Xiaohui Liang

Orcid: 0000-0003-4064-2393

Affiliations:
  • University of Massachusetts at Boston, Department of Computer Science, MA, USA
  • University of Waterloo, ON, Canada (PhD 2013)
  • Shanghai Jiao Tong University, China (former)


According to our database1, Xiaohui Liang authored at least 132 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cog-TiPRO: Iterative Prompt Refinement with LLMs to Detect Cognitive Decline via Longitudinal Voice Assistant Commands.
CoRR, May, 2025

Unveil Multi-Picture Descriptions for Multilingual Mild Cognitive Impairment Detection via Contrastive Learning.
CoRR, May, 2025

Focus Directions Make Your Language Models Pay More Attention to Relevant Contexts.
CoRR, March, 2025

UMB@PerAnsSumm 2025: Enhancing Perspective-Aware Summarization with Prompt Optimization and Supervised Fine-Tuning.
CoRR, March, 2025

2024
Editorial: Protecting privacy in neuroimaging analysis: balancing data sharing and privacy preservation.
Frontiers Neuroinformatics, 2024

Harmonizing AI governance regulations and neuroinformatics: perspectives on privacy and data sharing.
Frontiers Neuroinformatics, 2024

Analyzing Multimodal Features of Spontaneous Voice Assistant Commands for Mild Cognitive Impairment Detection.
Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024

Clinical Geriatric Functional Assessment Using Wearable Sensing and Machine Learning.
Proceedings of the IEEE International Conference on E-health Networking, 2024

Exploiting Longitudinal Speech Sessions via Voice Assistant Systems for Early Detection of Cognitive Decline.
Proceedings of the IEEE International Conference on E-health Networking, 2024

Exploiting Privacy Preserving Prompt Techniques for Online Large Language Model Usage.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

Adversarial Text Generation using Large Language Models for Dementia Detection.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
Evaluating Picture Description Speech for Dementia Detection using Image-text Alignment.
CoRR, 2023

VPASS: Voice Privacy Assistant System for Monitoring In-home Voice Commands.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Exploiting Relevance of Speech to Sleepiness Detection via Attention Mechanism.
Proceedings of the IEEE International Conference on Communications, 2023

Early Detection of Cognitive Decline Using Voice Assistant Commands.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Evaluating voice-assistant commands for dementia detection.
Comput. Speech Lang., 2022

3D Reconstruction of Multiple Objects by mmWave Radar on UAV.
CoRR, 2022

Domain-aware Intermediate Pretraining for Dementia Detection with Limited Data.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Towards Interpretability of Speech Pause in Dementia Detection Using Adversarial Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Speech Tasks Relevant to Sleepiness Determined With Deep Transfer Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Voice-Assisted Food Recall Using Voice Assistants.
Proceedings of the HCI International 2022 - Late Breaking Papers: HCI for Health, Well-being, Universal Access and Healthy Aging, 2022

2021
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems.
Peer-to-Peer Netw. Appl., 2021

Exploring Deep Transfer Learning Techniques for Alzheimer's Dementia Detection.
Frontiers Comput. Sci., 2021

WavBERT: Exploiting Semantic and Non-Semantic Speech Using Wav2vec and BERT for Dementia Detection.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

Exploiting Physical Presence Sensing to Secure Voice Assistant Systems.
Proceedings of the ICC 2021, 2021

2020
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020

Securely Connecting Wearables to Ambient Displays with User Intent.
IEEE Trans. Dependable Secur. Comput., 2020

Exploiting Fully Convolutional Network and Visualization Techniques on Spontaneous Speech for Dementia Detection.
CoRR, 2020

LIDAUS: Localization of IoT Device via Anchor UAV SLAM.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Exploiting Privacy-preserving Voice Query in Healthcare-based Voice Assistant System.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2019

Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.
IEEE Internet Things J., 2019

FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense.
IEEE Trans. Dependable Secur. Comput., 2018

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Efficient and Privacy-Preserving Roadmap Data Update for Autonomous Vehicles.
Proceedings of the IEEE Global Communications Conference, 2018

WiLock: Exploiting Wireless Signals for Device-Free Continuous Authentication.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era.
IEEE Internet Things J., 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Commun. Mag., 2017

Privacy-Preserving Time-Sharing Services for Autonomous Vehicles.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

SPICE: Secure Proximity-based Infrastructure for Close Encounters.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

AuthoRing: Wearable User-presence Authentication.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

LightTouch: Securely connecting wearables to ambient displays with user intent.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Re-DPoctor: Real-Time Health Data Releasing with W-Day Differential Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Efficient and Privacy-Preserving Voice-Based Search over mHealth Data.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2016

Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.
Sensors, 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Secur. Commun. Networks, 2016

Cryptographic Public Verification of Data Integrity for Cloud Storage Systems.
IEEE Cloud Comput., 2016

Demo: Wanda, Securely Introducing Mobile Devices.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Wanda: Securely introducing mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards efficient and privacy-preserving location-based comment sharing.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Towards Efficient Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Privacy-Preserving mHealth Data Release with Pattern Consistency.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014

Security and privacy in mobile social networks: challenges and solutions.
IEEE Wirel. Commun., 2014

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014

Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation.
IEEE J. Biomed. Health Informatics, 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014

RCare: Extending Secure Health Care to Rural Area Using VANETs.
Mob. Networks Appl., 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet Things J., 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014

RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurr. Comput. Pract. Exp., 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Commun. Mag., 2014

Poster: Balancing disclosure and utility of personal information.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

2013
Security and Privacy in Mobile Social Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid.
IEEE Trans. Smart Grid, 2013

PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE J. Sel. Areas Commun., 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

RECCE: A reliable and efficient cloud cooperation scheme in E-healthcare.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Enabling pervasive healthcare through continuous remote health monitoring.
IEEE Wirel. Commun., 2012

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Veh. Technol., 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Commun. Mag., 2012

PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Enabling pervasive healthcare with privacy preservation in smart community.
Proceedings of IEEE International Conference on Communications, 2012

VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network.
Mob. Networks Appl., 2011

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011

ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing.
Int. J. Secur. Networks, 2011

GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011

Smart community: an internet of things application.
IEEE Commun. Mag., 2011

Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Toward Reliable Actor Services in Wireless Sensor and Actor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks.
Proceedings of IEEE International Conference on Communications, 2011

Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient and Secure User Revocation Scheme in Mobile Social Networks.
Proceedings of the Global Communications Conference, 2011

Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011

2010
Proxy re-encryption with keyword search.
Inf. Sci., 2010

Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010

Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010

Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Provably secure and efficient bounded ciphertext policy attribute based encryption.
Proceedings of the 2009 ACM Symposium on Information, 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

A Simple User Authentication Scheme for Grid Computing.
Int. J. Netw. Secur., 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Efficient and secure protocol in fair document exchange.
Comput. Stand. Interfaces, 2008

2007
Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Short Group Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2007


  Loading...