Auditing and revocation enabled role-based access control over outsourced private EHRs W Liu, X Liu, J Liu, Q Wu, J Zhang, Y Li 2015 IEEE 17th international conference on high performance computing and …, 2015 | 39 | 2015 |
Hierarchical identity-based broadcast encryption W Liu, J Liu, Q Wu, B Qin Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014 | 31 | 2014 |
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test W Liu, J Liu, Q Wu, B Qin, Y Zhou Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 31 | 2014 |
Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption W Liu, J Liu, Q Wu, B Qin, Y Li International journal of information security 15, 35-50, 2016 | 25 | 2016 |
OpBoost: A vertical federated tree boosting framework based on order-preserving desensitization X Li, Y Hu, W Liu, H Feng, L Peng, Y Hong, K Ren, Z Qin arXiv preprint arXiv:2210.01318, 2022 | 20 | 2022 |
Anonymous role-based access control on e-health records X Zhou, J Liu, W Liu, Q Wu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 20 | 2016 |
Energy efficiency optimization for communication of air-based information network with guaranteed timing constraints X Liu, M Qiu, X Wang, W Liu, K Cai Journal of Signal Processing Systems 86, 299-312, 2017 | 15 | 2017 |
Linear private set union from {Multi-Query} reverse private membership test C Zhang, Y Chen, W Liu, M Zhang, D Lin 32nd USENIX Security Symposium (USENIX Security 23), 337-354, 2023 | 14 | 2023 |
Scape: Scalable collaborative analytics system on private database with malicious security F Han, L Zhang, H Feng, W Liu, X Li 2022 IEEE 38th International Conference on Data Engineering (ICDE), 1740-1753, 2022 | 13 | 2022 |
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption D Li, J Chen, J Liu, Q Wu, W Liu Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an …, 2017 | 13 | 2017 |
Secure and anonymous data transmission system for cluster organised space information network D Li, J Liu, W Liu 2016 IEEE International Conference on Smart Cloud (SmartCloud), 228-233, 2016 | 13 | 2016 |
Revocable hierarchical identity-based broadcast encryption D Li, J Liu, Z Zhang, Q Wu, W Liu Tsinghua Science and Technology 23 (5), 539-549, 2018 | 12 | 2018 |
Shapleyfl: Robust federated learning based on shapley value Q Sun, X Li, J Zhang, L Xiong, W Liu, J Liu, Z Qin, K Ren Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023 | 11 | 2023 |
Efficient subtree-based encryption for fuzzy-entity data sharing W Liu, J Liu, Q Wu, B Qin, D Naccache, H Ferradi Soft Computing 22, 7961-7976, 2018 | 11 | 2018 |
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. C Zhang, Y Chen, W Liu, M Zhang, D Lin IACR Cryptol. ePrint Arch. 2022, 358, 2022 | 9 | 2022 |
Correlated randomness teleportation via semi-trusted hardware—Enabling silent multi-party computation Y Lu, B Zhang, HS Zhou, W Liu, L Zhang, K Ren Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 9 | 2021 |
Dump: A dummy-point-based framework for histogram estimation in shuffle model X Li, W Liu, Z Chen, K Huang, Z Qin, L Zhang, K Ren arXiv preprint arXiv:2009.13738, 2020 | 9 | 2020 |
SAKE: scalable authenticated key exchange for mobile e‐health networks W Liu, J Liu, Q Wu, W Susilo, H Deng, B Qin Security and Communication Networks 9 (15), 2754-2765, 2016 | 9 | 2016 |
Android PBC: A pairing based cryptography toolkit for android platform W Liu, J Liu, Q Wu, B Qin IET Digital Library, 2014 | 9 | 2014 |
Private set operations from multi-query reverse private membership test Y Chen, M Zhang, C Zhang, M Dong, W Liu IACR International Conference on Public-Key Cryptography, 387-416, 2024 | 8 | 2024 |