Xiaohui Liang
Orcid: 0000-0003-4064-2393Affiliations:
- University of Massachusetts at Boston, Department of Computer Science, MA, USA
- University of Waterloo, ON, Canada (PhD 2013)
- Shanghai Jiao Tong University, China (former)
According to our database1,
Xiaohui Liang
authored at least 132 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Cog-TiPRO: Iterative Prompt Refinement with LLMs to Detect Cognitive Decline via Longitudinal Voice Assistant Commands.
CoRR, May, 2025
Unveil Multi-Picture Descriptions for Multilingual Mild Cognitive Impairment Detection via Contrastive Learning.
CoRR, May, 2025
CoRR, March, 2025
UMB@PerAnsSumm 2025: Enhancing Perspective-Aware Summarization with Prompt Optimization and Supervised Fine-Tuning.
CoRR, March, 2025
2024
Editorial: Protecting privacy in neuroimaging analysis: balancing data sharing and privacy preservation.
Frontiers Neuroinformatics, 2024
Harmonizing AI governance regulations and neuroinformatics: perspectives on privacy and data sharing.
Frontiers Neuroinformatics, 2024
Analyzing Multimodal Features of Spontaneous Voice Assistant Commands for Mild Cognitive Impairment Detection.
Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024
Clinical Geriatric Functional Assessment Using Wearable Sensing and Machine Learning.
Proceedings of the IEEE International Conference on E-health Networking, 2024
Exploiting Longitudinal Speech Sessions via Voice Assistant Systems for Early Detection of Cognitive Decline.
Proceedings of the IEEE International Conference on E-health Networking, 2024
Exploiting Privacy Preserving Prompt Techniques for Online Large Language Model Usage.
Proceedings of the 2024 IEEE Global Communications Conference, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
2023
Evaluating Picture Description Speech for Dementia Detection using Image-text Alignment.
CoRR, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
2022
Comput. Speech Lang., 2022
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022
Towards Interpretability of Speech Pause in Dementia Detection Using Adversarial Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the HCI International 2022 - Late Breaking Papers: HCI for Health, Well-being, Universal Access and Healthy Aging, 2022
2021
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems.
Peer-to-Peer Netw. Appl., 2021
Frontiers Comput. Sci., 2021
WavBERT: Exploiting Semantic and Non-Semantic Speech Using Wav2vec and BERT for Dementia Detection.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021
Proceedings of the ICC 2021, 2021
2020
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Exploiting Fully Convolutional Network and Visualization Techniques on Spontaneous Speech for Dementia Detection.
CoRR, 2020
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Exploiting Privacy-preserving Voice Query in Healthcare-based Voice Assistant System.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Internet Things J., 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Internet Things J., 2017
IEEE Internet Things J., 2017
IEEE Commun. Mag., 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
2016
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2016
Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.
Sensors, 2016
Secur. Commun. Networks, 2016
IEEE Cloud Comput., 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015
PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014
IEEE Wirel. Commun., 2014
IEEE Trans. Parallel Distributed Syst., 2014
EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014
Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation.
IEEE J. Biomed. Health Informatics, 2014
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014
Mob. Networks Appl., 2014
PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014
IEEE Internet Things J., 2014
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014
Concurr. Comput. Pract. Exp., 2014
Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Commun. Mag., 2014
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013
IEEE Trans. Smart Grid, 2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013
IEEE J. Sel. Areas Commun., 2013
SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013
ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
IEEE Wirel. Commun., 2012
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012
IEEE Trans. Veh. Technol., 2012
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012
IEEE Commun. Mag., 2012
PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of IEEE International Conference on Communications, 2012
VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011
Mob. Networks Appl., 2011
PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing.
Int. J. Secur. Networks, 2011
GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011
Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011
EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011
2010
Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010
Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010
Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010
Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010
Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Inf. Sci., 2008
Int. J. Comput. Math., 2008
Comput. Stand. Interfaces, 2008
2007