Name
Papers
Collaborators
KAITAI LIANG
102
268
Citations 
PageRank 
Referers 
612
45.13
1423
Referees 
References 
1329
1140
Search Limit
1001000
Title
Citations
PageRank
Year
On-the-Fly Privacy for Location Histograms00.342022
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent00.342022
Stronger and Simpler Updatable Encryption.00.342022
Secure Logistic Regression for Vertical Federated Learning10.382022
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles00.342022
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers00.342022
Practical algorithm substitution attack on extractable signatures00.342022
Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership00.342022
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay00.342022
Volume and Access Pattern Leakage-abuse Attack with Leaked Documents.00.342022
Efficient Encrypted Data Search With Expressive Queries and Flexible Update00.342022
Dual Access Control for Cloud-Based Data Storage and Sharing20.362022
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things00.342022
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption00.342022
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents00.342022
Your Smart Contracts Are Not Secure - Investigating Arbitrageurs and Oracle Manipulators in Ethereum.00.342021
Incrementally Updateable Honey Password Vaults00.342021
Distributed additive encryption and quantization for privacy preserving federated deep learning00.342021
Practical Threshold Multi-Factor Authentication10.362021
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format00.342021
How To Implement Secure Cloud File Sharing Using Optimized Attribute-Based Access Control With Small Policy Matrix And Minimized Cumulative Errors10.352021
IMPROVED PROBABILISTIC CONTEXT-FREE GRAMMARS FOR PASSWORDS USING WORD EXTRACTION00.342021
Lightweight Searchable Encryption Protocol for Industrial Internet of Things40.382021
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks170.612020
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.20.362020
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks.10.352020
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II.00.342020
Post Quantum Proxy Signature Scheme Based On The Multivariate Public Key Cryptographic Signature10.382020
Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum20.412020
Privacy preserving search services against online attack.20.362020
Searchain: Blockchain-based private keyword search in decentralized storage50.442020
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs20.352020
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data00.342020
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I.00.342020
Practical Attribute-Based Conjunctive Keyword Search Scheme00.342020
A New Encrypted Data Switching Protocol: Bridging Ibe And Abe Without Loss Of Data Confidentiality00.342019
A blockchain-based location privacy-preserving crowdsensing system.90.502019
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures00.342019
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs00.342019
Cryptanalysis of Raindrop and FBC.00.342019
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation20.402019
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices60.412019
CCA-Secure Deterministic Identity-Based Encryption Scheme.00.342019
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment.00.342019
DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost.00.342019
Passive Attacks Against Searchable Encryption.70.512019
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.00.342019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.00.342019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case20.352019
A efficient blind filter: Location privacy protection and the access control in FinTech10.352019
  • 1
  • 2