Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chang Liu 0001
@article{DBLP:journals/tdsc/LiuZHC21, author = {Chang Liu and Liehuang Zhu and Xiangjian He and Jinjun Chen}, title = {Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {192--204}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2880981}, doi = {10.1109/TDSC.2018.2880981}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/AlhamazaniRJMLR19, author = {Khalid Alhamazani and Rajiv Ranjan and Prem Prakash Jayaraman and Karan Mitra and Chang Liu and Fethi A. Rabhi and Dimitrios Georgakopoulos and Lizhe Wang}, title = {Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {7}, number = {1}, pages = {48--61}, year = {2019}, url = {https://doi.org/10.1109/TCC.2015.2441715}, doi = {10.1109/TCC.2015.2441715}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/AlhamazaniRJMLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/au/Liu17a, author = {Chang Liu}, title = {Searchable symmetric encryption: attacks, constructions, and extensions}, school = {University of Technology Sydney, Australia}, year = {2017}, url = {https://hdl.handle.net/10453/123193}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/au/Liu17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuZC17, author = {Chang Liu and Liehuang Zhu and Jinjun Chen}, title = {Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud}, journal = {J. Netw. Comput. Appl.}, volume = {86}, pages = {3--14}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.09.010}, doi = {10.1016/J.JNCA.2016.09.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/LiuZC17, author = {Chang Liu and Liehuang Zhu and Jinjun Chen}, title = {Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {2}, number = {4}, pages = {371--381}, year = {2017}, url = {https://doi.org/10.1109/TSUSC.2017.2704163}, doi = {10.1109/TSUSC.2017.2704163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/LiuZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/FazioCRLCV16, author = {Maria Fazio and Antonio Celesti and Rajiv Ranjan and Chang Liu and Lydia Y. Chen and Massimo Villari}, title = {Open Issues in Scheduling Microservices in the Cloud}, journal = {{IEEE} Cloud Comput.}, volume = {3}, number = {5}, pages = {81--88}, year = {2016}, url = {https://doi.org/10.1109/MCC.2016.112}, doi = {10.1109/MCC.2016.112}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/FazioCRLCV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PereraLRWZ16, author = {Charith Perera and Chang Liu and Rajiv Ranjan and Lizhe Wang and Albert Y. Zomaya}, title = {Privacy-Knowledge Modeling for the Internet of Things: {A} Look Back}, journal = {Computer}, volume = {49}, number = {12}, pages = {60--68}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.366}, doi = {10.1109/MC.2016.366}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/PereraLRWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiuBYZC16, author = {Chang Liu and Nick Beaugeard and Chi Yang and Xuyun Zhang and Jinjun Chen}, title = {{HKE-BC:} hierarchical key exchange for secure scheduling and auditing of big data in cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {3}, pages = {646--660}, year = {2016}, url = {https://doi.org/10.1002/cpe.3426}, doi = {10.1002/CPE.3426}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiuBYZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PereraLRWZ16, author = {Charith Perera and Chang Liu and Rajiv Ranjan and Lizhe Wang and Albert Y. Zomaya}, title = {Privacy Knowledge Modelling for Internet of Things: {A} Look Back}, journal = {CoRR}, volume = {abs/1606.08480}, year = {2016}, url = {http://arxiv.org/abs/1606.08480}, eprinttype = {arXiv}, eprint = {1606.08480}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/PereraLRWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuYZC15, author = {Chang Liu and Chi Yang and Xuyun Zhang and Jinjun Chen}, title = {External integrity verification for outsourced big data in cloud and IoT: {A} big picture}, journal = {Future Gener. Comput. Syst.}, volume = {49}, pages = {58--67}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.08.007}, doi = {10.1016/J.FUTURE.2014.08.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuYZC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/LinDZL15, author = {Wenmin Lin and Wan{-}Chun Dou and Zuojian Zhou and Chang Liu}, title = {A cloud-based framework for Home-diagnosis service over big medical data}, journal = {J. Syst. Softw.}, volume = {102}, pages = {192--206}, year = {2015}, url = {https://doi.org/10.1016/j.jss.2014.05.068}, doi = {10.1016/J.JSS.2014.05.068}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/LinDZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ZhangDPNYLC15, author = {Xuyun Zhang and Wan{-}Chun Dou and Jian Pei and Surya Nepal and Chi Yang and Chang Liu and Jinjun Chen}, title = {Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {8}, pages = {2293--2307}, year = {2015}, url = {https://doi.org/10.1109/TC.2014.2360516}, doi = {10.1109/TC.2014.2360516}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ZhangDPNYLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiuRYZWC15, author = {Chang Liu and Rajiv Ranjan and Chi Yang and Xuyun Zhang and Lizhe Wang and Jinjun Chen}, title = {MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {9}, pages = {2609--2622}, year = {2015}, url = {https://doi.org/10.1109/TC.2014.2375190}, doi = {10.1109/TC.2014.2375190}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiuRYZWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YangLZNC15, author = {Chi Yang and Chang Liu and Xuyun Zhang and Surya Nepal and Jinjun Chen}, title = {A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {26}, number = {2}, pages = {329--339}, year = {2015}, url = {https://doi.org/10.1109/TPDS.2013.2295810}, doi = {10.1109/TPDS.2013.2295810}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/YangLZNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZC15, author = {Chang Liu and Liehuang Zhu and Jinjun Chen}, title = {Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {451--458}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.406}, doi = {10.1109/TRUSTCOM.2015.406}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/sp/LiuRZYC15, author = {Chang Liu and Rajiv Ranjan and Xuyun Zhang and Chi Yang and Jinjun Chen}, editor = {Samee U. Khan and Albert Y. Zomaya}, title = {A Big Picture of Integrity Verification of Big Data in Cloud Computing}, booktitle = {Handbook on Data Centers}, pages = {631--645}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-1-4939-2092-1\_21}, doi = {10.1007/978-1-4939-2092-1\_21}, timestamp = {Sat, 30 Sep 2023 10:30:29 +0200}, biburl = {https://dblp.org/rec/reference/sp/LiuRZYC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlhamazaniRJMLR15, author = {Khalid Alhamazani and Rajiv Ranjan and Prem Prakash Jayaraman and Karan Mitra and Chang Liu and Fethi A. Rabhi and Dimitrios Georgakopoulos and Lizhe Wang}, title = {Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework}, journal = {CoRR}, volume = {abs/1502.00206}, year = {2015}, url = {http://arxiv.org/abs/1502.00206}, eprinttype = {arXiv}, eprint = {1502.00206}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/AlhamazaniRJMLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZC15, author = {Chang Liu and Liehuang Zhu and Jinjun Chen}, title = {Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2015}, url = {http://eprint.iacr.org/2015/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiuZWT14, author = {Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu{-}an Tan}, title = {Search pattern leakage in searchable encryption: Attacks and new construction}, journal = {Inf. Sci.}, volume = {265}, pages = {176--188}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.11.021}, doi = {10.1016/J.INS.2013.11.021}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiuZWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ZhangLNYDC14, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {5}, pages = {1008--1020}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2014.02.007}, doi = {10.1016/J.JCSS.2014.02.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ZhangLNYDC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/YangZZLPRC14, author = {Chi Yang and Xuyun Zhang and Changmin Zhong and Chang Liu and Jian Pei and Kotagiri Ramamohanarao and Jinjun Chen}, title = {A spatiotemporal compression based approach for efficient big data processing on Cloud}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {8}, pages = {1563--1583}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2014.04.022}, doi = {10.1016/J.JCSS.2014.04.022}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/YangZZLPRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhangYLC14, author = {Xuyun Zhang and Laurence T. Yang and Chang Liu and Jinjun Chen}, title = {A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {2}, pages = {363--373}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.48}, doi = {10.1109/TPDS.2013.48}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ZhangYLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiuCYZYRR14, author = {Chang Liu and Jinjun Chen and Laurence T. Yang and Xuyun Zhang and Chi Yang and Rajiv Ranjan and Kotagiri Ramamohanarao}, title = {Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {9}, pages = {2234--2244}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.191}, doi = {10.1109/TPDS.2013.191}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LiuCYZYRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuRYZWC14, author = {Chang Liu and Rajiv Ranjan and Chi Yang and Xuyun Zhang and Lizhe Wang and Jinjun Chen}, title = {MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2014}, url = {http://eprint.iacr.org/2014/391}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuRYZWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhangLNYDC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud}, journal = {Concurr. Comput. Pract. Exp.}, volume = {25}, number = {18}, pages = {2561--2576}, year = {2013}, url = {https://doi.org/10.1002/cpe.3083}, doi = {10.1002/CPE.3083}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ZhangLNYDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuZYC13, author = {Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen}, title = {{CCBKE} - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {29}, number = {5}, pages = {1300--1308}, year = {2013}, url = {https://doi.org/10.1016/j.future.2012.07.001}, doi = {10.1016/J.FUTURE.2012.07.001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuZYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ZhangLNC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Jinjun Chen}, title = {An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud}, journal = {J. Comput. Syst. Sci.}, volume = {79}, number = {5}, pages = {542--555}, year = {2013}, url = {https://doi.org/10.1016/j.jcss.2012.11.008}, doi = {10.1016/J.JCSS.2012.11.008}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ZhangLNC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhangLNPC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Suraj Pandey and Jinjun Chen}, title = {A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {6}, pages = {1192--1202}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2012.238}, doi = {10.1109/TPDS.2012.238}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ZhangLNPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/ZhangYNLDC13, author = {Xuyun Zhang and Chi Yang and Surya Nepal and Chang Liu and Wanchun Dou and Jinjun Chen}, title = {A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud}, booktitle = {2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30 - October 2, 2013}, pages = {105--112}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CGC.2013.24}, doi = {10.1109/CGC.2013.24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgc/ZhangYNLDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/JohannesBLRC13, author = {Adrian Johannes and Nazanin Borhan and Chang Liu and Rajiv Ranjan and Jinjun Chen}, title = {A User Demand Uncertainty Based Approach for Cloud Resource Management}, booktitle = {16th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia}, pages = {566--571}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSE.2013.90}, doi = {10.1109/CSE.2013.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/JohannesBLRC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/YangLZNC13, author = {Chi Yang and Chang Liu and Xuyun Zhang and Surya Nepal and Jinjun Chen}, title = {Querying Streaming {XML} Big Data with Multiple Filters on Cloud}, booktitle = {16th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia}, pages = {1121--1127}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSE.2013.163}, doi = {10.1109/CSE.2013.163}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cse/YangLZNC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/LiuRZYGC13, author = {Chang Liu and Rajiv Ranjan and Xuyun Zhang and Chi Yang and Dimitrios Georgakopoulos and Jinjun Chen}, title = {Public Auditing for Big Data Storage in Cloud Computing - {A} Survey}, booktitle = {16th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia}, pages = {1128--1135}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSE.2013.164}, doi = {10.1109/CSE.2013.164}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/LiuRZYGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZLYRGC13, author = {Chang Liu and Xuyun Zhang and Chengfei Liu and Yun Yang and Rajiv Ranjan and Dimitrios Georgakopoulos and Jinjun Chen}, title = {An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.65}, doi = {10.1109/TRUSTCOM.2013.65}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZLYRGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLNYDC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {501--508}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.235}, doi = {10.1109/TRUSTCOM.2013.235}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLNYDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZWT13, author = {Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu{-}an Tan}, title = {Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2013}, url = {http://eprint.iacr.org/2013/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/ZhangYZLC12, author = {Gaofeng Zhang and Yun Yang and Xuyun Zhang and Chang Liu and Jinjun Chen}, editor = {Jianxun Liu and Jinjun Chen and Guandong Xu}, title = {Key Research Issues for Privacy Protection and Preservation in Cloud Computing}, booktitle = {2012 Second International Conference on Cloud and Green Computing, {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012}, pages = {47--54}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CGC.2012.47}, doi = {10.1109/CGC.2012.47}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgc/ZhangYZLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/ZhangLNDC12, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Wanchun Dou and Jinjun Chen}, editor = {Jianxun Liu and Jinjun Chen and Guandong Xu}, title = {Privacy-Preserving Layer over MapReduce on Cloud}, booktitle = {2012 Second International Conference on Cloud and Green Computing, {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012}, pages = {304--310}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CGC.2012.43}, doi = {10.1109/CGC.2012.43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgc/ZhangLNDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpca/YangRL12, author = {Zhimin Yang and Kaijun Ren and Chang Liu}, editor = {Qiaohong Zu and Bo Hu and Atilla El{\c{c}}i}, title = {Efficient Data Collection with Spatial Clustering in Time Constraint {WSN} Applications}, booktitle = {Pervasive Computing and the Networked World - Joint International Conference, {ICPCA/SWS} 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7719}, pages = {728--742}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37015-1\_64}, doi = {10.1007/978-3-642-37015-1\_64}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpca/YangRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/ZhangZYLC12, author = {Gaofeng Zhang and Xuyun Zhang and Yun Yang and Chang Liu and Jinjun Chen}, editor = {Chengfei Liu and Heiko Ludwig and Farouk Toumani and Qi Yu}, title = {An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing}, booktitle = {Service-Oriented Computing - 10th International Conference, {ICSOC} 2012, Shanghai, China, November 12-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7636}, pages = {639--647}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34321-6\_50}, doi = {10.1007/978-3-642-34321-6\_50}, timestamp = {Mon, 26 Jun 2023 20:44:14 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/ZhangZYLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZYC12, author = {Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen}, title = {{CCBKE} - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2012}, url = {http://eprint.iacr.org/2012/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/LiuZLT11, author = {Chang Liu and Liehuang Zhu and Longyijia Li and Yu{-}an Tan}, title = {Fuzzy keyword search on encrypted cloud storage data with small index}, booktitle = {2011 {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2011, Beijing, China, September 15-17, 2011}, pages = {269--273}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CCIS.2011.6045073}, doi = {10.1109/CCIS.2011.6045073}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/LiuZLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/YangRYGL11, author = {Chi Yang and Kaijun Ren and Zhimin Yang and Peng Gong and Chang Liu}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Peter G. Kropf and Michel Pouly and Jianming Yong and Yunjiao Xue and Milton Pires Ramos}, title = {A CSMA-based approach for detecting composite data aggregate events with collaborative sensors in {WSN}}, booktitle = {Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2011, June 8-10, 2011, Lausanne, Switzerland}, pages = {489--496}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CSCWD.2011.5960117}, doi = {10.1109/CSCWD.2011.5960117}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/YangRYGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/LiuZCY11, author = {Chang Liu and Xuyun Zhang and Jinjun Chen and Chi Yang}, title = {An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing}, booktitle = {{IEEE} Ninth International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia}, pages = {372--379}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DASC.2011.79}, doi = {10.1109/DASC.2011.79}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/LiuZCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ZhangLCD11, author = {Xuyun Zhang and Chang Liu and Jinjun Chen and Wanchun Dou}, title = {An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud}, booktitle = {{IEEE} Ninth International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia}, pages = {518--525}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DASC.2011.98}, doi = {10.1109/DASC.2011.98}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/ZhangLCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/YangQLYW10, author = {Zhimin Yang and Lixiang Qiao and Chang Liu and Chi Yang and Guangming Wan}, editor = {Weiming Shen and Ning Gu and Tun Lu and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo}, title = {A collaborative trust model of firewall-through based on Cloud Computing}, booktitle = {Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2010, April 14-16, 2010, Fudan University, Shanghai, China}, pages = {329--334}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CSCWD.2010.5471954}, doi = {10.1109/CSCWD.2010.5471954}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/YangQLYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.