Kaitai Liang

Orcid: 0000-0003-0262-7678

According to our database1, Kaitai Liang authored at least 143 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE.
IACR Cryptol. ePrint Arch., 2024

Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages.
IACR Cryptol. ePrint Arch., 2024

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
CoRR, 2024

d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
CoRR, 2024

Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
CoRR, 2024

Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm.
CoRR, 2024

2023
PIVODL: Privacy-Preserving Vertical Federated Learning Over Distributed Labels.
IEEE Trans. Artif. Intell., October, 2023

DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic.
Comput. J., May, 2023

Keyword Search Shareable Encryption for Fast and Secure Data Replication.
IEEE Trans. Inf. Forensics Secur., 2023

HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023

FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2023

Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization.
IEEE Trans. Cloud Comput., 2023

Secure genotype imputation using homomorphic encryption.
J. Inf. Secur. Appl., 2023

FTA: Stealthy and Adaptive Backdoor Attack with Flexible Triggers on Federated Learning.
CoRR, 2023

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023

High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023

Federated Synthetic Data Generation with Stronger Security Guarantees.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Improved Wordpcfg for Passwords with Maximum Probability Segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2023

CCA-1 Secure Updatable Encryption with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Efficient Encrypted Data Search With Expressive Queries and Flexible Update.
IEEE Trans. Serv. Comput., 2022

ROSE: Robust Searchable Encryption With Forward and Backward Security.
IEEE Trans. Inf. Forensics Secur., 2022

JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers.
IEEE Trans. Dependable Secur. Comput., 2022

On-the-Fly Privacy for Location Histograms.
IEEE Trans. Dependable Secur. Comput., 2022

Dual Access Control for Cloud-Based Data Storage and Sharing.
IEEE Trans. Dependable Secur. Comput., 2022

Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership.
J. Syst. Softw., 2022

Secure Logistic Regression for Vertical Federated Learning.
IEEE Internet Comput., 2022

Volume and Access Pattern Leakage-abuse Attack with Leaked Documents.
IACR Cryptol. ePrint Arch., 2022

Stronger and Simpler Updatable Encryption.
IACR Cryptol. ePrint Arch., 2022

Practical algorithm substitution attack on extractable signatures.
Des. Codes Cryptogr., 2022

BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022

ID-based self-encryption via Hyperledger Fabric based smart contract.
CoRR, 2022

Combining ID's, Attributes, and Policies in Hyperledger Fabric.
CoRR, 2022

Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks.
CoRR, 2022

Using Autoencoders on Differentially Private Federated Learning GANs.
CoRR, 2022

MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution.
CoRR, 2022

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
CoRR, 2022

Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022

WordMarkov: A New Password Probability Model of Semantics.
Proceedings of the IEEE International Conference on Acoustics, 2022

Passtrans: An Improved Password Reuse Model Based on Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
Proceedings of the Computer Security - ESORICS 2022, 2022

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.
Proceedings of the Computer Security - ESORICS 2022, 2022

No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent.
Proceedings of the Computer Security - ESORICS 2022, 2022

DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2022

FLVoogd: Robust And Privacy Preserving Federated Learning.
Proceedings of the Asian Conference on Machine Learning, 2022

2021
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
IEEE Trans. Serv. Comput., 2021

Lightweight Searchable Encryption Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Practical Threshold Multi-Factor Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Distributed additive encryption and quantization for privacy preserving federated deep learning.
Neurocomputing, 2021

Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts.
Computer, 2021

How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
Comput. Secur., 2021

Incrementally Updateable Honey Password Vaults.
Proceedings of the 30th USENIX Security Symposium, 2021

Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2021

Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum.
Proceedings of the CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 2021

2020
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks.
IEEE Wirel. Commun., 2020

Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics.
IEEE Trans. Ind. Informatics, 2020

BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Informatics, 2020

A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020

SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

Searchain: Blockchain-based private keyword search in decentralized storage.
Future Gener. Comput. Syst., 2020

Privacy preserving search services against online attack.
Comput. Secur., 2020

Am I eclipsed? A smart detector of eclipse attacks for Ethereum.
Comput. Secur., 2020

Leakage-free ID-Based Signature, Revisited.
Comput. J., 2020

Practical Attribute-Based Conjunctive Keyword Search Scheme.
Comput. J., 2020

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation.
IEEE Access, 2020

Deep Binarized Convolutional Neural Network Inferences over Encrypted Data.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Defending Use-After-Free via Relationship Between Memory and Pointer.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM Trans. Intell. Syst. Technol., 2019

Passive Attacks Against Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2019

Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices.
IEEE Syst. J., 2019

CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.
Secur. Commun. Networks, 2019

CCA-Secure Deterministic Identity-Based Encryption Scheme.
J. Univers. Comput. Sci., 2019

Fine-grained information flow control using attributes.
Inf. Sci., 2019

Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019

Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search.
IACR Cryptol. ePrint Arch., 2019

A blockchain-based location privacy-preserving crowdsensing system.
Future Gener. Comput. Syst., 2019

An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019

Polynomial-based modifiable blockchain structure for removing fraud transactions.
Future Gener. Comput. Syst., 2019

Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures.
Comput. J., 2019

DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost.
IEEE Access, 2019

A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment.
IEEE Access, 2019

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
IEEE Access, 2019

A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019

Cryptanalysis of Raindrop and FBC.
Proceedings of the Network and System Security - 13th International Conference, 2019

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

2018
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018

Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Gener. Comput. Syst., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018

Delegation of Decryption Rights With Revocability From Learning With Errors.
IEEE Access, 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Pers. Ubiquitous Comput., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017

An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing.
Proceedings of the Information Security Practice and Experience, 2017

A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive Mob. Comput., 2016

Broadcast encryption with dealership.
Int. J. Inf. Sec., 2016

Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016

Privacy-Preserving Genetic Relatedness Test.
CoRR, 2016

Anonymous Proxy Signature with Hierarchical Traceability.
Comput. J., 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

A data hiding approach for sensitive smartphone data.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Secure and Traceable Framework for Data Circulation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
IEEE Trans. Inf. Forensics Secur., 2015

Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Secur. Commun. Networks, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Netw., 2015

Privacy Concerns for Photo Sharing in Online Social Networks.
IEEE Internet Comput., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurr. Comput. Pract. Exp., 2015

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
IACR Cryptol. ePrint Arch., 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2013

2012
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012


  Loading...