Liming Fang

Orcid: 0000-0002-1420-2047

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing, China


According to our database1, Liming Fang authored at least 93 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Anonymous Multi-Hop Payment for Payment Channel Networks.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Efficient transformer with code token learner for code clone detection.
J. Syst. Softw., 2023

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023

Hard Adversarial Example Mining for Improving Robust Fairness.
CoRR, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

FedCom: Byzantine-Robust Federated Learning Using Data Commitment.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Layer Feature Division Transferable Adversarial Attack.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave.
IEEE Trans. Dependable Secur. Comput., 2022

A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

Code Synthesis for Dataflow-Based Embedded Software Design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks.
Proceedings of the Provable and Practical Security, 2022

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

FLForest: Byzantine-robust Federated Learning through Isolated Forest.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021

A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks.
IEEE Trans. Ind. Informatics, 2021

ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

An Efficient Login Authentication System against Multiple Attacks in Mobile Devices.
Symmetry, 2021

FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning.
CoRR, 2021

Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Learn To Align: A Code Alignment Network For Code Clone Detection.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Privacy Protection for Medical Data Sharing in Smart Healthcare.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Secure Transmission of Compressed Sampling Data Using Edge Clouds.
IEEE Trans. Ind. Informatics, 2020

HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020

Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020

A blockchain based decentralized data security mechanism for the Internet of Things.
J. Parallel Distributed Comput., 2020

A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020

A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020

THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020

A privacy preserve big data analysis system for wearable wireless sensor network.
Comput. Secur., 2020

A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs.
IEEE Access, 2020

Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

2019
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
Sensors, 2019

Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves.
Sensors, 2019

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019

Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019

2018
A Secure Multimedia Data Sharing Scheme for Wireless Network.
Secur. Commun. Networks, 2018

A proxy broadcast re-encryption for cloud data sharing.
Multim. Tools Appl., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017

Identity-based conditional proxy re-encryption with fine grain policy.
Comput. Stand. Interfaces, 2017

2016
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

2015
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurr. Comput. Pract. Exp., 2015

Reliable access control for multi-authority in cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Outsourced data tagging via authority and delegable auditing for cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Data protection based on multifunction digital watermark in wireless sensor network.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
Attributed Based Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Oriented Group Provable Data Possession in Public Cloud.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Leakage Resilient Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2013

Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Hierarchical conditional proxy re-encryption.
Comput. Stand. Interfaces, 2012

2011
Interactive conditional proxy re-encryption with fine grain policy.
J. Syst. Softw., 2011

2010
Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

An efficient unlinkable secret handshake protocol without ROM.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Anonymous Conditional Proxy Re-encryption without Random Oracle.
Proceedings of the Provable Security, Third International Conference, 2009

A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008

Full Security: Fuzzy Identity Based Encryption.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008

Weighted Margin Multi-Class Core Vector Machines.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Identity-Based Key Issuing Protocol for Ad Hoc Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...