Dongxi Liu

ORCID: 0000-0002-0221-2571
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Complexity and Algorithms in Graphs
  • Cryptographic Implementations and Security
  • Fluid Dynamics Simulations and Interactions
  • Spacecraft and Cryogenic Technologies
  • Network Security and Intrusion Detection
  • Advanced Authentication Protocols Security
  • Access Control and Trust
  • Cavitation Phenomena in Pumps
  • Geothermal Energy Systems and Applications
  • User Authentication and Security Systems
  • Service-Oriented Architecture and Web Services
  • Semantic Web and Ontologies
  • Chaos-based Image/Signal Encryption
  • Hydraulic and Pneumatic Systems
  • Advanced Database Systems and Queries
  • Water Systems and Optimization
  • Advanced Software Engineering Methodologies
  • Advanced Steganography and Watermarking Techniques

Commonwealth Scientific and Industrial Research Organisation
2015-2024

Shanghai Maritime University
2018-2024

Data61
2015-2024

PetroChina Southwest Oil and Gas Field Company (China)
2022-2024

Oil and Gas Center
2022-2024

Guangxi University
2023-2024

Tianjin University
2022-2024

Australian Government
2023-2024

South China Sea Institute Of Oceanology
2022

Institute of Oceanology
2022

Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and dependent on internet everyday living. increasing dependency also widened risks malicious threats. On account growing cybersecurity risks, most pivotal element in cyber to battle against threats, attacks, frauds. expanding cyberspace highly exposed intensifying possibility being attacked by interminable objective this survey bestow a brief review different machine learning (ML)...

10.3390/en13102509 article EN cc-by Energies 2020-05-15

The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation software-defined networks (SDN) network function virtualization (NFV) in edge-cloud interplay. Deep learning (DL) becoming popular due its remarkable accuracy when trained a massive amount data, generated by IoT. However, DL algorithms tend leak privacy on...

10.1109/jiot.2019.2952146 article EN IEEE Internet of Things Journal 2019-11-07

Industrial Internet of Things (IIoT) is revolutionizing many leading industries such as energy, agriculture, mining, transportation, and healthcare. IIoT a major driving force for Industry 4.0, which heavily utilizes machine learning (ML) to capitalize on the massive interconnection large volumes data. However, ML models that are trained sensitive data tend leak privacy adversarial attacks, limiting its full potential in 4.0. This article introduces framework named PriModChain enforces...

10.1109/tii.2020.2974555 article EN IEEE Transactions on Industrial Informatics 2020-02-17

The metamodel techniques and model transformation provide a standard way to represent transform data, especially the software artifacts in development. However, after is applied, source target usually co-exist evolve independently. How propagate modifications across models different formats still remains as an open problem.

10.1145/1321631.1321657 article EN 2007-11-05

The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) with support for conjunctive keyword search a single-writer single-reader framework. While the OXT offers high performance by adopting number of specialised data-structures, it also trades-off security leaking 'partial' database information to server. Recent attacks have exploited similar partial leakage breach confidentiality....

10.1145/3243734.3243753 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

The Internet of Things (IoT) provides transparent and seamless incorporation heterogeneous different end systems. It has been widely used in many applications including smart cities such as public water system, power grid, management, vehicle traffic control system. In these city applications, a large number IoT devices are deployed that can sense, communicate, compute, potentially actuate. uninterrupted accurate functioning critical to crucial decisions will be made based on the data...

10.1109/tsusc.2017.2716953 article EN IEEE Transactions on Sustainable Computing 2017-06-19

Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount financial transactions. Nevertheless, achieving privacy blockchain-based remains challenging blockchain by default a public ledger. For instance, Bitcoin provides builtin pseudonymity rather than true anonymity, which can be compromised analyzing Several solutions have been proposed enhance of Bitcoin. Unfortunately, full anonymity always desirable, because malicious are...

10.1109/mnet.2019.1800271 article EN IEEE Network 2019-02-15

The present-day world has become all dependent on cyberspace for every aspect of daily living. use is rising with each passing day. spending more time the Internet than ever before. As a result, risks cyber threats and cybercrimes are increasing. term `cyber threat' referred to as illegal activity performed using Internet. Cybercriminals changing their techniques pass through wall protection. Conventional not capable detecting zero-day attacks sophisticated attacks. Thus far, heaps machine...

10.1109/iccws48432.2020.9292388 article EN 2020-10-20

Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection in cryptocurrency Thus, user accountability (or traceability) is also important transactions, which unfortunately lacking current literature. In this paper, we fill gap by introducing new named Traceable to balance accountability. Our framework relies on tracing authority, but optimistic, that it only involved when investigations certain...

10.1109/tdsc.2019.2910058 article EN IEEE Transactions on Dependable and Secure Computing 2020-04-16

The proliferation of Internet Things (IoT) devices has made people's lives more convenient, but it also raised many security concerns. Due to the difficulty obtaining and emulating IoT firmware, in absence internal execution information, black-box fuzzing become a viable option. However, existing fuzzers cannot form effective mutation optimization mechanisms guide their testing processes, mainly due lack feedback. In addition, because prevalent use various non-standard communication message...

10.1145/3460120.3484543 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia industry in recent years. However, most the existing IoT infrastructures are centralized, which may cause issues unscalability single-point-of-failure. Consequently, decentralized been proposed by taking advantage emerging technology called blockchain. Voting systems widely adopted IoT, for example a leader election wireless sensor networks. Self-tallying voting alternatives to...

10.1109/tdsc.2020.2979856 article EN IEEE Transactions on Dependable and Secure Computing 2020-03-10

The rising demand for portable near-infrared (NIR) light sources has accelerated the exploration of NIR luminescent materials with high efficiency and excellent thermal stability. Inspired by structural-modulated ion substitution strategy, herein, a high-performance Cs2KIn0.8Al0.1F6:0.1Cr3+ phosphor peak at 794 nm full width half-maximum (fwhm) 117 was successfully synthesized introducing Al3+ ions. performance is reflected in its internal quantum (IQE) 88.06% good quenching resistance...

10.1021/acs.jpclett.3c00089 article EN The Journal of Physical Chemistry Letters 2023-02-02

It is attractive for an organization to outsource its data analytics a service provider who has powerful platforms and advanced skills. However, the (data owner) may have concerns about privacy of data. In this paper, we present method that allows owner encrypt with homomorphic encryption scheme perform k-means clustering directly over encrypted since ciphertexts resulting from do not preserve order distances between objects cluster centers, propose approach enables compare trapdoor...

10.1145/2590296.2590332 article EN 2014-05-30

We introduce MatRiCT, an efficient RingCT protocol for blockchain confidential transactions, whose security is based on "post-quantum'' (module) lattice assumptions. The proof length of the around two orders magnitude shorter than existing post-quantum proposal, and scales efficiently to large anonymity sets, unlike proposal. Further, we provide first full implementation a RingCT, demonstrating practicality our scheme. In particular, typical transaction can be generated in fraction second...

10.1145/3319535.3354200 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Abstract The realization of dual‐wavelength Mn 2+ upconversion (UC) luminescence that exhibits different thermal responsive behaviors is promising for non‐invasive optical temperature sensing applications. However, it remains challenging to achieve such ions. Herein, due the site preference characteristics , color tunable and UC achieved in K 2 NaScF 6 :Yb 3+ by simply adjusting doping concentration. Structural spectral analysis as well theoretical calculations reveal green red emissions...

10.1002/adom.202302819 article EN Advanced Optical Materials 2024-01-16

The database services on cloud are appearing as an attractive way of outsourcing databases. When a is deployed service, the data security and privacy becomes big concern for users. A straightforward to address this encrypt database. However, encrypted cannot be easily queried. In paper, we propose order-preserving scheme indexing data, which facilitates range queries over secure since it randomizes each index with noises, such that original recovered from indexes. Moreover, our allows...

10.1109/cloud.2012.65 article EN 2012-06-01

SUMMARY The database services on cloud are appearing as an attractive way of outsourcing databases. When a is deployed service, the data security and privacy becomes big concern for users. A straightforward to address this encrypt database. However, after encryption, cannot be easily queried. In paper, we propose nonlinear order preserving scheme indexing encrypted data, which facilitates range queries over secure even there large number duplicates in plaintexts. Moreover, our allows...

10.1002/cpe.2992 article EN Concurrency and Computation Practice and Experience 2013-01-25

Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Such techniques, however, usually incur heavy computational and communication cost on participating parties thus entities with limited resources may to refrain from in PPDM process. To address this issue, one promising solution is outsource tasks cloud environment. In paper, we propose a novel efficient outsourced distributed clustering (PPODC) multiple users based k-means algorithm. The...

10.1109/cic.2015.20 preprint EN 2015-10-01

The personalized Web service recommendation based on Quality of Service (QoS) is gaining increasing popularity due to its promising ability help users find high quality services. Studies suggest that it beneficial use Collaborative Filtering (CF)-based techniques facilitate recommendations which can achieve accuracy in predicting the QoS for unobserved With QoS, location and services has been another significant factor values. more factors are available providers, accurate predictions be...

10.1109/tsc.2018.2839587 article EN IEEE Transactions on Services Computing 2018-05-22

Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to memory can induce bit flips neighboring locations. Being vulnerability, rowhammer bypasses all of the system protection, allowing adversaries compromise integrity and confidentiality data. attacks have shown enable privilege escalation, sandbox escape, cryptographic key disclosures.Recently, several proposals suggest exploiting spatial proximity between accessed location flip for defense against rowhammer. These...

10.1109/micro50266.2020.00016 article EN 2020-10-01
Coming Soon ...