Liehuang Zhu

According to our database1, Liehuang Zhu
  • authored at least 81 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid.
IEEE Wireless Commun., 2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Information Forensics and Security, 2018

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Security and Communication Networks, 2018

Online and automatic identification and mining of encryption network behavior in big data environment.
Journal of Intelligent and Fuzzy Systems, 2018

PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.
Future Generation Comp. Syst., 2018

Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud.
T-SUSC, 2017

Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Industrial Informatics, 2017

Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Information Forensics and Security, 2017

PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Sensors, 2017

RFA: R-Squared Fitting Analysis Model for Power Attack.
Security and Communication Networks, 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Network, 2017

A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System.
Mobile Information Systems, 2017

Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud.
J. Network and Computer Applications, 2017

PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud.
Inf. Sci., 2017

Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017

A round-optimal lattice-based blind signature scheme for cloud services.
Future Generation Comp. Syst., 2017

A privacy-preserving video subscription scheme with the limitation of expire date.
SCIENCE CHINA Information Sciences, 2017

Practical two-dimensional correlation power analysis and its backward fault-tolerance.
SCIENCE CHINA Information Sciences, 2017

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning.
IEEE Access, 2017

Utility-Privacy Tradeoff Based on Random Data Obfuscation in Internet of Energy.
IEEE Access, 2017

INBAR: A new interest-based routing framework in vehicular social networks.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET.
IEEE Trans. Vehicular Technology, 2016

A universal method for realizing non-repudiable provable data possession in cloud storage.
Security and Communication Networks, 2016

A Perturbed Compressed Sensing Protocol for Crowd Sensing.
Mobile Information Systems, 2016

Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing.
Mobile Information Systems, 2016

Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Generation Comp. Syst., 2016

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.
Computing, 2016

Certificate-aware encrypted traffic classification using Second-Order Markov Chain.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

SSSP on GPU Without Atomic Operation.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Differentially Private Publication Scheme for Trajectory Data.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

An Anonymous Scheme for Current Taxi Applications.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud.
IACR Cryptology ePrint Archive, 2015

Scalable protocol for cross-domain group password-based authenticated key exchange.
Frontiers Comput. Sci., 2015

Reasoning task dependencies for robust service selection in data intensive workflows.
Computing, 2015

One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
Comput. J., 2015

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Latency-aware routing with bandwidth assignment for Software Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Self-adaptive anonymous communication scheme under SDN architecture.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Search pattern leakage in searchable encryption: Attacks and new construction.
Inf. Sci., 2014

An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks.
IJDSN, 2014

Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Closeness-based routing with temporal constraint for mobile social delay tolerant networks.
Proceedings of the IEEE Global Communications Conference, 2014

Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature.
Security and Communication Networks, 2013

A new hierarchical and scalable group key exchange protocol with XOR operation.
IJWMC, 2013

ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
IJDSN, 2013

An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks.
IJDSN, 2013

A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks.
IJDSN, 2013

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions.
IACR Cryptology ePrint Archive, 2013

Trust-based workflow refactoring for concurrent scheduling in service-oriented environment.
Concurrency and Computation: Practice and Experience, 2013

Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

The Adaptive Multicast Data Origin Authentication Protocol.
Proceedings of the Frontiers in Internet Technologies, 2013

Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012

Risk-Aware Checkpoint Selection in Cloud-Based Scientific Workflow.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Workflow Refactoring for Concurrent Task Execution.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Cloud Storage-oriented Secure Information Gateway.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach.
IEEE Trans. Vehicular Technology, 2011

Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.
IACR Cryptology ePrint Archive, 2011

An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Computationally Sound Symbolic Analysis of EAP-TNC Protocol.
Proceedings of the Trusted Systems - Third International Conference, 2011

Fuzzy keyword search on encrypted cloud storage data with small index.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

An Efficient Hybrid P2P Incentive Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Ontological Modeling of Virtual Organization Agents.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Semantic Web Modeling for Virtual Organization: A Case Study in Logistics.
Proceedings of the Semantic Web, 2006

Multi-Media Retrieval with Semantic Web: A Case Study in Airport Security Inspection Applications.
Proceedings of the Advances in Intelligent IT, 2006

Digital signature of multicast streams secure against adaptive chosen message attack.
Computers & Security, 2004