Kaitai Liang

ORCID: 0000-0003-0262-7678
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Complexity and Algorithms in Graphs
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Security and Verification in Computing
  • User Authentication and Security Systems
  • Network Security and Intrusion Detection
  • Advanced Authentication Protocols Security
  • Stochastic Gradient Optimization Techniques
  • Adversarial Robustness in Machine Learning
  • Privacy, Security, and Data Protection
  • Spam and Phishing Detection
  • IoT and Edge/Fog Computing
  • Digital and Cyber Forensics
  • Information and Cyber Security
  • Advanced Steganography and Watermarking Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Coding theory and cryptography
  • Security in Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications

Delft University of Technology
2020-2025

Wuhan University of Technology
2025

University of Wollongong
2023

University of Surrey
2017-2022

State of The Art
2020

Manchester Metropolitan University
2016-2019

Benchmark Research (United States)
2019

National University of Singapore
2018

Aalto University
2014-2016

City University of Hong Kong
2013-2015

To date, the growth of electronic personal data leads to a trend that owners prefer remotely outsource their clouds for enjoyment high-quality retrieval and storage service without worrying burden local management maintenance. However, secure share search outsourced is formidable task, which may easily incur leakage sensitive information. Efficient sharing searching with security critical importance. This paper, first time, proposes searchable attribute-based proxy reencryption system. When...

10.1109/tifs.2015.2442215 article EN IEEE Transactions on Information Forensics and Security 2015-06-05

If all vehicles are connected together through a wireless communication channel, vehicular ad hoc networks (VANETs) can support wide range of real-time traffic information services, such as intelligent routing, weather monitoring, emergency call, etc. However, the accuracy and credibility transmitted messages among VANETs paramount importance life may depend on it. In this article we introduce novel framework called blockchain-assisted privacy-preserving authentication system (BPAS) that...

10.1109/tii.2019.2948053 article EN IEEE Transactions on Industrial Informatics 2019-10-17

Industrial Internet of Things (IIoT) integrates various types intelligent terminals, mobile devices, and communication technologies to enable the upgrade traditional industries industries. IIoT relies on powerful data processing capabilities cloud computing reduce cost on-demand services as per requirements users. However, privacy confidentiality outsourced should be protected in this environment because are typically "handled" by a third-party service provider. An encryption technique can...

10.1109/tii.2017.2771382 article EN IEEE Transactions on Industrial Informatics 2017-11-08

As a sophisticated mechanism for secure finegrained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates cloud computing applications. However, there exist two main long-lasting open problems CP-ABE that may limit its wide deployment in commercial One decryption yields expensive pairing cost which often grows with increase policy size. The other granted privilege unlimited times as long his attribute set satisfies...

10.1109/tifs.2017.2738601 article EN IEEE Transactions on Information Forensics and Security 2017-08-10

Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising technique for secure data sharing in the context of cloud computing. Data owner allowed to fully control access policy associated with his which be shared. However, CP-ABE limited potential security risk that known as key escrow problem, whereby secret keys users have issued by trusted authority. Besides, most existing schemes cannot support attribute arbitrary state. In this paper, we revisit scheme order solve issue...

10.1109/tifs.2016.2549004 article EN IEEE Transactions on Information Forensics and Security 2016-04-06

Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional (PRE) by allowing a semi-trusted proxy to transform cipher text under an access policy one with same plaintext another (i.e. attribute-based re-encryption). The proxy, however, learns nothing about underlying plaintext. CP-ABPRE has many real world applications, such as fine-grained control in cloud storage systems and medical records sharing among different hospitals. Previous schemes leave how be...

10.1109/incos.2013.103 article EN 2013-09-01

Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on shared data provides array benefits to both society individuals. a large number participants must take into account several issues, including efficiency, integrity privacy owner. Ring signature is promising candidate construct anonymous authentic system. It allows owner anonymously authenticate his which can be put for storage or purpose. Yet costly certificate verification in traditional...

10.1109/tc.2014.2315619 article EN IEEE Transactions on Computers 2014-04-03

In this paper, for the first time, we define a general notion proxy re-encryption (PRE), which call deterministic finite automata-based functional PRE (DFA-based FPRE). Meanwhile, propose and concrete DFA-based FPRE system, adapts to our new notion. scheme, message is encrypted in ciphertext associated with an arbitrary length index string, decryptor legitimate if only DFA his/her secret key accepts string. Furthermore, above encryption allowed be transformed another string by semitrusted...

10.1109/tifs.2014.2346023 article EN IEEE Transactions on Information Forensics and Security 2014-08-07

The need of secure big data storage service is more desirable than ever to date. basic requirement the guarantee confidentiality data. However, anonymity clients, one most essential aspects privacy, should be considered simultaneously. Moreover, also provide practical and fine-grained encrypted sharing such that a owner allowed share ciphertext among others under some specified conditions. This paper, for first time, proposes privacy-preserving multi-sharing mechanism achieve above...

10.1109/tifs.2015.2419186 article EN IEEE Transactions on Information Forensics and Security 2015-04-03

The rapid advances of wireless communication technologies along with the popularity mobile devices are enabling users to access various web services anywhere and anytime. Due openness communications, security becomes a vital issue. To provide secure communication, many anonymous authentication protocols in client-server environments based on classical mathematical hard assumptions (i.e., discrete logarithm problem or integer factorization problem) have been presented last two decades....

10.1109/jsyst.2018.2851295 article EN IEEE Systems Journal 2018-07-23

Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted stored on remote server. Researchers have designed number of SE schemes with high efficiency yet allowing some degree leakage profile the The leakage, however, should be further measured allow us understand what types attacks an scheme would encounter. This paper considers passive that make inferences based prior knowledge and observations queries issued by users. is in contrast...

10.1109/tifs.2018.2866321 article EN IEEE Transactions on Information Forensics and Security 2018-08-21

Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data confidentiality. Recently, the attribute-based encryption (ABE) schemes have been regarded as a solution ensure transmission security fine-grained sharing encrypted IoT data. However, most existing ABE that bring tremendous computational cost are not suitable for resource-constrained devices. Therefore, lightweight efficient...

10.1109/tii.2020.3014168 article EN IEEE Transactions on Industrial Informatics 2020-08-04

Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with model trained on poisoned data manipulate prediction behavior in test stage using backdoor. The backdoored models behave normally clean images, yet be activated and output incorrect if the input stamped specific trigger pattern. Most existing backdoor attacks focus manually defining imperceptible triggers space without considering abnormality triggers' latent representations...

10.1109/cvpr52688.2022.01478 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022-06-01

In this article we propose an infrastructure that allows mobile users to securely share and search for their real-time video data. Specifically, the proposed takes advantages of cloud platform 5G technology achieve its goals, where (connected with some external taking device) can friends or families through while any other user no permission cannot get information about video. More importantly, security is guaranteed even if server hacked. addition, our also secure searching within user's...

10.1109/mnet.2015.7064902 article EN IEEE Network 2015-03-01

Secure cloud storage, which is an emerging service, designed to protect the confidentiality of outsourced data but also provide flexible access for users whose out physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) regarded as one most promising techniques that may be leveraged secure guarantee service. However, use CP-ABE yield inevitable security breach known misuse credential (i.e., decryption rights), due intrinsic "all-or-nothing" feature CP-ABE. In this paper, we...

10.1109/tsc.2018.2791538 article EN IEEE Transactions on Services Computing 2018-01-09

In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows sender to send an encrypted message receiver through server. The only needs know the identity of but no other information (such as its public key or certificate). possess two things in order decrypt ciphertext. first thing is his/her secret stored computer. second unique personal device which connects It impossible ciphertext without either piece....

10.1109/tc.2015.2462840 article EN IEEE Transactions on Computers 2015-07-30

Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving unbounded feature. To address this problem, we proposed a fast cross-domain scheme, named FABRIC, which enables delegator authorize semi-trusted server convert one ciphertext of an identity-based encryption (IBE) scheme another attribute-based (ABE) scheme. As first achieve feature mentioned above, FABRIC not only enjoys constant...

10.1109/tdsc.2023.3240820 article EN IEEE Transactions on Dependable and Secure Computing 2023-01-31
Coming Soon ...