default search action
Dongxi Liu
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Kerry Anne Farrea, Zubair A. Baig, Robin Ram Mohan Doss, Dongxi Liu:
Provably secure optimal homomorphic signcryption for satellite-based internet of things. Comput. Networks 250: 110516 (2024) - [j31]Nan Wang, Dongxi Liu:
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. Proc. Priv. Enhancing Technol. 2024(3): 59-74 (2024) - [c77]Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Improved Multimodal Private Signatures from Lattices. ACISP (2) 2024: 3-23 - [c76]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. ACISP (2) 2024: 124-143 - [c75]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures. CRYPTO (1) 2024: 3-38 - [c74]Yuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou, Dongxi Liu:
Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review. ICECCS 2024: 346-366 - [c73]Nan Wang, Sid Chi-Kin Chau, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. SP 2024: 1832-1848 - [i38]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures. IACR Cryptol. ePrint Arch. 2024: 868 (2024) - [i37]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. IACR Cryptol. ePrint Arch. 2024: 985 (2024) - [i36]Nan Wang, Dongxi Liu:
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. IACR Cryptol. ePrint Arch. 2024: 1441 (2024) - 2023
- [j30]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023) - [c72]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c71]Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
WinkFuzz: Model-based Script Synthesis for Fuzzing. ASSS@AsiaCCS 2023: 2:1-2:12 - [c70]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. CRYPTO (5) 2023: 484-517 - [c69]Jiafan Wang, Dongxi Liu:
Poster: Multi-Writer Searchable Encryption with Fast Search and Post-Quantum Security. ICDCS 2023: 1-2 - [i35]M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David:
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy. CoRR abs/2306.03379 (2023) - [i34]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - [i33]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i32]Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu:
model-based script synthesis for fuzzing. CoRR abs/2308.04115 (2023) - [i31]Nan Wang, Sid Chi-Kin Chau, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. IACR Cryptol. ePrint Arch. 2023: 1185 (2023) - 2022
- [j29]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j28]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IEEE Trans. Dependable Secur. Comput. 19(4): 2609-2621 (2022) - [c68]Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning. ESORICS (1) 2022: 195-216 - [c67]Zian Liu, Chao Chen, Ejaz Ahmed, Dongxi Liu, Jun Zhang:
Automated Binary Analysis: A Survey. ICA3PP 2022: 392-411 - [i30]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning in Industrial Settings. CoRR abs/2202.06053 (2022) - [i29]Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor:
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches. CoRR abs/2202.10320 (2022) - [i28]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. IACR Cryptol. ePrint Arch. 2022: 141 (2022) - 2021
- [j27]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy preserving distributed machine learning with federated learning. Comput. Commun. 171: 112-125 (2021) - [j26]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. Comput. Commun. 173: 192-205 (2021) - [j25]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j24]Zhi Zhang, Yueqiang Cheng, Yansong Gao, Surya Nepal, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. IEEE Trans. Inf. Forensics Secur. 16: 16-27 (2021) - [j23]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [c66]Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c65]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Transparency or Anonymity Leak: Monero Mining Pools Data Publication. ACISP 2021: 433-450 - [c64]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - [c63]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CCS 2021: 337-350 - [c62]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yang-Wai Chow, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. ESORICS (2) 2021: 106-126 - [c61]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [i27]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CoRR abs/2105.05445 (2021) - [i26]Dongxi Liu:
Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption). IACR Cryptol. ePrint Arch. 2021: 1338 (2021) - 2020
- [j22]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. Comput. Secur. 97: 101951 (2020) - [j21]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets. IEEE Internet Things J. 7(4): 2651-2662 (2020) - [j20]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman:
Local Differential Privacy for Deep Learning. IEEE Internet Things J. 7(7): 5827-5842 (2020) - [j19]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. Inf. Sci. 527: 420-443 (2020) - [j18]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman:
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Informatics 16(9): 6092-6102 (2020) - [c60]Peter U. Eze, Udaya Parampalli, Robin J. Evans, Dongxi Liu:
A New Evaluation Method for Medical Image Information Hiding Techniques. EMBC 2020: 6119-6122 - [c59]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41 - [c58]Nan Li, Dongxi Liu, Surya Nepal, Guangyu Pei:
A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability. TPS-ISA 2020: 46-54 - [i25]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. CoRR abs/2001.01848 (2020) - [i24]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Distributed Machine Learning with Federated Learning. CoRR abs/2004.12108 (2020) - [i23]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. CoRR abs/2005.10486 (2020) - [i22]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. CoRR abs/2007.02013 (2020) - [i21]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020) - [i20]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IACR Cryptol. ePrint Arch. 2020: 20 (2020) - [i19]Dongxi Liu, Surya Nepal:
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions. IACR Cryptol. ePrint Arch. 2020: 974 (2020)
2010 – 2019
- 2019
- [j17]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. Secur. 87 (2019) - [j16]Xianmin Wang, Yu Zhang, Brij Bhooshan Gupta, Hongfei Zhu, Dongxi Liu:
An Identity-Based Signcryption on Lattice without Trapdoor. J. Univers. Comput. Sci. 25(3): 282-293 (2019) - [j15]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j14]Wei Li, Bonnie M. Liu, Dongxi Liu, Ren Ping Liu, Peishun Wang, Shoushan Luo, Wei Ni:
Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing. IEEE J. Biomed. Health Informatics 23(3): 1278-1289 (2019) - [c57]Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu:
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. ACISP 2019: 3-20 - [c56]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan, Dongxi Liu:
Location Based Encryption. ACISP 2019: 21-38 - [c55]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. ACISP 2019: 307-321 - [c54]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. ACNS 2019: 67-88 - [c53]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono:
Designing Smart Contract for Electronic Document Taxation. CANS 2019: 199-213 - [c52]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Limerlina:
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol. CANS 2019: 235-246 - [c51]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. AsiaCCS 2019: 41-54 - [c50]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. CCS 2019: 567-584 - [c49]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu:
On The Unforkability of Monero. AsiaCCS 2019: 621-632 - [c48]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. CRYPTO (1) 2019: 115-146 - [c47]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. ESORICS (1) 2019: 215-233 - [c46]Peter U. Eze, Udaya Parampalli, Robin J. Evans, Dongxi Liu:
Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography. ICMR 2019: 53-57 - [c45]Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:
Exploit in Smart Devices: A Case Study. SocialSec 2019: 152-164 - [i18]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i17]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search. CoRR abs/1905.04501 (2019) - [i16]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. CoRR abs/1906.08149 (2019) - [i15]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams. CoRR abs/1907.13498 (2019) - [i14]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Local Differential Privacy for Deep Learning. CoRR abs/1908.02997 (2019) - [i13]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets. CoRR abs/1911.05927 (2019) - [i12]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang:
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique. CoRR abs/1912.03076 (2019) - [i11]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. IACR Cryptol. ePrint Arch. 2019: 445 (2019) - [i10]Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption supporting to Group Messaging Service. IACR Cryptol. ePrint Arch. 2019: 1078 (2019) - [i9]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. IACR Cryptol. ePrint Arch. 2019: 1287 (2019) - 2018
- [j13]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam:
Privacy Preserving User Based Web Service Recommendations. IEEE Access 6: 56647-56657 (2018) - [j12]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient data perturbation for privacy preserving and accurate data stream mining. Pervasive Mob. Comput. 48: 1-19 (2018) - [c44]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762 - [c43]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen:
Anonymity Reduction Attacks to Monero. Inscrypt 2018: 86-100 - [c42]Peter U. Eze, Udaya Parampalli, Robin J. Evans, Dongxi Liu:
Spread Spectrum Steganographic Capacity Improvement for Medical Image Security in Teleradiology. EMBC 2018: 1-4 - [c41]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. RAID 2018: 691-710 - [c40]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. TrustCom/BigDataSE 2018: 1196-1201 - [i8]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS. CoRR abs/1802.07062 (2018) - [i7]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining. CoRR abs/1806.06151 (2018) - [i6]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. IACR Cryptol. ePrint Arch. 2018: 348 (2018) - [i5]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures. IACR Cryptol. ePrint Arch. 2018: 773 (2018) - [i4]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018) - 2017
- [j11]Nan Li, Dongxi Liu, Surya Nepal:
Lightweight Mutual Authentication for IoT and Its Applications. IEEE Trans. Sustain. Comput. 2(4): 359-370 (2017) - [c39]Wei Li, Wei Ni, Dongxi Liu, Ren Ping Liu, Peishun Wang, Shoushan Luo:
Fine-Grained Access Control for Personal Health Records in Cloud Computing. VTC Spring 2017: 1-5 - [c38]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino:
Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516 - [i3]Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal:
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication. IACR Cryptol. ePrint Arch. 2017: 685 (2017) - 2016
- [j10]Li Duan, Yang Zhang, Shiping Chen, Shuai Zhao, Shiyao Wang, Dongxi Liu, Ren Ping Liu, Bo Cheng, Junliang Chen:
Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations. IEEE Access 4: 3454-3468 (2016) - [j9]Li Duan, Dongxi Liu, Yang Zhang, Shiping Chen, Ren Ping Liu, Bo Cheng, Junliang Chen:
Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems. ACM Trans. Internet Techn. 16(4): 23:1-23:17 (2016) - [c37]Dongxi Liu:
Efficient Processing of Encrypted Data in Honest-but-Curious Clouds. CLOUD 2016: 970-974 - [c36]Jane Li, John Zic, Nerolie Oakes, Dongxi Liu, Chen Wang:
Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing. CDVE 2016: 185-193 - [c35]Shenlu Wang, Muhammad Aamir Cheema, Xuemin Lin, Ying Zhang, Dongxi Liu:
Efficiently computing reverse k furthest neighbors. ICDE 2016: 1110-1121 - [c34]Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu:
Towards privacy-preserving classification in neural networks. PST 2016: 392-399 - 2015
- [c33]John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen:
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations. ARES 2015: 642-651 - [c32]Li Duan, Shiping Chen, Yang Zhang, Chunhong Liu, Dongxi Liu, Ren Ping Liu, Junliang Chen:
Automated Policy Combination for Data Sharing across Multiple Organizations. SCC 2015: 226-233 - [c31]Fang-Yu Rao, Bharath K. Samanthula, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-user K-Means Clustering. CIC 2015: 80-89 - [c30]Dongxi Liu, John Zic:
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. TrustCom/BigDataSE/ISPA (1) 2015: 897-904 - [i2]Dongxi Liu:
Practical Fully Homomorphic Encryption without Noise Reduction. IACR Cryptol. ePrint Arch. 2015: 468 (2015) - 2014
- [c29]Danan Thilakanathan, Shiping Chen, Surya Nepal, Rafael A. Calvo, Dongxi Liu, John Zic:
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices. IEEE CLOUD 2014: 224-231 - [c28]Dongxi Liu, John Zic:
User-Controlled Identity Provisioning for Secure Account Sharing. IEEE CLOUD 2014: 644-651 - [c27]Dongxi Liu, Elisa Bertino, Xun Yi:
Privacy of outsourced k-means clustering. AsiaCCS 2014: 123-134 - [i1]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-User k-Means Clustering. CoRR abs/1412.4378 (2014) - 2013
- [j8]Dongxi Liu, Shenlu Wang:
Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput. Pract. Exp. 25(13): 1967-1984 (2013) - [c26]Dongxi Liu, Neale Leslie Fulton, John Zic, Martin de Groot:
Verifying an Aircraft Proximity Characterization Method in Coq. ICFEM 2013: 86-101 - [c25]Jinhui Yao, Alex Ng, Shiping Chen, Dongxi Liu, Carsten Friedrich, Surya Nepal:
A Performance Evaluation of Public Cloud Using TPC-C. ICSOC Workshops 2013: 3-13 - 2012
- [j7]Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic:
A New Cloud Architecture of Virtual Trusted Platform Modules. IEICE Trans. Inf. Syst. 95-D(6): 1577-1589 (2012) - [j6]John J. Zic, Martin de Groot, Dongxi Liu, Julian Jang, Chen Wang:
Hardware Security Device Facilitated Trusted Energy Services. Mob. Networks Appl. 17(4): 564-577 (2012) - [c24]Dongxi Liu, Shenlu Wang:
Programmable Order-Preserving Secure Index for Encrypted Database Query. IEEE CLOUD 2012: 502-509 - [c23]Dongxi Liu, Shenlu Wang:
Query encrypted databases practically. CCS 2012: 1049-1051 - [c22]Dongxi Liu:
Servicization of Australian Privacy Act for Improving Business Compliance. ICWS 2012: 608-615 - 2011
- [j5]Surya Nepal, John Zic, Dongxi Liu, Julian Jang:
A mobile and portable trusted computing platform. EURASIP J. Wirel. Commun. Netw. 2011: 75 (2011) - [j4]Li Li, Dongxi Liu, Athman Bouguettaya:
Semantic based aspect-oriented programming for context-aware Web service composition. Inf. Syst. 36(3): 551-564 (2011) - [c21]Dongxi Liu, John Zic:
Cloud#: A Specification Language for Modeling Cloud. IEEE CLOUD 2011: 533-540 - [c20]Shiping Chen, Chen Wang, Dongxi Liu, Gaurav Singh:
Secure Multi-party Collaboration Systems in Supply Chain Management. LISS (3) 2011: 105-107 - 2010
- [j3]Athman Bouguettaya, Surya Nepal, Wanita Sherchan, Xuan Zhou, Jemma Wu, Shiping Chen, Dongxi Liu, Lily Li, Hongbing Wang, Xumin Liu:
End-to-End Service Support for Mashups. IEEE Trans. Serv. Comput. 3(3): 250-263 (2010) - [c19]John Zic, Julian Jang, Dongxi Liu, Chen Wang, Martin de Groot:
Hardware security device facilitated trusted residential energy services. CollaborateCom 2010: 1-6 - [c18]Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic:
A Cloud Architecture of Virtual Trusted Platform Modules. EUC 2010: 804-811 - [c17]Surya Nepal, John Zic, Dongxi Liu, Julian Jang:
Trusted Computing Platform in Your Pocket. EUC 2010: 812-817 - [c16]Athman Bouguettaya, Shiping Chen, Lily Li, Dongxi Liu, Qing Liu, Surya Nepal, Wanita Sherchan, Jemma Wu, Xuan Zhou:
Managing Web Services: An Application in Bioinformatics. ICSOC 2010: 704-705 - [c15]Dongxi Liu, John Zic:
A Framework for Delivering Rigorously Trusted Services. ICWS 2010: 648-651 - [c14]Julian Jang, Dongxi Liu, Surya Nepal, John Zic:
User Authentication for Online Applications Using a USB-Based Trust Device. MobiSec 2010: 15-26 - [c13]Dongxi Liu, John Zic:
Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust. OTM Conferences (1) 2010: 240-255 - [c12]Dongxi Liu:
XQuery meets Datalog: Data Relevance Query for workflow trustworthiness. RCIS 2010: 169-174
2000 – 2009
- 2009
- [c11]Hongbing Wang, Li Li, Chen Wang, Zuling Kang, Dongxi Liu, Jemma Wu, Athman Bouguettaya:
Logic-based verification for Web services composition with TLA. SOCA 2009: 1-8 - [c10]Li Li, Dongxi Liu, Athman Bouguettaya:
Semantic Weaving for Context-Aware Web Service Composition. WISE 2009: 101-114 - 2008
- [c9]Dongxi Liu, Surya Nepal, David Moreland, Shiping Chen, Chen Wang, John Zic:
Secure and Conditional Resource Coordination for Successful Collaborations. CollaborateCom 2008: 287-303 - 2007
- [j2]Dongxi Liu, Zhenjiang Hu, Masato Takeichi, Kazuhiko Kakehi, Hao Wang:
A Java Library for Bidirectional XML Transformation. Inf. Media Technol. 2(3): 748-761 (2007) - [c8]Dongxi Liu:
Bytecode Verification for Enhanced JVM Access Control. ARES 2007: 162-172 - [c7]Yingfei Xiong, Dongxi Liu, Zhenjiang Hu, Haiyan Zhao, Masato Takeichi, Hong Mei:
Towards automatic model synchronization from model transformations. ASE 2007: 164-173 - [c6]Dongxi Liu, Zhenjiang Hu, Masato Takeichi:
Bidirectional interpretation of XQuery. PEPM 2007: 21-30 - [c5]Yasushi Hayashi, Dongxi Liu, Kento Emoto, Kazutaka Matsuda, Zhenjiang Hu, Masato Takeichi:
A Web Service Architecture for Bidirectional XML Updating. APWeb/WAIM 2007: 721-732 - 2005
- [c4]Dongxi Liu, Zhenjiang Hu, Masato Takeichi:
An environment for maintaining computation dependency in XML documents. ACM Symposium on Document Engineering 2005: 42-51 - 2004
- [c3]Dongxi Liu, Chi-Hung Chi, Ming Li:
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications. Annual Simulation Symposium 2004: 293-299 - [c2]Chi-Hung Chi, Ming Li, Dongxi Liu:
A Method to Obtain Signatures from Honeypots Data. NPC 2004: 435-442 - 2002
- [j1]Dongxi Liu, Xiaoyong Li, Yingcai Bai:
An Attack-Finding Algorithm for Security Protocols. J. Comput. Sci. Technol. 17(4): 450-463 (2002) - 2001
- [c1]Dongxi Liu, Xiaoyong Li, Yingcai Bai:
An Intelligent Intruder Model for Security Protocol Analysis. ICICS 2001: 13-22
Coauthor Index
aka: Seyit Camtepe
aka: M. A. P. Chamikara
aka: John J. Zic
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint