What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kaitai Liang
Google Scholar
50
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm.
Dazhuang Liu
Yanqi Qiao
Rui Wang
Kaitai Liang
Georgios Smaragdakis
2025
journals/compsec
Power of union: Federated honey password vaults against differential attack.
Peng Xu
Tingting Rao
Wei Wang
Zhaojun Lu
Kaitai Liang
2025
conf/esorics
Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU.
Yifan Yang
Kexin Zhang
Peng Xu
Zhaojun Lu
Wei Wang
Weiqi Wang
Kaitai Liang
2025
journals/tifs
Improving Password Guessing With Isomorphism Modeling.
Xudong Yang
Zhenjia Xiao
Xiaoyu Wu
Kaiwen Xing
He Tang
Tao Yang
Kaitai Liang
Hu Xiong
2024
journals/popets
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Liangqin Ren
Zeyan Liu
Fengjun Li
Kaitai Liang
Zhu Li
Bo Luo
2024
conf/uss
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Dongli Liu
Wei Wang
Peng Xu
Laurence T. Yang
Bo Luo
Kaitai Liang
2024
conf/uss
Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
Hao Nie
Wei Wang
Peng Xu
Xianglong Zhang
Laurence T. Yang
Kaitai Liang
2024
conf/esorics
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages.
Björn Ho
Huanhuan Chen
Zeshun Shi
Kaitai Liang
2024
conf/esorics
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures.
Tjard Langhout
Huanhuan Chen
Kaitai Liang
2023
journals/compsec
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Guangquan Xu
Wenqing Lei
Lixiao Gong
Jian Liu
Hongpeng Bai
Kai Chen
Ran Wang
Wei Wang
Kaitai Liang
Weizhe Wang
Weizhi Meng
Shaoying Liu
2023
journals/istr
Secure genotype imputation using homomorphic encryption.
Junwei Zhou
Botian Lei
Huile Lang
Emmanouil Panaousis
Kaitai Liang
Jianwen Xiang
2023
journals/tifs
Keyword Search Shareable Encryption for Fast and Secure Data Replication.
Wei Wang
Dongli Liu
Peng Xu
Laurence Tianruo Yang
Kaitai Liang
2023
journals/tifs
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
Wenting Li
Ping Wang
Kaitai Liang
2023
conf/uss
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Xianglong Zhang
Wei Wang
Peng Xu
Laurence T. Yang
Kaitai Liang
2023
conf/ndss
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Tianyang Chen
Peng Xu
Stjepan Picek
Bo Luo
Willy Susilo
Hai Jin
Kaitai Liang
2023
conf/asiacrypt
CCA-1 Secure Updatable Encryption with Adaptive Security.
Huanhuan Chen
Yao Jiang Galteland
Kaitai Liang
2022
journals/tifs
ROSE: Robust Searchable Encryption With Forward and Backward Security.
Peng Xu
Willy Susilo
Wei Wang
Tianyang Chen
Qianhong Wu
Kaitai Liang
Hai Jin
2022
conf/esorics
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
Yubo Zheng
Peng Xu
Wei Wang
Tianyang Chen
Willy Susilo
Kaitai Liang
Hai Jin
2022
conf/esorics
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.
Steven Lambregts
Huanhuan Chen
Jianting Ning
Kaitai Liang
2022
conf/esorics
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Xingkai Wang
Zhenfu Cao
Zhen Liu
Kaitai Liang
2022
conf/esorics
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent.
Huanhuan Chen
Shihui Fu
Kaitai Liang
2022
conf/blocktea
Combining ID's, Attributes, and Policies in Hyperledger Fabric.
Daan Gordijn
Roland Kromes
Thanassis Giannetsos
Kaitai Liang
2022
conf/blocktea
ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract.
Ilya Grishkov
Roland Kromes
Thanassis Giannetsos
Kaitai Liang
2022
conf/acsac
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
Jing Xu
Rui Wang
Stefanos Koffas
Kaitai Liang
Stjepan Picek
2021
journals/compsec
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
E. Chen
Yan Zhu
Guizhen Zhu
Kaitai Liang
Rongquan Feng
2021
journals/tifs
Practical Threshold Multi-Factor Authentication.
Wenting Li
Haibo Cheng
Ping Wang
Kaitai Liang
2021
conf/ccs
Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum.
Kevin Tjiam
Rui Wang
Huanhuan Chen
Kaitai Liang
2021
conf/uss
Incrementally Updateable Honey Password Vaults.
Haibo Cheng
Wenting Li
Ping Wang
Chao-Hsien Chu
Kaitai Liang
2020
journals/compsec
Privacy preserving search services against online attack.
Yi Zhao
Jianting Ning
Kaitai Liang
Yanqi Zhao
Liqun Chen
Bo Yang
2020
journals/compsec
Am I eclipsed? A smart detector of eclipse attacks for Ethereum.
Guangquan Xu
Bingjiang Guo
Chunhua Su
Xi Zheng
Kaitai Liang
Duncan S. Wong
Hao Wang
2019
journals/tifs
Passive Attacks Against Searchable Encryption.
Jianting Ning
Jia Xu
Kaitai Liang
Fan Zhang
Ee-Chien Chang
2018
journals/tifs
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
Jianting Ning
Zhenfu Cao
Xiaolei Dong
Kaitai Liang
Hui Ma
Lifei Wei
2018
conf/acns
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Joseph K. Liu
Tsz Hon Yuen
Peng Zhang
Kaitai Liang
2017
conf/provsec
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Ru Meng
Yanwei Zhou
Jianting Ning
Kaitai Liang
Jinguang Han
Willy Susilo
2016
journals/tifs
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
Shulan Wang
Kaitai Liang
Joseph K. Liu
Jianyong Chen
Jianping Yu
Weixin Xie
2016
journals/tifs
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
Kaitai Liang
Xinyi Huang
Fuchun Guo
Joseph K. Liu
2016
conf/ccs
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Kaitai Liang
Chunhua Su
Jiageng Chen
Joseph K. Liu
2016
conf/acisp
Secure and Traceable Framework for Data Circulation.
Kaitai Liang
Atsuko Miyaji
Chunhua Su
2016
conf/acisp
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
Peng Zhang
Zehong Chen
Kaitai Liang
Shulan Wang
Ting Wang
2016
conf/acisp
Edit Distance Based Encryption and Its Application.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Kaitai Liang
2016
conf/provsec
One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Yangguang Tian
Guomin Yang
Yi Mu
Kaitai Liang
Yong Yu
2016
conf/esorics
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Weiran Liu
Jianwei Liu
Qianhong Wu
Bo Qin
Kaitai Liang
2015
journals/tifs
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
Kaitai Liang
Willy Susilo
Joseph K. Liu
2015
journals/tifs
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage.
Kaitai Liang
Willy Susilo
2015
conf/esorics
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Yanjiang Yang
Joseph K. Liu
Kaitai Liang
Kim-Kwang Raymond Choo
Jianying Zhou
2015
conf/icics
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Shangqi Lai
Joseph K. Liu
Kim-Kwang Raymond Choo
Kaitai Liang
2014
journals/tifs
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
Kaitai Liang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
Tran Viet Xuan Phuong
Qi Xie
2014
conf/provsec
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Rongxing Lu
Xiaodong Lin
Jun Shao
Kaitai Liang
2014
conf/esorics
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Kaitai Liang
Joseph K. Liu
Duncan S. Wong
Willy Susilo
2012
conf/icisc
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Kaitai Liang
Zhen Liu
Xiao Tan
Duncan S. Wong
Chunming Tang
Coauthors
Atsuko Miyaji
(1)
Bingjiang Guo
(1)
Björn Ho
(1)
Bo Luo
(3)
Bo Qin
(1)
Bo Yang
(1)
Botian Lei
(1)
Chao-Hsien Chu
(1)
Chunhua Su
(3)
Chunming Tang
(1)
Daan Gordijn
(1)
Dazhuang Liu
(1)
Dongli Liu
(2)
Duncan S. Wong
(4)
E. Chen
(1)
Ee-Chien Chang
(1)
Emmanouil Panaousis
(1)
Fan Zhang
(1)
Fengjun Li
(1)
Fuchun Guo
(1)
Georgios Smaragdakis
(1)
Guangquan Xu
(2)
Guizhen Zhu
(1)
Guomin Yang
(3)
Hai Jin
(3)
Haibo Cheng
(2)
Hao Nie
(1)
Hao Wang
(1)
He Tang
(1)
Hongpeng Bai
(1)
Hu Xiong
(1)
Huanhuan Chen
(6)
Hui Ma
(1)
Huile Lang
(1)
Ilya Grishkov
(1)
Jia Xu
(1)
Jiageng Chen
(1)
Jian Liu
(1)
Jianping Yu
(1)
Jianting Ning
(5)
Jianwei Liu
(1)
Jianwen Xiang
(1)
Jianying Zhou
(1)
Jianyong Chen
(1)
Jing Xu
(1)
Jinguang Han
(1)
Joseph K. Liu
(9)
Jun Shao
(1)
Junwei Zhou
(1)
Kai Chen
(1)
Kaitai Liang
(50)
Kaiwen Xing
(1)
Kevin Tjiam
(1)
Kexin Zhang
(1)
Kim-Kwang Raymond Choo
(2)
Laurence T. Yang
(3)
Laurence Tianruo Yang
(1)
Liangqin Ren
(1)
Lifei Wei
(1)
Liqun Chen
(1)
Lixiao Gong
(1)
Man Ho Au
(1)
Peng Xu
(9)
Peng Zhang
(2)
Ping Wang
(3)
Qi Xie
(1)
Qianhong Wu
(2)
Ran Wang
(1)
Roland Kromes
(2)
Rongquan Feng
(1)
Rongxing Lu
(1)
Ru Meng
(1)
Rui Wang
(3)
Shangqi Lai
(1)
Shaoying Liu
(1)
Shihui Fu
(1)
Shulan Wang
(2)
Stefanos Koffas
(1)
Steven Lambregts
(1)
Stjepan Picek
(2)
Tao Yang
(1)
Thanassis Giannetsos
(2)
Tianyang Chen
(3)
Ting Wang
(1)
Tingting Rao
(1)
Tjard Langhout
(1)
Tran Viet Xuan Phuong
(2)
Tsz Hon Yuen
(1)
Wei Wang
(8)
Wei Wang
(1)
Weiqi Wang
(1)
Weiran Liu
(1)
Weixin Xie
(1)
Weizhe Wang
(1)
Weizhi Meng
(1)
Wenqing Lei
(1)
Wenting Li
(3)
Willy Susilo
(9)
Xi Zheng
(1)
Xianglong Zhang
(2)
Xiao Tan
(1)
Xiaodong Lin
(1)
Xiaolei Dong
(1)
Xiaoyu Wu
(1)
Xingkai Wang
(1)
Xinyi Huang
(1)
Xudong Yang
(1)
Yan Zhu
(1)
Yangguang Tian
(1)
Yanjiang Yang
(1)
Yanqi Qiao
(1)
Yanqi Zhao
(1)
Yanwei Zhou
(1)
Yao Jiang Galteland
(1)
Yi Mu
(1)
Yi Zhao
(1)
Yifan Yang
(1)
Yong Yu
(1)
Yubo Zheng
(1)
Zehong Chen
(1)
Zeshun Shi
(1)
Zeyan Liu
(1)
Zhaojun Lu
(2)
Zhen Liu
(2)
Zhenfu Cao
(2)
Zhenjia Xiao
(1)
Zhu Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to