Auditing and revocation enabled role-based access control over outsourced private EHRs W Liu, X Liu, J Liu, Q Wu, J Zhang, Y Li 2015 IEEE 17th international conference on high performance computing and …, 2015 | 43 | 2015 |
Hierarchical identity-based broadcast encryption W Liu, J Liu, Q Wu, B Qin Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014 | 32 | 2014 |
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test W Liu, J Liu, Q Wu, B Qin, Y Zhou Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 31 | 2014 |
Linear private set union from {Multi-Query} reverse private membership test C Zhang, Y Chen, W Liu, M Zhang, D Lin 32nd USENIX Security Symposium (USENIX Security 23), 337-354, 2023 | 28 | 2023 |
Shapleyfl: Robust federated learning based on shapley value Q Sun, X Li, J Zhang, L Xiong, W Liu, J Liu, Z Qin, K Ren Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023 | 27 | 2023 |
Scape: Scalable collaborative analytics system on private database with malicious security F Han, L Zhang, H Feng, W Liu, X Li 2022 IEEE 38th International Conference on Data Engineering (ICDE), 1740-1753, 2022 | 26 | 2022 |
Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption W Liu, J Liu, Q Wu, B Qin, Y Li International journal of information security 15, 35-50, 2016 | 26 | 2016 |
OpBoost: A vertical federated tree boosting framework based on order-preserving desensitization X Li, Y Hu, W Liu, H Feng, L Peng, Y Hong, K Ren, Z Qin arXiv preprint arXiv:2210.01318, 2022 | 24 | 2022 |
Anonymous role-based access control on e-health records X Zhou, J Liu, W Liu, Q Wu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 20 | 2016 |
Private set operations from multi-query reverse private membership test Y Chen, M Zhang, C Zhang, M Dong, W Liu IACR international conference on public-key cryptography, 387-416, 2024 | 17 | 2024 |
Correlated randomness teleportation via semi-trusted hardware—enabling silent multi-party computation Y Lu, B Zhang, HS Zhou, W Liu, L Zhang, K Ren Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 15 | 2021 |
Energy efficiency optimization for communication of air-based information network with guaranteed timing constraints X Liu, M Qiu, X Wang, W Liu, K Cai Journal of Signal Processing Systems 86, 299-312, 2017 | 15 | 2017 |
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption D Li, J Chen, J Liu, Q Wu, W Liu Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an …, 2017 | 14 | 2017 |
Revocable hierarchical identity-based broadcast encryption D Li, J Liu, Z Zhang, Q Wu, W Liu Tsinghua Science and Technology 23 (5), 539-549, 2018 | 13 | 2018 |
Secure and anonymous data transmission system for cluster organised space information network D Li, J Liu, W Liu 2016 IEEE International Conference on Smart Cloud (SmartCloud), 228-233, 2016 | 13 | 2016 |
Efficient subtree-based encryption for fuzzy-entity data sharing W Liu, J Liu, Q Wu, B Qin, D Naccache, H Ferradi Soft Computing 22, 7961-7976, 2018 | 12 | 2018 |
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. C Zhang, Y Chen, W Liu, M Zhang, D Lin IACR Cryptol. ePrint Arch. 2022, 358, 2022 | 10 | 2022 |
Local differentially private heavy hitter detection in data streams with bounded memory X Li, W Liu, J Lou, Y Hong, L Zhang, Z Qin, K Ren Proceedings of the ACM on Management of Data 2 (1), 1-27, 2024 | 9 | 2024 |
Privacy enhancement via dummy points in the shuffle model X Li, W Liu, H Feng, K Huang, Y Hu, J Liu, K Ren, Z Qin IEEE Transactions on Dependable and Secure Computing, 2023 | 9 | 2023 |
Android PBC: A pairing based cryptography toolkit for android platform W Liu, J Liu, Q Wu, B Qin 2014 Communications Security Conference (CSC 2014), 1-6, 2014 | 9 | 2014 |