Stop the war!
Остановите войну!
for scientists:
default search action
Willy Susilo
Person information
- affiliation: University of Wollongong, Centre for Computer and Information Security Research, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j395]Meixia Miao, Siqi Zhao, Jiawei Li, Jianghong Wei, Willy Susilo:
Practically secure linear-map vector commitment and its applications. Comput. Stand. Interfaces 91: 103885 (2025) - [j394]Jia-Chng Loh, Fuchun Guo, Willy Susilo:
Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems. Comput. Stand. Interfaces 91: 103886 (2025) - [j393]Yusong Yao, Yiwen Shi, Guohua Tian, Meixia Miao, Willy Susilo:
PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 91: 103892 (2025) - [j392]Jiaming Wen, Willy Susilo, Rupeng Yang, Zuoxia Yu, Huanguo Zhang:
Revocable ring signatures with CCA-anonymity from standard lattices. Comput. Stand. Interfaces 91: 103893 (2025) - [j391]Yanhua Zhang, Willy Susilo, Fuchun Guo:
Lattice-based strong designated verifier signature with non-delegatability. Comput. Stand. Interfaces 92: 103904 (2025) - 2024
- [j390]Jinguang Han, Willy Susilo, Liquan Chen, Jianchang Lai, Ge Wu:
Privacy-Preserving Confidential Reporting System With Designated Reporters. Comput. J. 67(5): 1951-1962 (2024) - [j389]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j388]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput. Stand. Interfaces 87: 103769 (2024) - [j387]Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang:
Post-quantum secure group signature with verifier local revocation and backward unlinkability. Comput. Stand. Interfaces 88: 103782 (2024) - [j386]Tao Li, Peiyao Niu, Yilei Wang, Shengke Zeng, Xiaoying Wang, Willy Susilo:
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE. Comput. Stand. Interfaces 89: 103834 (2024) - [j385]Madhav Mukherjee, Ngoc-Thuy Le, Yang-Wai Chow, Willy Susilo:
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes. Inf. 15(2): 117 (2024) - [j384]Yuan Gao, Liquan Chen, Jinguang Han, Ge Wu, Willy Susilo:
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism. IEEE Internet Things J. 11(1): 777-790 (2024) - [j383]Peiheng Zhang, Min Tang, Willy Susilo, Mingwu Zhang:
Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting. IEEE Internet Things J. 11(5): 8078-8089 (2024) - [j382]Yizhong Liu, Boyu Zhao, Zedan Zhao, Jianwei Liu, Xun Lin, Qianhong Wu, Willy Susilo:
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain. IEEE Internet Things J. 11(15): 25694-25705 (2024) - [j381]Kaifeng Xiao, Xinjian Chen, Hongbo Li, Jianye Huang, Willy Susilo, Qiong Huang:
A fully secure lattice-based signcryption with designated equality test in standard model. Inf. Sci. 658: 120015 (2024) - [j380]Yizhong Liu, Zixiao Jia, Zixu Jiang, Xun Lin, Jianwei Liu, Qianhong Wu, Willy Susilo:
BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. J. Syst. Archit. 152: 103163 (2024) - [j379]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group encryption: Full dynamicity, message filtering and code-based instantiation. Theor. Comput. Sci. 1007: 114678 (2024) - [j378]Chunpeng Ge, Zhe Liu, Willy Susilo, Liming Fang, Hao Wang:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. IEEE Trans. Dependable Secur. Comput. 21(2): 937-948 (2024) - [j377]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [j376]Yizhong Liu, Xinxin Xing, Ziheng Tong, Xun Lin, Jing Chen, Zhenyu Guan, Qianhong Wu, Willy Susilo:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 2603-2618 (2024) - [j375]Jinguang Han, Patrick Schaumont, Willy Susilo:
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing. IEEE Trans. Emerg. Top. Comput. 12(1): 266-268 (2024) - [j374]Jinguang Han, Willy Susilo, Nan Li, Xinyi Huang:
OLBS: Oblivious Location-Based Services. IEEE Trans. Inf. Forensics Secur. 19: 2231-2243 (2024) - [j373]Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. IEEE Trans. Inf. Forensics Secur. 19: 2288-2299 (2024) - [j372]Mei Jiang, Yannan Li, Willy Susilo, Dung Hoang Duong:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 2761-2770 (2024) - [j371]Fucai Luo, Haiyan Wang, Willy Susilo, Xingfu Yan, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. IEEE Trans. Inf. Forensics Secur. 19: 2919-2934 (2024) - [j370]Andi Liu, Yizhong Liu, Qianhong Wu, Boyu Zhao, Dongyu Li, Yuan Lu, Rongxing Lu, Willy Susilo:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. IEEE Trans. Inf. Forensics Secur. 19: 3178-3193 (2024) - [j369]Jiale Zhang, Chengcheng Zhu, Xiaobing Sun, Chunpeng Ge, Bing Chen, Willy Susilo, Shui Yu:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. IEEE Trans. Inf. Forensics Secur. 19: 4752-4766 (2024) - [j368]Mingzhe Zhai, Qianhong Wu, Yizhong Liu, Bo Qin, Xiaopeng Dai, Qiyuan Gao, Willy Susilo:
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 5060-5074 (2024) - [j367]Meiyan Xiao, Qiong Huang, Wenya Chen, Chuan Lyu, Willy Susilo:
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT. IEEE Trans. Inf. Forensics Secur. 19: 6499-6513 (2024) - [j366]Jianghong Wei, Meixia Miao, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - [j365]Zhenhua Chen, Luqi Huang, Guomin Yang, Willy Susilo, Xingbing Fu, Xingxing Jia:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. IEEE Trans. Serv. Comput. 17(3): 789-803 (2024) - [c372]Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Seyit Camtepe:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - [c371]Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Improved Multimodal Private Signatures from Lattices. ACISP (2) 2024: 3-23 - [c370]Luqi Huang, Willy Susilo, Guomin Yang, Fuchun Guo:
Key Cooperative Attribute-Based Encryption. ACISP (1) 2024: 241-260 - [c369]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c368]Jia-Chng Loh, Fuchun Guo, Willy Susilo:
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM. ACISP (1) 2024: 347-367 - [c367]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c366]Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Tuong Ngoc Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, Gang Tang:
On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures. PQCrypto (1) 2024: 227-261 - [c365]Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus. USENIX Security Symposium 2024 - [i94]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i93]Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. IACR Cryptol. ePrint Arch. 2024: 7 (2024) - 2023
- [j364]Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo:
Geometric Searchable Encryption Without False Positive And Its Applications. Comput. J. 66(9): 2155-2168 (2023) - [j363]Shijin Chen, Willy Susilo, Yudi Zhang, Bo Yang, Mingwu Zhang:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j362]Zhen Zhao, Willy Susilo, Fuchun Guo, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j361]Hoonyong Park, TaeGuen Kim, Daniel Gerbi Duguma, Jiyoon Kim, Ilsun You, Willy Susilo:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. Comput. Syst. Sci. Eng. 45(2): 1145-1165 (2023) - [j360]Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow, Anh The Ta:
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference. Future Internet 15(12): 407 (2023) - [j359]Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo:
Secure access privilege delegation using attribute-based encryption. Int. J. Inf. Sec. 22(5): 1261-1276 (2023) - [j358]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j357]Gang Shen, Zhiqiang Fu, Yumin Gui, Willy Susilo, Mingwu Zhang:
Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system. Inf. Sci. 647: 119261 (2023) - [j356]Jinguang Han, Liqun Chen, Willy Susilo, Liquan Chen, Ge Wu:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [j355]Yang-Wai Chow, Willy Susilo, Yannan Li, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [j354]Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j353]Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j352]Jun Shen, Xiaofeng Chen, Jianghong Wei, Fuchun Guo, Willy Susilo:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j351]Zhen Zhao, Willy Susilo, Baocang Wang, Kai Zeng:
Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing. IEEE Trans. Cloud Comput. 11(4): 3396-3406 (2023) - [j350]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A new attack on some RSA variants. Theor. Comput. Sci. 960: 113898 (2023) - [j349]Mingwu Zhang, Yu Chen, Willy Susilo:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3988-4001 (2023) - [j348]Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [j347]Hua Shen, Ge Wu, Zhe Xia, Willy Susilo, Mingwu Zhang:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j346]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
PCSF: Privacy-Preserving Content-Based Spam Filter. IEEE Trans. Inf. Forensics Secur. 18: 2856-2869 (2023) - [j345]Jun Shen, Xiaofeng Chen, Zheli Liu, Willy Susilo:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - [j344]Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j343]Mingwu Zhang, Shijin Chen, Jian Shen, Willy Susilo:
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 18: 5804-5816 (2023) - [j342]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xinyi Huang, Willy Susilo:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [j341]Zhenhua Chen, Jingjing Nie, Li Zhan-Li, Willy Susilo, Chunpeng Ge:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. IEEE Trans. Serv. Comput. 16(4): 2672-2684 (2023) - [j340]Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. IEEE Trans. Serv. Comput. 16(5): 3318-3331 (2023) - [j339]Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge:
Secure Replication-Based Outsourced Computation Using Smart Contracts. IEEE Trans. Serv. Comput. 16(5): 3711-3722 (2023) - [j338]Yudi Zhang, Willy Susilo, Fuchun Guo, Guomin Yang:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. IEEE Trans. Serv. Comput. 16(6): 3920-3930 (2023) - [j337]Hua Shen, Ge Wu, Willy Susilo, Mingwu Zhang:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. IEEE Trans. Serv. Comput. 16(6): 4554-4566 (2023) - [c364]Jia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. ACISP 2023: 199-219 - [c363]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c362]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c361]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c360]Yamin Li, Jianghong Wei, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions. ASIACRYPT (5) 2023: 134-165 - [c359]Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu:
Bicameral and Auditably Private Signatures. ASIACRYPT (2) 2023: 313-347 - [c358]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c357]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c356]Shen Lin, Xiaoyu Zhang, Chenyang Chen, Xiaofeng Chen, Willy Susilo:
ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer. CVPR 2023: 20147-20155 - [c355]Jacob Neil Taylor, Ngoc-Thuy Le, Joonsang Baek, Willy Susilo:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. ICCCN 2023: 1-10 - [c354]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call Off a Signature. ISC 2023: 557-577 - [c353]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c352]Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo:
Threshold Ring Signature Scheme from Cryptographic Group Action. ProvSec 2023: 207-227 - [c351]Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. SP 2023: 1667-1683 - [c350]Thanh Xuan Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - [i92]Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2023: 180 (2023) - [i91]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - [i90]Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu:
Bicameral and Auditably Private Signatures. IACR Cryptol. ePrint Arch. 2023: 1351 (2023) - [i89]Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call off a Signature. IACR Cryptol. ePrint Arch. 2023: 1621 (2023) - 2022
- [j336]Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen, Willy Susilo:
Lattice-based group encryptions with only one trapdoor. Sci. China Inf. Sci. 65(5): 1-18 (2022) - [j335]Parvin Rastegari, Willy Susilo:
On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes. Comput. J. 65(12): 3049-3061 (2022) - [j334]Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Comput. Secur. 112: 102498 (2022) - [j333]Anmin Fu, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. Comput. Secur. 116: 102666 (2022) - [j332]Jongkil Kim, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Intae Kim:
Functional Encryption for Pattern Matching with a Hidden String. Cryptogr. 6(1): 1 (2022) - [j331]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j330]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Junyi Li, Xueqiao Liu:
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Comput. Stand. Interfaces 80: 103570 (2022) - [j329]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Hao Wang, Tong Wu:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - [j328]Hanchao Ku, Willy Susilo, Yudi Zhang, Wenfen Liu, Mingwu Zhang:
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 80: 103583 (2022) - [j327]Haiyan Wang, Yuan Li, Willy Susilo, Dung Hoang Duong, Fucai Luo:
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82: 103635 (2022) - [j326]Meixia Miao, Jianghong Wei, Jiaojiao Wu, Kuan-Ching Li, Willy Susilo:
Verifiable data streaming with efficient update for intelligent automation systems. Int. J. Intell. Syst. 37(2): 1322-1338 (2022) - [j325]Mahdi Fahmideh, John Grundy, Ghassan Beydoun, Didar Zowghi, Willy Susilo, Davoud Mougouei:
A model-driven approach to reengineering processes in cloud computing. Inf. Softw. Technol. 144: 106795 (2022) - [j324]Zhen Zhao, Fuchun Guo, Ge Wu, Willy Susilo, Baocang Wang:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j323]Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j322]Wei Zong, Yang-Wai Chow, Willy Susilo, Jongkil Kim, Ngoc-Thuy Le:
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. J. Imaging 8(12): 324 (2022) - [j321]Willy Susilo, Fuchun Guo, Zhen Zhao, Ge Wu:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1476-1488 (2022) - [j320]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. IEEE Trans. Cloud Comput. 10(4): 2398-2408 (2022) - [j319]Minh Thuy Truc Pham, Ngoc Ai Van Nguyen, Mei Jiang, Dung Hoang Duong, Willy Susilo:
Wildcarded identity-based encryption from lattices. Theor. Comput. Sci. 902: 41-53 (2022) - [j318]