Revocable identity-based broadcast proxy re-encryption for data sharing in clouds C Ge, Z Liu, J Xia, L Fang IEEE transactions on dependable and secure computing 18 (3), 1214-1226, 2019 | 189 | 2019 |
On emerging family of elliptic curves to secure internet of things: ECC comes of age Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016 | 167 | 2016 |
Secure keyword search and data sharing mechanism for cloud computing C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020 | 151 | 2020 |
Generative neural networks for anomaly detection in crowded scenes T Wang, M Qiao, Z Lin, C Li, H Snoussi, Z Liu, C Choi IEEE Transactions on Information Forensics and Security 14 (5), 1390-1399, 2018 | 149 | 2018 |
Security-critical energy-aware task scheduling for heterogeneous real-time MPSoCs in IoT J Zhou, J Sun, P Cong, Z Liu, X Zhou, T Wei, S Hu IEEE Transactions on Services Computing 13 (4), 745-758, 2019 | 148 | 2019 |
Revocable attribute-based encryption with data integrity in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021 | 147 | 2021 |
Efficient Ring-LWE encryption on 8-bit AVR processors Z Liu, H Seo, S Sinha Roy, J Großschädl, H Kim, I Verbauwhede Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 130 | 2015 |
Securing edge devices in the post-quantum internet of things using lattice-based cryptography Z Liu, KKR Choo, J Grossschadl IEEE Communications Magazine 56 (2), 158-162, 2018 | 126 | 2018 |
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021 | 116 | 2021 |
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things Z Liu, J Großschädl, Z Hu, K Järvinen, H Wang, I Verbauwhede IEEE Transactions on Computers 66 (5), 773-785, 2016 | 104 | 2016 |
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019 | 84 | 2019 |
BBARS: Blockchain-based anonymous rewarding scheme for V2G networks H Wang, Q Wang, D He, Q Li, Z Liu IEEE Internet of Things Journal 6 (2), 3676-3687, 2019 | 83 | 2019 |
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes Z Liu, H Seo, J Großschädl, H Kim IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015 | 82 | 2015 |
On the soundness and security of privacy-preserving SVM for outsourcing data classification X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017 | 79 | 2017 |
SecureNLP: A system for multi-party privacy-preserving natural language processing Q Feng, D He, Z Liu, H Wang, KKR Choo IEEE Transactions on Information Forensics and Security 15, 3709-3721, 2020 | 78 | 2020 |
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints L Zhou, KH Yeh, G Hancke, Z Liu, C Su IEEE Signal Processing Magazine 35 (5), 76-87, 2018 | 76 | 2018 |
A critical review on the evaluation of automated program repair systems K Liu, L Li, A Koyuncu, D Kim, Z Liu, J Klein, TF Bissyandé Journal of Systems and Software 171, 110817, 2021 | 73 | 2021 |
MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks Z Liu, E Wenger, J Großschädl Applied Cryptography and Network Security: 12th International Conference …, 2014 | 72 | 2014 |
HF-TPE: High-fidelity thumbnail-preserving encryption Y Zhang, R Zhao, X Xiao, R Lan, Z Liu, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 32 (3), 947-961, 2021 | 67 | 2021 |
IoT-NUMS: evaluating NUMS elliptic curve cryptography for IoT platforms Z Liu, H Seo IEEE Transactions on Information Forensics and Security 14 (3), 720-729, 2018 | 64 | 2018 |