Follow
Zhe Liu
Title
Cited by
Cited by
Year
On emerging family of elliptic curves to secure internet of things: ECC comes of age
Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou
IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016
1512016
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1214-1226, 2019
1352019
Beyond google play: A large-scale comparative study of chinese android app markets
H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ...
Proceedings of the Internet Measurement Conference 2018, 293-307, 2018
1332018
Security-critical energy-aware task scheduling for heterogeneous real-time MPSoCs in IoT
J Zhou, J Sun, P Cong, Z Liu, X Zhou, T Wei, S Hu
IEEE Transactions on Services Computing 13 (4), 745-758, 2019
1252019
Generative neural networks for anomaly detection in crowded scenes
T Wang, M Qiao, Z Lin, C Li, H Snoussi, Z Liu, C Choi
IEEE Transactions on Information Forensics and Security 14 (5), 1390-1399, 2018
1212018
Efficient Ring-LWE encryption on 8-bit AVR processors
Z Liu, H Seo, S Sinha Roy, J Großschädl, H Kim, I Verbauwhede
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1122015
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
1062020
Securing edge devices in the post-quantum internet of things using lattice-based cryptography
Z Liu, KKR Choo, J Grossschadl
IEEE Communications Magazine 56 (2), 158-162, 2018
1022018
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
Z Liu, J Großschädl, Z Hu, K Järvinen, H Wang, I Verbauwhede
IEEE Transactions on Computers 66 (5), 773-785, 2016
922016
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
902021
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015
742015
On the soundness and security of privacy-preserving SVM for outsourcing data classification
X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang
IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017
712017
MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks
Z Liu, E Wenger, J Großschädl
Applied Cryptography and Network Security: 12th International Conference …, 2014
712014
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
662021
BBARS: Blockchain-based anonymous rewarding scheme for V2G networks
H Wang, Q Wang, D He, Q Li, Z Liu
IEEE Internet of Things Journal 6 (2), 3676-3687, 2019
632019
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
632018
Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
Z Liu, P Longa, GCCF Pereira, O Reparaz, H Seo
IEEE Transactions on Dependable and Secure Computing 17 (3), 536-549, 2018
622018
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue
Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019
592019
Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers
Z Liu, J Großschädl, I Kizhvatov
Workshop on the Security of the Internet of Things-SOCIOT, 2010
552010
SIDH on ARM: faster modular multiplications for faster post-quantum supersingular isogeny key exchange
H Seo, Z Liu, P Longa, Z Hu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-20, 2018
502018
The system can't perform the operation now. Try again later.
Articles 1–20