Jian Liu

Orcid: 0000-0003-1885-594X

Affiliations:
  • National University of Defense Technology, School of Electronic Science and Technology, Changsha, China


According to our database1, Jian Liu authored at least 29 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT.
IEEE Trans. Emerg. Top. Comput., 2022

Implementing a sidechain-based asynchronous DPKI.
Frontiers Comput. Sci., 2022

Construction of network security domain knowledge graph for network attack detection.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2021
Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.
IEEE Trans. Knowl. Data Eng., 2021

An IoT-Applicable Access Control Model Under Double-Layer Blockchain.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

2020
Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT.
IEEE Internet Things J., 2020

Network Traffic Classification Using Deep Learning.
Int. J. Artif. Intell. Tools, 2020

Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance.
Concurr. Comput. Pract. Exp., 2020

Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment.
Comput. Secur., 2020

2019
Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments.
World Wide Web, 2019

Efficient Attribute-Based Access Control With Authorized Search in Cloud Storage.
IEEE Access, 2019

2018
PPolyNets: Achieving High Prediction Accuracy and Efficiency With Parametric Polynomial Activations.
IEEE Access, 2018

Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database.
IEEE Access, 2018

Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment.
Proceedings of the Green, Pervasive, and Cloud Computing - 13th International Conference, 2018

Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Privacy-Preserving <i>k</i>-Means Clustering under Multiowner Setting in Distributed Cloud Environments.
Secur. Commun. Networks, 2017

Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys.
J. Inf. Sci. Eng., 2017

Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework.
Proceedings of the Security and Privacy in Communication Networks, 2017

OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Reliable and confidential cloud storage with efficient data forwarding functionality.
IET Commun., 2016

Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments.
IEEE Access, 2016

Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Efficient and secure data forwarding for erasure-code-based cloud storage.
Proceedings of the IEEE International Conference on Communication, 2015

WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor.
IET Commun., 2014

Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage.
Proceedings of the IEEE International Conference on Communications, 2014

2013
A Secure and Efficient Scheme for Cloud Storage against Eavesdropper.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...