Shangqi Lai

Orcid: 0000-0002-0374-3593

According to our database1, Shangqi Lai authored at least 29 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System.
IEEE Trans. Sustain. Comput., 2024

2023
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud.
J. Inf. Secur. Appl., 2023

A Multi-Client Searchable Encryption Scheme for IoT Environment.
CoRR, 2023

2022
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022

2021
Multi-Client Cloud-Based Symmetric Searchable Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database.
CoRR, 2021

Accelerating TEE-Based DNN Inference Using Mean Shift Network Pruning.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data.
Proceedings of the Information Security - 24th International Conference, 2021

Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Privacy-Preserving Social Search: Primitives and Realisation.
PhD thesis, 2020

Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019

GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Virtualized Network Coding Functions on the Internet.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2015
Hybrid superpixel segmentation.
Proceedings of the 2015 International Conference on Image and Vision Computing New Zealand, 2015

A New Speculative Execution Algorithm Based on C4.5 Decision Tree for Hadoop.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015


  Loading...