Liqiang Wu

Orcid: 0000-0002-4314-3592

According to our database1, Liqiang Wu authored at least 15 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SecTCN: Privacy-Preserving Short-Term Residential Electrical Load Forecasting.
IEEE Trans. Ind. Informatics, February, 2024

MDA-FLH: Multidimensional Data Aggregation Scheme With Fine-Grained Linear Homomorphism for Smart Grid.
IEEE Internet Things J., January, 2024

A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024

2023
p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid.
IEEE Trans. Smart Grid, May, 2023

2022
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning.
Pervasive Mob. Comput., 2022

Identity-based threshold proxy re-encryption scheme from lattices and its applications.
Frontiers Inf. Technol. Electron. Eng., 2022

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022

FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid.
IEEE Internet Things J., 2022

2018
A new class of quaternary generalized cyclotomic sequences of order 2d and length 2pm with high linear complexity.
Int. J. Wavelets Multiresolution Inf. Process., 2018

What Factors Will Determine Users' Knowledge Payment Decision? An Theoretical and Empirical Research.
Proceedings of the 17th Wuhan International Conference on E-Business, 2018

2016
Unidirectional IBPRE scheme from lattice for cloud computation.
J. Ambient Intell. Humaniz. Comput., 2016

2015
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process.
IACR Cryptol. ePrint Arch., 2015

2013
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.
Comput. Math. Appl., 2013

2012
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptol. ePrint Arch., 2011


  Loading...