Zhe Liu

ORCID: 0000-0003-1313-8327
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Biometric Identification and Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Spam and Phishing Detection
  • Digital and Cyber Forensics
  • Particle accelerators and beam dynamics
  • Advanced Software Engineering Methodologies
  • Machine Learning in Healthcare
  • Adversarial Robustness in Machine Learning
  • Magnetic confinement fusion research
  • Interactive and Immersive Displays
  • Advanced Authentication Protocols Security
  • Network Security and Intrusion Detection
  • Digital and Traditional Archives Management
  • Advanced Decision-Making Techniques
  • Low-power high-performance VLSI design
  • Handwritten Text Recognition Techniques
  • Mobile and Web Applications
  • Modular Robots and Swarm Intelligence
  • Environmental Engineering and Cultural Studies
  • Multi-Agent Systems and Negotiation

Beijing Institute of Technology
2011-2025

Zhejiang Lab
2023-2024

Menlo School
2024

Nanjing University of Aeronautics and Astronautics
2017-2023

Ministry of Transport
2022

State Key Laboratory of Cryptology
2020

University of Luxembourg
2016-2018

University of Science and Technology of China
2017-2018

Southwestern Institute of Physics
2018

National University of Defense Technology
2017

The emergence of cloud infrastructure has significantly reduced the costs hardware and software resources in computing infrastructure. To ensure security, data is usually encrypted before it's outsourced to cloud. Unlike searching sharing plain data, it challenging search share after encryption. Nevertheless, a critical task for service provider as users expect conduct quick return result without losing confidentiality. overcome these problems, we propose ciphertext-policy attribute-based...

10.1109/tdsc.2020.2963978 article EN IEEE Transactions on Dependable and Secure Computing 2020-01-01

Cloud computing enables enterprises and individuals to outsource share their data. This way, cloud eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due ability achieve one-to-many sharing. Revocation is critical requirement systems. After outsourcing attribute-based ciphertext cloud, owner may want revoke some recipients that were authorized previously, which means...

10.1109/tdsc.2021.3065999 article EN IEEE Transactions on Dependable and Secure Computing 2021-03-17

Outsourcing the heavy decryption computation to a cloud service provider has been promising solution for resource-constrained mobile device deploy an attribute-based encryption scheme. However, current attribute based with outsourced schemes only enable verify whether returned correct result, they lack mechanism escape from device's wrong claim if it result. This article, first time, proposes reliable scheme using blockchain smart contract. In proposed scheme, not can but also result is...

10.1109/tdsc.2023.3265932 article EN IEEE Transactions on Dependable and Secure Computing 2023-04-10

Cloud computing, which provides adequate storage and computation capability, has been a prevalent information infrastructure. Secure data sharing is basic demand when was outsourced to cloud server. Attribute-based proxy re-encryption promising approach that allows secure encrypted on clouds. With attribute-based re-encryption, delegator can designate set of shared users through issuing key will be used by the server transform delegator's users'. However, existing schemes lack mechanism...

10.1109/tdsc.2023.3265979 article EN IEEE Transactions on Dependable and Secure Computing 2023-04-11

The application of the Internet Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration vulnerabilities hijack devices, control services, steal data, or make devices operate illegally. These restrictions have led huge security risks for IoT, and challenged management critical infrastructure services. Based on these problems, this article proposes an anomaly detection system detecting illegal behavior (DIB) IoT...

10.1109/tii.2020.3011444 article EN IEEE Transactions on Industrial Informatics 2020-07-23

Mobile payment system has been expected to provide more efficient and convenient methods. However, compared traditional payments, mobile issues related the security of electronic accounts apps present serious challenges. In this paper, we find potential risks by analyzing commonly used tokenized method put forward corresponding off-site attack strategy. scenario, attackers are not only limited malicious third parties but also can be illegal merchants. To address attack, especially who may...

10.1109/tdsc.2021.3102099 article EN IEEE Transactions on Dependable and Secure Computing 2021-08-04

The development of deep learning techniques has significantly increased the ability computers to recognize CAPTCHA (Completely Automated Public Turing test tell Computers and Humans Apart), thus breaking or mitigating security existing captcha schemes. To protect against these attacks, recent works have been proposed leverage adversarial machine perturb pictures. However, they either require prior knowledge solving models lack adaptivity evolving behaviors attackers. Most importantly, none...

10.1145/3372297.3417258 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

To support robust plan execution of autonomous robots in dynamic environments, robot software should include adaptive and reactive capabilities to cope with the dynamics uncertainties evolving states real-world environments. However, conventional architectures such as sense-model-plan-act behaviour-based paradigms are inadequate for meeting requirements. A lack sensing during acting paradigm makes slow react run-time contingencies, whereas typically fall short planning long-range steps...

10.1177/1729881417716088 article EN cc-by International Journal of Advanced Robotic Systems 2017-07-01

Today's blockchain systems store detailed runtime information in the format of transactions and blocks, which are valuable not only to understand finance blockchain-based ecosystems but also audit security on-chain applications. However, exploring this “big data” is challenging due data heterogeneity huge amount. Existing exploration techniques either incomplete or inefficient, making them inapt time-sensitive This paper presents <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tc.2023.3248280 article EN IEEE Transactions on Computers 2023-02-23

Recent research has shown that language models have a tendency to memorize rare or unique token sequences in the training corpus. After deploying model, practitioners might be asked delete any personal information from model by individuals' requests. Re-training underlying every time individuals would like make these requests is computationally expensive. We employ teacher-student framework and propose novel leave-one-out ensemble method unlearn targeted textual model. In our approach,...

10.1109/icassp48485.2024.10446299 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

The Internet of Things (IoT) is a new manifestation data science. To ensure the credibility about IoT devices, authentication has gradually become an important research topic in ecosystem. However, traditional graphical passwords and text can cause user’s serious memory burdens. Therefore, convenient method for determining user identity needed. In this article, we propose handwriting recognition scheme named HandiText based on behavior biometrics features. When people write word by hand,...

10.1145/3385189 article EN ACM/IMS Transactions on Data Science 2020-07-07

10.1016/j.compeleceng.2017.05.006 article EN Computers & Electrical Engineering 2017-05-16

Emotion analysis of online customer service conservation is important for good user experience and satisfaction. However, conventional metrics do not fit this application scenario. In work, by collecting labeling conversations on Twitter, we identify 8 new metrics, named as tones, to describe emotional information. To better interpret each tone, extend the Latent Dirichlet Allocation (LDA) model Tone LDA (T-LDA). T-LDA, latent topic explicitly associated with one three semantic categories,...

10.1145/3132847.3132864 article EN 2017-11-06

In this article, Electron Cyclotron Resonance (ECR) absorption, Upper-Hybrid (UHR) absorption and Bernstein Wave (EBW) conversion are systematically confirmed in magnetically confined KT-5D plasma which is sole-excited by a magnetron source. A 2.45 GHz ECR system has been developed on the toroidal helimak to produce sustain steady-state plasma. 0.98 kW electron cyclotron wave produced injected into vacuum chamber through rectangular waveguides with power efficiency of 40∼50%. excited density...

10.1063/1.5045096 article EN cc-by AIP Advances 2018-09-01

Clos networks provide theoretically optimal solution to build high-radix switches. Dynamically reconfiguring a three-stage network is more difficult in asynchronous circuits than synchronous circuits. This study proposes novel dispatching (AD) algorithm for general networks. It compared with the classic concurrent round-robin (CRRD) unbuffered The AD avoids contention central modules using state feedback scheme and outperforms throughput of CRRD behavioural simulations. Two are implemented...

10.1049/iet-cdt.2010.0150 article EN IET Computers & Digital Techniques 2011-11-04

The decision and execution of autonomous robot behaviors highly depend on constant perceiving the situated environment, in order to respond various changes.Existing control architectures for software generally follow a sequential sense-model-plan-act (SMPA) architecture, which sensing activity only interacts with modelling that triggers planning acting activity.However, dynamic world, changes environment not influence robot's behavior decisions but also affects their plan execution.The...

10.18178/wcse.2017.06.209 article EN Proceedings of 2016 the 6th International Workshop on Computer Science and Engineering 2017-01-01

Purpose This paper aims to facilitate the research and development of resilient navigation approaches, explore robustness adversarial training different interferences promote their practical applications in real complex environments. Design/methodology/approach In this paper, authors first summarize accidents self-driving cars develop a set methods simulate challenging scenarios by introducing simulated disturbances attacks into input sensor data. Then robust transferable approach is...

10.1108/ria-08-2023-0109 article EN Robotic Intelligence and Automation 2024-06-04

The development of Large Language Models (LLMs) has significantly advanced various AI applications in commercial and scientific research fields, such as literature summarization, writing assistance, knowledge graph construction. However, a significant challenge is the high risk hallucination during LLM inference, which can lead to security concerns like factual inaccuracies, inconsistent information, fabricated content. To tackle this issue, it essential develop effective methods for...

10.48550/arxiv.2410.12130 preprint EN arXiv (Cornell University) 2024-10-15
Coming Soon ...