Zheli Liu

Orcid: 0000-0002-2984-2661

According to our database1, Zheli Liu authored at least 117 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
IEEE Trans. Inf. Forensics Secur., 2024

A Survey on Consumer IoT Traffic: Security and Privacy.
CoRR, 2024

LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection.
CoRR, 2024

2023
Total variation distance privacy: Accurately measuring inference attacks and improving utility.
Inf. Sci., May, 2023

Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng., March, 2023

LiDetector: License Incompatibility Detection for Open Source Software.
ACM Trans. Softw. Eng. Methodol., January, 2023

QoS-Aware Diversified Service Selection.
IEEE Trans. Serv. Comput., 2023

Verifiable and Redactable Blockchains With Fully Editing Operations.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Aggregation is Insecure: Category Inference Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

The influence of explanation designs on user understanding differential privacy and making data-sharing decision.
Inf. Sci., 2023

Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study.
IACR Cryptol. ePrint Arch., 2023

Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves.
IACR Cryptol. ePrint Arch., 2023

LiSum: Open Source Software License Summarization with Multi-Task Learning.
CoRR, 2023

LiSum: Open Source Software License Summarization with Multi-Task Learning.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

LiResolver: License Incompatibility Resolution for Open Source Software.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Half-Tree: Halving the Cost of Tree Expansion in COT and DPF.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Differentially Private Byzantine-Robust Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications.
IEEE Trans. Ind. Informatics, 2022

Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications.
IEEE Trans. Ind. Informatics, 2022

Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2022

EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022

Half-Tree: Halving the Cost of Tree Expansion in COT and DPF.
IACR Cryptol. ePrint Arch., 2022

Editorial: Security of cloud service for the manufacturing industry.
Trans. Emerg. Telecommun. Technol., 2022

New Differential Privacy Communication Pipeline and Design Framework.
CoRR, 2022

LiDetector: License Incompatibility Detection for Open Source Software.
CoRR, 2022

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022

How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Proceedings of the 31st USENIX Security Symposium, 2022

Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022

Privacy-Preserving Machine Learning
Springer, ISBN: 978-981-16-9138-6, 2022

2021
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021

Reinforcement Learning Based Advertising Strategy Using Crowdsensing Vehicular Data.
IEEE Trans. Intell. Transp. Syst., 2021

VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2021

A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.
IEEE Trans. Green Commun. Netw., 2021

NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021

Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Frequency-Hiding Order-Preserving Encryption with Small Client Storage.
Proc. VLDB Endow., 2021

Editorial: Security and Privacy in Computing and Communications.
Mob. Networks Appl., 2021

PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage.
Inf. Sci., 2021

A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks.
Comput. Networks, 2021

Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021

Backdoor Filter: Mitigating Visible Backdoor Triggers in Dataset.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021

2020
Reversible Information Hiding Algorithm Based on Multikey Encryption.
Wirel. Commun. Mob. Comput., 2020

RACE: Reinforced Cooperative Autonomous Vehicle Collision Avoidance.
IEEE Trans. Veh. Technol., 2020

ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020

NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme.
IEEE Trans. Knowl. Data Eng., 2020

A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems.
Inf. Process. Manag., 2020

An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm.
Int. J. Inf. Comput. Secur., 2020

How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020

Unbalanced private set intersection cardinality protocol with low communication cost.
Future Gener. Comput. Syst., 2020

ADA: Adaptive Deep Log Anomaly Detector.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Secure Deduplication System with Active Key Update and Its Application in IoT.
ACM Trans. Intell. Syst. Technol., 2019

FSSE: Forward secure searchable encryption with keyed-block chains.
Inf. Sci., 2019

HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019

An efficient DDoS detection based on SU-Genetic feature selection.
Clust. Comput., 2019

OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics, 2018

Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Sensors, 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Netw. Comput. Appl., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018

Channel State Information-Based Detection of Sybil Attacks in Wireless Networks.
J. Internet Serv. Inf. Secur., 2018

DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst., 2018

A Distributed Anomaly Detection System for In-Vehicle Network Using HTM.
IEEE Access, 2018

Data Provenance With Retention of Reference Relations.
IEEE Access, 2018

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices.
IEEE Access, 2018

Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Syst. J., 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Constant bandwidth ORAM with small block size using PIR operations.
IACR Cryptol. ePrint Arch., 2017

FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptol. ePrint Arch., 2017

A Mutation Approach of Detecting SQL Injection Vulnerabilities.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Efficient Format-Preserving Encryption Mode for Integer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Partition ORAMS Combined with Novel Client Eviction Mechanism.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

ShadowPWD: practical browser-based password manager with a security token.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage.
IEEE Trans. Computers, 2016

Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016

On modeling microscopic vehicle fuel consumption using radial basis function neural network.
Soft Comput., 2016

New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016

Degradation and encryption for outsourced PNG images in cloud storage.
Int. J. Grid Util. Comput., 2016

N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016

DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Generalized Format-Preserving Encryption for Character Data.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud.
Trans. Comput. Collect. Intell., 2015

Service-oriented mobile malware detection system based on mining strategies.
Pervasive Mob. Comput., 2015

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015

Improved collaborative filtering with intensity-based contraction.
J. Ambient Intell. Humaniz. Comput., 2015

A Secure Architecture for Data Storage in the Cloud Environments.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

General Multi-key Searchable Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
Int. J. Data Warehous. Min., 2014

Privacy-preserving data utilization in hybrid clouds.
Future Gener. Comput. Syst., 2014

Enabling efficient and secure data sharing in cloud computing.
Concurr. Comput. Pract. Exp., 2014

Multi-key Searchable Encryption without Random Oracle.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

New Data Publishing Framework in the Big Data Environments.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Cycle-walking revisited: consistency, security, and efficiency.
Secur. Commun. Networks, 2013

Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013

Multi-user Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Format-Preserving Fuzzy Query Mechanism.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Format Compliant Degradation for PNG Image.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Data Masking Generic Model.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Format-Preserving Encryption for Character Data.
J. Networks, 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
Efficient Identity-based Broadcast Encryption without Random Oracles.
J. Comput., 2010


  Loading...