Cong Zuo

Orcid: 0000-0001-9464-7216

Affiliations:
  • Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing, China
  • Monash University, Faculty of Information Technology, Clayton, Australia (PhD 2020)
  • Zhejiang Gongshang University, School of Computer and Information Engineering, Zhejiang, China (former)


According to our database1, Cong Zuo authored at least 51 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Spore: Efficient and Training-Free Privacy Extraction Attack on LLMs via Inference-Time Hybrid Probing.
CoRR, April, 2026

Public Key Encryption With Case-Insensitive Fuzzy Equality Test.
IEEE Trans. Inf. Forensics Secur., 2026

A Decentralized Blockchain Transaction Verification Scheme in the Weighted Setting.
IEEE Trans. Dependable Secur. Comput., 2026

A TimeBound NFT Rights Protocol From Time Interval Signatures.
IEEE Trans. Dependable Secur. Comput., 2026

VortexPIA: Indirect Prompt Injection Attack against LLMs for Efficient Extraction of User Privacy.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2026, 2026

2025
Towards Provably Secure Generative AI: Reliable Consensus Sampling.
CoRR, December, 2025

Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion.
CoRR, November, 2025

Free-MAD: Consensus-Free Multi-Agent Debate.
CoRR, September, 2025

S-Leak: Leakage-Abuse Attack Against Efficient Conjunctive SSE via s-term Leakage.
CoRR, July, 2025

Practical Reasoning Interruption Attacks on Reasoning Large Language Models.
CoRR, May, 2025

Timed Anonymous Ring Signature With Application to Bidding Systems.
IEEE Trans. Inf. Forensics Secur., 2025

Forward-Secure Multi-User Graph Searchable Encryption for Exact Shortest Path Queries.
IEEE Trans. Cloud Comput., 2025

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
Proc. Priv. Enhancing Technol., 2025

Delegated Multi-party Private Set Intersection from Secret Sharing.
IACR Cryptol. ePrint Arch., 2025

A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects.
Entropy, 2025

SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain.
Proceedings of the Provable and Practical Security, 2025

A Dropout-Resilient and Privacy-Preserving Framework for Federated Learning via Lightweight Masking.
Proceedings of the Information and Communications Security - 27th International Conference, 2025

2024
Quantum Safe Computation-Friendly Identity-Binding Password Authenticated Key Exchange.
Proceedings of the Provable and Practical Security, 2024

A Flexible and Privacy-preserving Cross-chain Identity Authentication System based on Anonymous Credentials.
Proceedings of the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2024

2023
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy.
Proc. Priv. Enhancing Technol., April, 2023

Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability.
Proceedings of the Information Security Practice and Experience, 2023

2022
Forward and Backward Private DSSE for Range Queries.
IEEE Trans. Dependable Secur. Comput., 2022

Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

2021
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases.
IEEE Trans. Emerg. Top. Comput., 2021

Multi-Client Cloud-Based Symmetric Searchable Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Building a dynamic searchable encrypted medical database for multi-client.
Inf. Sci., 2020

Attacking the Niederreiter-type cryptosystem based on rank metric.
Int. J. Embed. Syst., 2020

Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.
IACR Cryptol. ePrint Arch., 2020

2019
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.
Proceedings of the Network and System Security - 13th International Conference, 2019

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

CCA-secure ABE with outsourced decryption for fog computing.
Future Gener. Comput. Syst., 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

A Multi-client DSSE Scheme Supporting Range Queries.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Pers. Ubiquitous Comput., 2017

Hidden-Token Searchable Public-Key Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Efficient Certificate-Based Signature and Its Aggregation.
Proceedings of the Information Security Practice and Experience, 2017

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2016

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015


  Loading...