Shi-Feng Sun

ORCID: 0000-0003-3742-5275
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Complexity and Algorithms in Graphs
  • Cloud Data Security Solutions
  • Cryptographic Implementations and Security
  • Blockchain Technology Applications and Security
  • Hydrological Forecasting Using AI
  • Internet Traffic Analysis and Secure E-voting
  • Coding theory and cryptography
  • Security and Verification in Computing
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Residue Arithmetic
  • Hydrology and Watershed Management Studies
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Load and Power Forecasting
  • Water Quality Monitoring Technologies
  • Advanced Authentication Protocols Security
  • Network Packet Processing and Optimization
  • Mobile Ad Hoc Networks
  • Machine Learning and ELM
  • UAV Applications and Optimization
  • Spam and Phishing Detection
  • Biometric Identification and Security

Shanghai Jiao Tong University
2015-2025

North China University of Water Resources and Electric Power
2023-2024

Monash University
2017-2023

Data61
2018-2020

Commonwealth Scientific and Industrial Research Organisation
2018-2020

The University of Melbourne
2017

State Key Laboratory of Networking and Switching Technology
2010

Beijing University of Posts and Telecommunications
2009-2010

Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported dynamic SSE schemes. Unfortunately, these update operations leak some information of updated To address this issue, forward-secure is actively explored protect the relations newly previously searched keywords. On contrary, little work been done backward security, which enforces that search should not...

10.1145/3243734.3243782 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) with support for conjunctive keyword search a single-writer single-reader framework. While the OXT offers high performance by adopting number of specialised data-structures, it also trades-off security leaking 'partial' database information to server. Recent attacks have exploited similar partial leakage breach confidentiality....

10.1145/3243734.3243753 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that previous search queries cannot be associated with future updates, while backward guarantees subsequent deleted documents in the past.In this work, we propose a generic and backward-private DSSE scheme, which is, to best of our knowledge, first practical non-interactive Type-II scheme not relying on trusted execution environments.To end, introduce new cryptographic primitive, named Revocable (SRE), modular...

10.14722/ndss.2021.24162 article EN 2021-01-01

Abstract The accurate prediction of monthly runoff in the lower reaches Yellow River is crucial for rational utilization regional water resources, optimal allocation, and flood prevention. This study proposes a VMD-SSA-BiLSTM coupled model volume prediction, which combines advantages Variational Modal Decomposition (VMD) signal decomposition preprocessing, Sparrow Search Algorithm (SSA) BiLSTM parameter optimization, Bi-directional Long Short-Term Memory Neural Network (BiLSTM) exploiting...

10.1038/s41598-023-39606-4 article EN cc-by Scientific Reports 2023-08-12

The immutability of blockchain is crucial to the security many applications, while it still desired or even legally obliged allow for redacting contents some scenarios. In this work, we revisit conflict between and redaction blockchain, put forward a new fine-grained redactable with semi-trusted regulator, who follows our protocol but has tendency abuse his power. To best knowledge, first that not only supports supervision content, also allows users themselves manage their own data. end,...

10.1145/3433210.3453091 article EN 2021-05-24

10.1109/tkde.2025.3543168 article EN IEEE Transactions on Knowledge and Data Engineering 2025-01-01

Searchable Encryption (SE) enables a data owner to outsource encrypted an untrusted server while preserving the keyword search functionality. Typically, learns whether or not query has been performed more than once, which is usually called pattern. However, such kind of information leakage might be leveraged break privacy. To further reduce type and provide strong privacy guarantee, Wang <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et...

10.1109/tsc.2020.2973139 article EN IEEE Transactions on Services Computing 2020-02-11

In this article, we introduce a new mechanism for constructing multi-client searchable encryption (SE). By tactfully leveraging the RSA-function, propose first SE protocol that successfully avoids per-query interaction between data owner and client. Therefore, our approach significantly reduces communication cost by eliminating need to authorize client queries at all times. To be compatible with RSA-based approach, also present deterministic memory-efficient &#x2018;keyword prime&#x2019;...

10.1109/tdsc.2020.2973633 article EN IEEE Transactions on Dependable and Secure Computing 2020-02-13

Due to its capabilities of searches and updates over the encrypted database, dynamic searchable symmetric encryption (DSSE) has received considerable attention recently. To resist leakage abuse attacks, a secure DSSE scheme usually requires forward backward privacy. However, existing private schemes either only support single keyword queries or require more interactions between client server. In this article, we first give new function for range queries, which is complicated than one...

10.1109/tdsc.2020.2994377 article EN IEEE Transactions on Dependable and Secure Computing 2020-05-13

Encrypted multi-map (EMM), as a special case of structured encryption, has attracted extensive attention recently. However, most EMM constructions reveal the real volumes queried keys, which can be leveraged to launch leakage-abuse attacks, demonstrated by Kellaris et al. in CCS 2016 and Kornaropoulos S&P 2021.

10.1145/3548606.3559345 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

E-medical records are sensitive and should be stored in a medical database encrypted form. However, simply encrypting these will eliminate data utility interoperability of the existing system because no longer searchable. Moreover, multiple authorities could involved controlling sharing private clients. authorizing different clients to search access originating from secure scalable manner is nontrivial matter. To address above issues, we propose an authorized searchable encryption scheme...

10.1109/tetc.2019.2905572 article EN IEEE Transactions on Emerging Topics in Computing 2019-03-18

In this paper, we propose GraphSE\textsuperscript2, an encrypted graph database for online social network services to address massive data breaches. GraphSE\textsuperscript2 ~preserves the functionality of search, a key enabler quality services, where search queries are conducted on large-scale and meanwhile perform set computational operations user-generated contents. To enable efficient privacy-preserving ~provides structural model facilitate parallel access. It is also designed decompose...

10.1145/3321705.3329803 preprint EN 2019-07-02

Abstract To improve the accuracy of runoff forecasting, a combined forecasting model is established by using kernel extreme learning machine (KELM) algorithm optimised butterfly optimisation (BOA), with variational modal decomposition method (VMD) and complementary ensemble empirical (CEEMD), for measured daily sequences at Jiehetan Huayuankou stations Gaochun Lijin stations. The results show that VMD-CEEMD-BOA-KELM predicts best. average absolute errors are 30.02, 23.72, 25.75, 29.37, root...

10.1038/s41598-023-46682-z article EN cc-by Scientific Reports 2023-11-07

This article presents two dynamic symmetric searchable encryption schemes for geometric range search. Our constructions are the first to provide forward/backward security in context of SSE-based supporting Besides, we define a notion called content privacy. captures leakages that critical search but not considered by security. Content privacy eliminates leakage on updated points database during both and update. Due inherent associated with queries, none existing related works can support...

10.1109/tdsc.2020.2982389 article EN IEEE Transactions on Dependable and Secure Computing 2020-03-24

Data deduplication is of vital importance for mobile cloud computing to cope with the explosive growth outsourced data. In order ensure privacy sensitive data against an untrusted cloud, Message-Locked Encryption (MLE) has been proposed enable over ciphertext. However, MLE prohibits access control since it uses deterministic content-derived encryption keys. Recently, a lightweight rekeying-aware encrypted system (REED) achieve dynamic secure deduplication. REED vulnerable key-retaining...

10.1109/tmc.2023.3263901 article EN IEEE Transactions on Mobile Computing 2023-04-03
Coming Soon ...