Filter
Conference contribution

Search results

  • 2023

    Combining ID’s, Attributes, and Policies in Hyperledger Fabric

    Gordijn, D., Kromes, R., Giannetsos, T. & Liang, K., 2023, Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings. Meng, W. & Li, W. (eds.). Springer, p. 32-48 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 498 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Federated Synthetic Data Generation with Stronger Security Guarantees

    Ghavamipour, A. R., Turkmen, F., Wang, R. & Liang, K., 2023, SACMAT 2023 - Proceedings of the 28th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 31-42 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    44 Downloads (Pure)
  • ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract

    Grishkov, I., Kromes, R., Giannetsos, T. & Liang, K., 2023, Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings. Meng, W. & Li, W. (eds.). Springer, p. 3-18 16 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 498 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • Improved Wordpcfg for Passwords with Maximum Probability Segmentation

    Li, W., Yang, J., Cheng, H., Wang, P. & Liang, K., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE , 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    13 Downloads (Pure)
  • 2022

    DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints

    Zhao, Z., Chen, X., Xuan, Y., Dong, Y., Wang, D. & Liang, K., 2022, Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE , p. 15192-15201 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    14 Downloads (Pure)
  • DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay

    Zheng, Y., Xu, P., Wang, W., Chen, T., Susilo, W., Liang, K. & Jin, H., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 86-104 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    16 Downloads (Pure)
  • Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

    Wang, X., Cao, Z., Liu, Z. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 105-125 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

    Xu, J., Wang, R., Koffas, S., Liang, K. & Picek, S., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 684–698 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    33 Downloads (Pure)
  • No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent

    Chen, H., Fu, S. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Part 1 ed. Cham: Springer, p. 387-407 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    9 Downloads (Pure)
  • Passtrans: An Improved Password Reuse Model Based on Transformer

    He, X., Cheng, H., Xie, J., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE , p. 3044-3048 5 p. 9746731

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    40 Downloads (Pure)
  • VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

    Lambregts, S., Chen, H., Ning, J. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Cham: Springer, p. 653-676 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • WordMarkov: A New Password Probability Model of Semantics

    Xie, J., Cheng, H., Zhu, R., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE , p. 3034-3038 5 p. 9746203

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    8 Downloads (Pure)
  • 2021

    Defending Use-After-Free via Relationship Between Memory and Pointer

    Xu, G., Li, M., Li, X., Chen, K., Wang, R., Wang, W., Liang, K., Tang, Q. & Liu, S., 2021, Collaborative Computing: Networking, Applications and Worksharing - 16th EAI International Conference, CollaborateCom 2020, Proceedings. Gao, H., Wang, X., Iqbal, M., Yin, Y., Yin, J. & Gu, N. (eds.). Springer, p. 583-597 15 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 349).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction

    Cheng, H., Li, W., Wang, P. & Liang, K., 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE , p. 2690-2694 5 p. 9414886

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Incrementally updateable honey password vaults

    Cheng, H., Li, W., Wang, P., Chu, C. H. & Liang, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 857-874 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum

    Tjiam, K., Wang, R., Chen, H. & Liang, K., 2021, CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021. Association for Computing Machinery (ACM), p. 25-35 11 p. (CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    556 Downloads (Pure)
  • 2020

    Deep Binarized Convolutional Neural Network Inferences over Encrypted Data

    Zhou, J., Li, J., Panaousis, E. & Liang, K., Aug 2020, Proceedings - 2020 7th IEEE International Conference on Cyber Security and Cloud Computing and 2020 6th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2020. Institute of Electrical and Electronics Engineers (IEEE), p. 160-167 8 p. 9170954. (Proceedings - 2020 7th IEEE International Conference on Cyber Security and Cloud Computing and 2020 6th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • 2019

    Cryptanalysis of Raindrop and FBC

    Ren, B., Chen, J., Zhou, S., Jin, X., Xia, Z. & Liang, K., 1 Jan 2019, Network and System Security - 13th International Conference, NSS 2019, Proceedings. Liu, J. K. & Huang, X. (eds.). SpringerOpen, p. 536-551 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11928 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2018

    Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list

    Liu, J. K., Yuen, T. H., Zhang, P. & Liang, K., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Preneel, B. & Vercauteren, F. (eds.). Springer, p. 516-534 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    58 Citations (Scopus)
  • 2016

    A cloud-based access control scheme with user revocation and attribute update

    Zhang, P., Chen, Z., Liang, K., Wang, S. & Wang, T., 1 Jan 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (eds.). Springer, p. 525-540 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9722).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    35 Citations (Scopus)
  • A data hiding approach for sensitive smartphone data

    Luo, C., Fylakis, A., Partala, J., Klakegg, S., Goncalves, J., Liang, K., Seppänen, T. & Kostakos, V., 12 Sept 2016, UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Association for Computing Machinery (ACM), p. 557-568 12 p. (UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    12 Citations (Scopus)
  • Edit distance based encryption and its application

    Phuong, T. V. X., Yang, G., Susilo, W. & Liang, K., 1 Jan 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (eds.). Springer, p. 103-119 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9723).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data

    Liang, K., Su, C., Liu, J. K. & Chen, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 83-94 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    26 Citations (Scopus)
  • Online/offline public-index predicate encryption for fine-grained mobile access control

    Liu, W., Liu, J., Wu, Q., Qin, B. & Liang, K., 1 Jan 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer, p. 588-605 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9879 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Secure and traceable framework for data circulation

    Liang, K., Miyaji, A. & Su, C., 1 Jan 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (eds.). Springer, p. 376-388 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9722).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • While mobile encounters with clouds

    Au, M. H., Liang, K., Liu, J. K. & Lu, R., 1 Jan 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Yung, M., Chen, J., Su, C. & Piuri, V. (eds.). Springer, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • 2015

    Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

    Yang, Y., Liu, J. K., Liang, K., Choo, K. K. R. & Zhou, J., 1 Jan 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 146-166 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9327).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    85 Citations (Scopus)