What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Liehuang Zhu
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis.
Annyu Liu
An Wang
Shaofei Sun
Congming Wei
Yaoling Ding
Yongjuan Wang
Liehuang Zhu
2025
journals/tifs
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data.
Ying Miao
Keke Gai
Jing Yu
Yu-an Tan
Liehuang Zhu
Weizhi Meng
2025
journals/tifs
The Deferred Byzantine Generals Problem.
Xuyang Liu
Zijian Zhang
Zhen Li
Peng Jiang
Yajie Wang
Meng Li
Liehuang Zhu
2025
journals/tifs
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning.
Meng Shen
Jinhe Wu
Ke Ye
Ke Xu
Gang Xiong
Liehuang Zhu
2025
journals/tifs
MUFTI: Multi-Domain Distillation-Based Heterogeneous Federated Continuous Learning.
Keke Gai
Zijun Wang
Jing Yu
Liehuang Zhu
2025
journals/tifs
Enforcing Differential Privacy in Federated Learning via Long-Term Contribution Incentives.
Xiangyun Tang
Luyao Peng
Yu Weng
Meng Shen
Liehuang Zhu
Robert H. Deng
2025
journals/tifs
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning.
Zheng Che
Meng Shen
Zhehui Tan
Hanbiao Du
Wei Wang
Ting Chen
Qinglin Zhao
Yong Xie
Liehuang Zhu
2025
journals/tifs
PraVFed: Practical Heterogeneous Vertical Federated Learning via Representation Learning.
Shuo Wang
Keke Gai
Jing Yu
Zijian Zhang
Liehuang Zhu
2025
journals/tifs
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework.
Xiangyun Tang
Minyang Li
Meng Shen
Jiawen Kang
Liehuang Zhu
Zhiquan Liu
Guomin Yang
Dusit Niyato
Robert H. Deng
2025
journals/tifs
De-Anonymizing Monero: A Maximum Weighted Matching-Based Approach.
Xingyu Yang
Lei Xu
Liehuang Zhu
2025
journals/tifs
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models.
Naiyu Wang
Shen Wang
Meng Li
Longfei Wu
Zijian Zhang
Zhitao Guan
Liehuang Zhu
2025
journals/tifs
Resisting Poisoning Attacks in Federated Learning via Dual-Domain Distance and Trust Assessment.
Zhaoqi Wang
Zijian Zhang
Zhen Li
Yan Wu
Ye Liu
Meng Li
Xin Li
Yong Liu
Jincheng An
Wei Liang
Liehuang Zhu
2025
journals/popets
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
Cong Zuo
Shangqi Lai
Shi-Feng Sun
Xingliang Yuan
Joseph K. Liu
Jun Shao
Huaxiong Wang
Liehuang Zhu
Shujie Cui
2025
conf/acisp
sfGlitter: A Fully Adaptive and Tightly Secure Threshold Signature.
Shaolong Tang
Peng Jiang
Liehuang Zhu
2025
journals/tifs
Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing.
Meng Li
Hanni Ding
Yifei Chen
Yan Qiao
Zijian Zhang
Liehuang Zhu
Mauro Conti
2025
journals/tifs
Fine-Grained and Class-Incremental Malicious Account Detection in Ethereum via Dynamic Graph Learning.
Hanbiao Du
Meng Shen
Yang Liu
Zheng Che
Jinhe Wu
Wei Wang
Liehuang Zhu
2025
journals/tifs
CRCT: Compact Ring Confidential Transactions Based on Sum Arguments.
Junke Duan
Wei Wang
Licheng Wang
Lize Gu
Liehuang Zhu
2025
journals/tifs
FedAMM: Federated Learning Against Majority Malicious Clients Using Robust Aggregation.
Keke Gai
Dongjue Wang
Jing Yu
Liehuang Zhu
Weizhi Meng
2025
journals/tifs
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation.
Hanqi Zhang
Yandong Zheng
Chang Xu
Liehuang Zhu
Can Zhang
2025
journals/tifs
BESA: Boosting Encoder Stealing Attack With Perturbation Recovery.
Xuhao Ren
Haotian Liang
Yajie Wang
Chuan Zhang
Zehui Xiong
Liehuang Zhu
2025
conf/uss
Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges.
Danlei Xiao
Chuan Zhang
Haotian Deng
Jinwen Liang
Licheng Wang
Liehuang Zhu
2025
journals/tifs
VSecNN: Verifiable and Privacy-Preserving Neural Network Inference in Cloud Service.
Wenti Yang
Xuan Li
Meng Li
Zijian Zhang
Zhitao Guan
Liehuang Zhu
2024
journals/tches
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning.
Ziyu Wang
Yaoling Ding
An Wang
Yuwei Zhang
Congming Wei
Shaofei Sun
Liehuang Zhu
2024
journals/tifs
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel.
Congming Wei
Guangze Hong
An Wang
Jing Wang
Shaofei Sun
Yaoling Ding
Liehuang Zhu
Wenrui Ma
2024
journals/tifs
Accountable and Secure Threshold EdDSA Signature and Its Applications.
Yumeng Xie
Qing Fan
Chuan Zhang
Tong Wu
Yuao Zhou
Debiao He
Liehuang Zhu
2024
journals/tifs
Locally Verifiable Batch Authentication in IoMT.
Wenze Mao
Peng Jiang
Liehuang Zhu
2024
journals/tifs
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning.
Hanbiao Du
Zheng Che
Meng Shen
Liehuang Zhu
Jiankun Hu
2024
journals/tifs
Decentralized Threshold Signatures With Dynamically Private Accountability.
Meng Li
Hanni Ding
Qing Wang
Mingwei Zhang
Weizhi Meng
Liehuang Zhu
Zijian Zhang
Xiaodong Lin
2024
journals/tifs
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
Zhuo Chen
Liehuang Zhu
Peng Jiang
Can Zhang
Feng Gao
Fuchun Guo
2024
journals/tifs
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation.
Yajie Wang
Yi Wu
Shangbo Wu
Ximeng Liu
Wanlei Zhou
Liehuang Zhu
Chuan Zhang
2024
journals/tifs
Purified Authorization Service With Encrypted Message Moderation.
Peng Jiang
Qi Liu
Liehuang Zhu
2024
journals/tifs
Graph-Based Covert Transaction Detection and Protection in Blockchain.
Zhenyu Guo
Xin Li
Jiamou Liu
Zijian Zhang
Meng Li
Jingjing Hu
Liehuang Zhu
2024
journals/tifs
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage.
Chuan Zhang
Haojun Xuan
Tong Wu
Ximeng Liu
Guomin Yang
Liehuang Zhu
2024
journals/tifs
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement.
Peng Jiang
Jun Zhu
Liehuang Zhu
2024
journals/tifs
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption.
Peng Jiang
Qi Liu
Liehuang Zhu
2024
journals/tifs
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement.
Zhuo Chen
Liehuang Zhu
Peng Jiang
Zijian Zhang
Chengxiang Si
2024
journals/tifs
Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data Sharing.
Mingyang Zhao
Chuan Zhang
Tong Wu
Jianbing Ni
Ximeng Liu
Liehuang Zhu
2024
conf/uss
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Meng Shen
Changyue Li
Qi Li
Hao Lu
Liehuang Zhu
Ke Xu
2024
conf/acisp
CrossAAD: Cross-Chain Abnormal Account Detection.
Yong Lin
Peng Jiang
Fuchun Guo
Liehuang Zhu
2024
conf/sp
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
Meng Shen
Kexin Ji
Jinhe Wu
Qi Li
Xiangdong Kong
Ke Xu
Liehuang Zhu
2023
journals/compsec
FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees.
Zhenyuan Guo
Lei Xu
Liehuang Zhu
2023
journals/tifs
Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy.
Shaorui Song
Lei Xu
Liehuang Zhu
2023
journals/tifs
Subject-Level Membership Inference Attack via Data Augmentation and Model Discrepancy.
Yimin Liu
Peng Jiang
Liehuang Zhu
2023
journals/tifs
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud.
Chenfei Hu
Chuan Zhang
Dian Lei
Tong Wu
Ximeng Liu
Liehuang Zhu
2023
journals/tifs
EGIA: An External Gradient Inversion Attack in Federated Learning.
Haotian Liang
Youqi Li
Chuan Zhang
Ximeng Liu
Liehuang Zhu
2023
conf/uss
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Meng Shen
Kexin Ji
Zhenbo Gao
Qi Li
Liehuang Zhu
Ke Xu
2023
conf/uss
WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT.
Haibin Zhang
Sisi Duan
Boxin Zhao
Liehuang Zhu
2023
conf/csr2
HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability.
Jipeng Hou
Lei Xu
Liehuang Zhu
Peng Jiang
Shaorui Song
2023
conf/icics
Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks.
Chang Xu
Shiyao Zhang
Liehuang Zhu
Xiaodong Shen
Xiaoming Zhang
2023
conf/dsn
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
Haibin Zhang
Sisi Duan
Chao Liu
Boxin Zhao
Xuanji Meng
Shengli Liu
Yong Yu
Fangguo Zhang
Liehuang Zhu
2022
journals/tifs
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing.
Chuan Zhang
Mingyang Zhao
Liehuang Zhu
Tong Wu
Ximeng Liu
2022
journals/tifs
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System.
Peng Jiang
Baoqi Qiu
Liehuang Zhu
2022
conf/icics
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks.
Yang Han
Dawei Xu
Jiaqi Gao
Liehuang Zhu
2021
journals/tifs
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
Meng Shen
Jinpeng Zhang
Liehuang Zhu
Ke Xu
Xiaojiang Du
2021
journals/tifs
Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis.
An Wang
Yuan Li
Yaoling Ding
Liehuang Zhu
Yongjuan Wang
2021
journals/tifs
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
Meng Shen
Yiting Liu
Liehuang Zhu
Xiaojiang Du
Jiankun Hu
2021
journals/tifs
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
Meng Shen
Hao Yu
Liehuang Zhu
Ke Xu
Qi Li
Jiankun Hu
2020
journals/compsec
An efficient and privacy-preserving truth discovery scheme in crowdsensing applications.
Chuan Zhang
Chang Xu
Liehuang Zhu
Yanwei Li
Can Zhang
Huishu Wu
2018
journals/tifs
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
Meng Shen
Baoli Ma
Liehuang Zhu
Rashid Mijumbi
Xiaojiang Du
Jiankun Hu
2017
journals/tifs
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
Meng Shen
Mingwei Wei
Liehuang Zhu
Mingzhong Wang
2017
conf/ccs
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Pengchuan Su
Nan Sun
Liehuang Zhu
Yandong Li
RongRong Bi
Meng Li
Zijian Zhang
2004
journals/compsec
Digital signature of multicast streams secure against adaptive chosen message attack.
Liehuang Zhu
Yuanda Cao
Dong Wang
Coauthors
An Wang
(4)
Annyu Liu
(1)
Baoli Ma
(1)
Baoqi Qiu
(1)
Boxin Zhao
(2)
Can Zhang
(3)
Chang Xu
(3)
Changyue Li
(1)
Chao Liu
(1)
Chenfei Hu
(1)
Chengxiang Si
(1)
Chuan Zhang
(10)
Cong Zuo
(1)
Congming Wei
(3)
Danlei Xiao
(1)
Dawei Xu
(1)
Debiao He
(1)
Dian Lei
(1)
Dong Wang
(1)
Dongjue Wang
(1)
Dusit Niyato
(1)
Fangguo Zhang
(1)
Feng Gao
(1)
Fuchun Guo
(2)
Gang Xiong
(1)
Guangze Hong
(1)
Guomin Yang
(2)
Haibin Zhang
(2)
Hanbiao Du
(3)
Hanni Ding
(2)
Hanqi Zhang
(1)
Hao Lu
(1)
Hao Yu
(1)
Haojun Xuan
(1)
Haotian Deng
(1)
Haotian Liang
(2)
Huaxiong Wang
(1)
Huishu Wu
(1)
Jiamou Liu
(1)
Jianbing Ni
(1)
Jiankun Hu
(4)
Jiaqi Gao
(1)
Jiawen Kang
(1)
Jincheng An
(1)
Jing Wang
(1)
Jing Yu
(4)
Jingjing Hu
(1)
Jinhe Wu
(3)
Jinpeng Zhang
(1)
Jinwen Liang
(1)
Jipeng Hou
(1)
Joseph K. Liu
(1)
Jun Shao
(1)
Jun Zhu
(1)
Junke Duan
(1)
Ke Xu
(6)
Ke Ye
(1)
Keke Gai
(4)
Kexin Ji
(2)
Lei Xu
(4)
Licheng Wang
(2)
Liehuang Zhu
(62)
Lize Gu
(1)
Longfei Wu
(1)
Luyao Peng
(1)
Mauro Conti
(1)
Meng Li
(8)
Meng Shen
(14)
Mingwei Wei
(1)
Mingwei Zhang
(1)
Mingyang Zhao
(2)
Mingzhong Wang
(1)
Minyang Li
(1)
Naiyu Wang
(1)
Nan Sun
(1)
Peng Jiang
(12)
Pengchuan Su
(1)
Qi Li
(4)
Qi Liu
(2)
Qing Fan
(1)
Qing Wang
(1)
Qinglin Zhao
(1)
Rashid Mijumbi
(1)
Robert H. Deng
(2)
RongRong Bi
(1)
Shangbo Wu
(1)
Shangqi Lai
(1)
Shaofei Sun
(3)
Shaolong Tang
(1)
Shaorui Song
(2)
Shen Wang
(1)
Shengli Liu
(1)
Shi-Feng Sun
(1)
Shiyao Zhang
(1)
Shujie Cui
(1)
Shuo Wang
(1)
Sisi Duan
(2)
Ting Chen
(1)
Tong Wu
(5)
Wanlei Zhou
(1)
Wei Liang
(1)
Wei Wang
(1)
Wei Wang
(2)
Weizhi Meng
(3)
Wenrui Ma
(1)
Wenti Yang
(1)
Wenze Mao
(1)
Xiangdong Kong
(1)
Xiangyun Tang
(2)
Xiaodong Lin
(1)
Xiaodong Shen
(1)
Xiaojiang Du
(3)
Xiaoming Zhang
(1)
Ximeng Liu
(6)
Xin Li
(2)
Xingliang Yuan
(1)
Xingyu Yang
(1)
Xuan Li
(1)
Xuanji Meng
(1)
Xuhao Ren
(1)
Xuyang Liu
(1)
Yajie Wang
(3)
Yan Qiao
(1)
Yan Wu
(1)
Yandong Li
(1)
Yandong Zheng
(1)
Yang Han
(1)
Yang Liu
(1)
Yanwei Li
(1)
Yaoling Ding
(4)
Ye Liu
(1)
Yi Wu
(1)
Yifei Chen
(1)
Yimin Liu
(1)
Ying Miao
(1)
Yiting Liu
(1)
Yong Lin
(1)
Yong Liu
(1)
Yong Xie
(1)
Yong Yu
(1)
Yongjuan Wang
(2)
Youqi Li
(1)
Yu Weng
(1)
Yu-An Tan
(1)
Yuan Li
(1)
Yuanda Cao
(1)
Yuao Zhou
(1)
Yumeng Xie
(1)
Yuwei Zhang
(1)
Zehui Xiong
(1)
Zhaoqi Wang
(1)
Zhehui Tan
(1)
Zhen Li
(2)
Zhenbo Gao
(1)
Zheng Che
(3)
Zhenyu Guo
(1)
Zhenyuan Guo
(1)
Zhiquan Liu
(1)
Zhitao Guan
(2)
Zhuo Chen
(2)
Zijian Zhang
(10)
Zijun Wang
(1)
Ziyu Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to