Stebėti
Weiran Liu
Weiran Liu
Kiti vardai刘巍然
Staff Security Engineer, Alibaba Group
Patvirtintas el. paštas alibaba-inc.com
Pavadinimas
Cituota
Cituota
Metai
Auditing and revocation enabled role-based access control over outsourced private EHRs
W Liu, X Liu, J Liu, Q Wu, J Zhang, Y Li
2015 IEEE 17th international conference on high performance computing and …, 2015
432015
Hierarchical identity-based broadcast encryption
W Liu, J Liu, Q Wu, B Qin
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
322014
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test
W Liu, J Liu, Q Wu, B Qin, Y Zhou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
312014
Linear private set union from {Multi-Query} reverse private membership test
C Zhang, Y Chen, W Liu, M Zhang, D Lin
32nd USENIX Security Symposium (USENIX Security 23), 337-354, 2023
282023
Shapleyfl: Robust federated learning based on shapley value
Q Sun, X Li, J Zhang, L Xiong, W Liu, J Liu, Z Qin, K Ren
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023
272023
Scape: Scalable collaborative analytics system on private database with malicious security
F Han, L Zhang, H Feng, W Liu, X Li
2022 IEEE 38th International Conference on Data Engineering (ICDE), 1740-1753, 2022
262022
Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption
W Liu, J Liu, Q Wu, B Qin, Y Li
International journal of information security 15, 35-50, 2016
262016
OpBoost: A vertical federated tree boosting framework based on order-preserving desensitization
X Li, Y Hu, W Liu, H Feng, L Peng, Y Hong, K Ren, Z Qin
arXiv preprint arXiv:2210.01318, 2022
242022
Anonymous role-based access control on e-health records
X Zhou, J Liu, W Liu, Q Wu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
202016
Private set operations from multi-query reverse private membership test
Y Chen, M Zhang, C Zhang, M Dong, W Liu
IACR international conference on public-key cryptography, 387-416, 2024
172024
Correlated randomness teleportation via semi-trusted hardware—enabling silent multi-party computation
Y Lu, B Zhang, HS Zhou, W Liu, L Zhang, K Ren
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
152021
Energy efficiency optimization for communication of air-based information network with guaranteed timing constraints
X Liu, M Qiu, X Wang, W Liu, K Cai
Journal of Signal Processing Systems 86, 299-312, 2017
152017
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption
D Li, J Chen, J Liu, Q Wu, W Liu
Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an …, 2017
142017
Revocable hierarchical identity-based broadcast encryption
D Li, J Liu, Z Zhang, Q Wu, W Liu
Tsinghua Science and Technology 23 (5), 539-549, 2018
132018
Secure and anonymous data transmission system for cluster organised space information network
D Li, J Liu, W Liu
2016 IEEE International Conference on Smart Cloud (SmartCloud), 228-233, 2016
132016
Efficient subtree-based encryption for fuzzy-entity data sharing
W Liu, J Liu, Q Wu, B Qin, D Naccache, H Ferradi
Soft Computing 22, 7961-7976, 2018
122018
Optimal Private Set Union from Multi-Query Reverse Private Membership Test.
C Zhang, Y Chen, W Liu, M Zhang, D Lin
IACR Cryptol. ePrint Arch. 2022, 358, 2022
102022
Local differentially private heavy hitter detection in data streams with bounded memory
X Li, W Liu, J Lou, Y Hong, L Zhang, Z Qin, K Ren
Proceedings of the ACM on Management of Data 2 (1), 1-27, 2024
92024
Privacy enhancement via dummy points in the shuffle model
X Li, W Liu, H Feng, K Huang, Y Hu, J Liu, K Ren, Z Qin
IEEE Transactions on Dependable and Secure Computing, 2023
92023
Android PBC: A pairing based cryptography toolkit for android platform
W Liu, J Liu, Q Wu, B Qin
2014 Communications Security Conference (CSC 2014), 1-6, 2014
92014
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20