Pages
- 1
- 2
- document
-
Zhou, Junwei (author), Lei, Botian (author), Lang, Huile (author), Panaousis, Emmanouil (author), Liang, K. (author), Xiang, Jianwen (author)Genotype imputation estimates missing genotypes from the haplotype or genotype reference panel in individual genetic sequences, which boosts the potential of genome-wide association and is essential in genetic data analysis. However, the genetic sequences involve people's privacy, confirming an individual's identification and even disease...journal article 2023
- document
-
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...journal article 2023
- document
-
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...journal article 2022
- document
-
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...conference paper 2022
- document
-
Chen, H. (author), Fu, S. (author), Liang, K. (author)Updatable encryption (UE) enables the cloud server to update the previously sourced encrypted data to a new key with only an update token received from the client. Two interesting works have been proposed to clarify the relationships among various UE security notions. Jiang (ASIACRYPT 2020) proved the equivalence of every security notion in...conference paper 2022
- document
-
Lambregts, Steven (author), Chen, H. (author), Ning, Jianting (author), Liang, K. (author)Searchable Encryption schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access and volume pattern. In most existing SE schemes, these leakages are caused by practical designs but are considered an acceptable price to achieve high search...conference paper 2022
- document
-
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...conference paper 2022
- document
-
Xu, Peng (author), Susilo, Willy (author), Wang, Wei (author), Chen, Tianyang (author), Wu, Qianhong (author), Liang, K. (author), Jin, Hai (author)Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it...journal article 2022
- document
-
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...conference paper 2022
- document
-
Xu, J. (author), Wang, R. (author), Koffas, S. (author), Liang, K. (author), Picek, S. (author)Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to...conference paper 2022
- document
-
Zhao, Yi (author), Liang, K. (author), Zhao, Yanqi (author), Yang, Bo (author), Ming, Yang (author), Panaousis, Emmanouil (author)An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA succeeds when it extracts secrets without being detected. To launch an ASA on signature schemes, existing studies often needed to collect signatures with successive indices to extract the signing key....journal article 2022
- document
-
Ning, Jianting (author), Huang, Xinyi (author), Susilo, Willy (author), Liang, K. (author), Liu, Ximeng (author), Zhang, Yinghui (author)Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service...journal article 2022
- document
-
Lu, Hai (author), Yu, Ruyun (author), Zhu, Yan (author), He, Xiao (author), Liang, K. (author), Chu, William Cheng-Chung (author)Attribute-Based Encryption (ABE) plays an important role in current secure data sharing through fine-grained customizable policies. However, the existing ABE schemes only support simple predicates, = and ≠, but cannot express a more general membership predicates, ∈ and ∉, in policies. The low expressivity of ABE will enlarge the ciphertext...journal article 2022
- document
-
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...conference paper 2022
- document
-
He, Xiaoxi (author), Cheng, Haibo (author), Xie, Jiahong (author), Wang, Ping (author), Liang, K. (author)Passwords have been widely used in online authentication, and they form the front line that protects our data security and privacy. But the security of password may be easily harmed by insecure password generator. Massive reports state that users are always keen to generate new passwords by reusing or fine-tuning old secrets. Once an old...conference paper 2022
- document
-
Tjiam, Kevin (author), Wang, R. (author), Chen, H. (author), Liang, K. (author)Smart contracts on Ethereum enable billions of dollars to be transacted in a decentralized, transparent and trustless environment. However, adversaries lie await in the Dark Forest, waiting to exploit any and all smart contract vulnerabilities in order to extract profits from unsuspecting victims in this new financial system. As the...conference paper 2021
- document
-
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...journal article 2021
- document
-
Liang, K. (author), Spiesz, E.M. (author), Schmieden, D.T. (author), Xu, An Wu (author), Meyer, Anne S. (author), Aubin-Tam, M.E. (author)Graphene oxide (GO) has recently been highlighted as a promising multipurpose two-dimensional material. However, free-standing graphene oxide films suffer from poor strength and flexibility, which limits scaling-up of production and lifetime structural robustness in applications. Inspired by the relationship between the organic and inorganic...journal article 2020
- document
-
Spiesz, E.M. (author), Schmieden, D.T. (author), Grande, Antonio M. (author), Liang, K. (author), Schwiedrzik, Jakob (author), Natalio, Filipe (author), Michler, Johann (author), Garcia, Santiago J. (author), Aubin-Tam, M.E. (author), Meyer, Anne S. (author)The impressive mechanical properties of natural composites, such as nacre, arise from their multiscale hierarchical structures, which span from nano- to macroscale and lead to effective energy dissipation. While some synthetic bioinspired materials have achieved the toughness of natural nacre, current production methods are complex and...journal article 2019
- document
-
Liang, K. (author)Efficient bolted joint design is an essential part of designing the minimum weight aerospace structures, since structural failures usually occur at connections and interface. A comprehensive numerical study of three-dimensional (3D) stress variations is prohibitively expensive for a large-scale structure where hundreds of bolts can be present...journal article 2017
Pages
- 1
- 2