, Ping Li, Chunfu Jia, Jin Li:
Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78: 778-788 (2018) - [j27]Tong Li, Zheli Liu, Chunfu Jia, Zhangjie Fu, Jin Li:
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud. Int. J. Web Grid Serv. 14(1): 21-43 (2018) - [j26]Tong Li, Jin Li, Zheli Liu, Ping Li, Chunfu Jia:
Differentially private Naive Bayes learning over multiple data sources. Inf. Sci. 444: 89-104 (2018) - [j25]Zheli Liu, Yanyu Huang, Jin Li, Xiaochun Cheng, Chao Shen:
DivORAM: Towards a practical oblivious RAM with variable block size. Inf. Sci. 447: 1-11 (2018) - [j24]Chundong Wang, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, Xiaochun Cheng:
Channel State Information-Based Detection of Sybil Attacks in Wireless Networks. J. Internet Serv. Inf. Secur. 8(1): 2-17 (2018) - [j23]Tong Li, Zhengan Huang, Ping Li, Zheli Liu, Chunfu Jia:
Outsourced privacy-preserving classification service over encrypted data. J. Netw. Comput. Appl. 106: 100-110 (2018) - [j22]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j21]Chundong Wang, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, Xiaochun Cheng:
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information. Sensors 18(3): 878 (2018) - [j20]Zheli Liu, Zhendong Wu, Tong Li, Jin Li, Chao Shen:
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. IEEE Trans. Ind. Informatics 14(7): 3244-3252 (2018) - [c24]Siyi Lv, Yanyu Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee:
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique. ICA3PP (4) 2018: 85-97 - [c23]Chundong Wang, Likun Zhu, Liangyi Gong, Zheli Liu, Xiu-liang Mo, Wenjun Yang, Min Li, Zhaoyang Li:
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer. ICA3PP (4) 2018: 234-248 - [e1]Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu:
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 197, Springer 2018, ISBN 978-3-319-69604-1 [contents] - 2017
- [j19]Tong Li, Zheli Liu, Jin Li, Chunfu Jia, Kuan-Ching Li:
CDPS: A cryptographic data publishing system. J. Comput. Syst. Sci. 89: 80-91 (2017) - [j18]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst. J. 11(2): 439-448 (2017) - [c22]Shuang Liang, Yue Zhang, Bo Li, Xiaojie Guo, Hao Guo, Xiaoyun He, Zheli Liu, Chunfu Jia:
ShadowPWD: practical browser-based password manager with a security token. ACM TUR-C 2017: 30:1-30:6 - [c21]Shuang Liang, Yanan Zhang, Jiansheng Guo, Changqing Dong, Zheli Liu, Chunfu Jia:
Efficient Format-Preserving Encryption Mode for Integer. CSE/EUC (2) 2017: 96-102 - [c20]Bo Li, Zheli Liu, Ilsun You:
Partition ORAMS Combined with Novel Client Eviction Mechanism. CSE/EUC (1) 2017: 525-530 - [c19]Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li, Zheli Liu:
A Mutation Approach of Detecting SQL Injection Vulnerabilities. ICCCS (2) 2017: 175-188 - [i2]Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu:
Constant bandwidth ORAM with small block size using PIR operations. IACR Cryptol. ePrint Arch. 2017: 590 (2017) - [i1]Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang:
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance. IACR Cryptol. ePrint Arch. 2017: 1105 (2017) - 2016
- [j17]Zheli Liu, Dejiang Luo, Jin Li, Xiaofeng Chen, Chunfu Jia:
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2): 384-400 (2016) - [j16]Ying Wang, Jiali Du, Xiaochun Cheng, Zheli Liu, Kai Lin:
Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1): 22-28 (2016) - [j15]Zheli Liu, Xiaofeng Chen, Jun Yang, Chunfu Jia, Ilsun You:
New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59: 198-207 (2016) - [j14]Jian Huang, Yanni Wang, Zheli Liu, Boyuan Guan, Dan Long, Xiaoping Du:
On modeling microscopic vehicle fuel consumption using radial basis function neural network. Soft Comput. 20(7): 2771-2779 (2016) - [j13]Zheli Liu, Jian Weng, Jin Li, Jun Yang, Chuan Fu, Chunfu Jia:
Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput. 20(8): 3243-3255 (2016) - [j12]Baojiang Cui, Zheli Liu, Lingyu Wang:
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. IEEE Trans. Computers 65(8): 2374-2385 (2016) - [c18]Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. ACISP (2) 2016: 153-169 - [c17]Yanyu Huang, Bo Li, Shuang Liang, Haoyu Ma, Zheli Liu:
Generalized Format-Preserving Encryption for Character Data. CloudComp 2016: 113-122 - [c16]Mingming Zhang, Guiyang Xie, Shimeng Wei, Pu Song, Zhonghao Guo, Zheli Liu, Zijing Cheng:
DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption. CloudComp 2016: 216-226 - 2015
- [j11]Baojiang Cui, Haifeng Jin, Zheli Liu, Jiangdong Deng:
Improved collaborative filtering with intensity-based contraction. J. Ambient Intell. Humaniz. Comput. 6(5): 661-674 (2015) - [j10]Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong:
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79: 18-26 (2015) - [j9]Baojiang Cui, Haifeng Jin, Giuliana Carullo, Zheli Liu:
Service-oriented mobile malware detection system based on mining strategies. Pervasive Mob. Comput. 24: 101-116 (2015) - [j8]Zheli Liu, Chuan Fu, Jun Yang, Zhusong Liu, Lingling Xu:
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud. Trans. Comput. Collect. Intell. 19: 140-156 (2015) - [c15]Jun Yang, Chuan Fu, Nan Shen, Zheli Liu, Chunfu Jia, Jin Li:
General Multi-key Searchable Encryption. AINA Workshops 2015: 89-95 - [c14]Chuan Fu, Jun Yang, Zheli Liu, Chunfu Jia:
A Secure Architecture for Data Storage in the Cloud Environments. IMIS 2015: 289-291 - 2014
- [j7]Jingwei Li, Jin Li, Zheli Liu, Chunfu Jia:
Enabling efficient and secure data sharing in cloud computing. Concurr. Comput. Pract. Exp. 26(5): 1052-1066 (2014) - [j6]Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30: 98-106 (2014) - [j5]Zheli Liu, Jingwei Li, Jin Li, Chunfu Jia, Jun Yang, Ke Yuan:
SQL-Based Fuzzy Query Mechanism Over Encrypted Database. Int. J. Data Warehous. Min. 10(4): 71-87 (2014) - [j4]Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. J. Internet Serv. Inf. Secur. 4(1): 25-36 (2014) - [c13]Jun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng:
New Data Publishing Framework in the Big Data Environments. 3PGCIC 2014: 363-366 - [c12]Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia:
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. ACISP 2014: 115-130 - [c11]Jun Yang, Zheli Liu, Jin Li, Chunfu Jia, Baojiang Cui:
Multi-key Searchable Encryption without Random Oracle. INCoS 2014: 79-84 - 2013
- [j3]Jingwei Li, Chunfu Jia, Zheli Liu, Zongqing Dong:
Cycle-walking revisited: consistency, security, and efficiency. Secur. Commun. Networks 6(8): 985-992 (2013) - [c10]Zheli Liu, Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia:
New Privacy-Preserving Location Sharing System for Mobile Online Social Networks. 3PGCIC 2013: 214-218 - [c9]Zheli Liu, Chunfu Jia, Jun Yang, Ke Yuan:
Format-Preserving Fuzzy Query Mechanism. EIDWT 2013: 220-226 - [c8]Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lü:
Public Key Timed-Release Searchable Encryption. EIDWT 2013: 241-248 - [c7]Zheli Liu, Zhi Wang, Xiaochun Cheng, Chunfu Jia, Ke Yuan:
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud. EIDWT 2013: 249-255 - [c6]Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lv:
Multi-user Public Key Timed-Release Searchable Encryption. EIDWT 2013: 363-370 - [c5]Zheli Liu, Xiaochun Cheng, Chunfu Jia, Jun Yang:
Format Compliant Degradation for PNG Image. EIDWT 2013: 720-723 - [c4]Min Li, Zheli Liu, Chunfu Jia, Zongqing Dong:
Data Masking Generic Model. EIDWT 2013: 724-727 - [c3]Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan:
Secure Storage and Fuzzy Query over Encrypted Databases. NSS 2013: 439-450 - 2012
- [j2]Min Li, Zheli Liu, Jingwei Li, Chunfu Jia:
Format-Preserving Encryption for Character Data. J. Networks 7(8): 1239-1244 (2012) - [c2]Jingwei Li, Chunfu Jia, Jin Li, Zheli Liu:
A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud. INCoS 2012: 1-7 - [c1]Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu:
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. NSS 2012: 490-502 - 2010
- [j1]Liang Hu, Zheli Liu, Xiaochun Cheng:
Efficient Identity-based Broadcast Encryption without Random Oracles. J. Comput. 5(3): 331-336 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint