MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.

Xiaofeng Chen , Jingwei Li , Chunfu Jia , Jin Li
J. Internet Serv. Inf. Secur. 4 25 -36

20
2014
Constant bandwidth ORAM with small block size using PIR operations.

Siu-Ming Yiu , Nairen Cao , Yuechen Chen , Zheli Liu
IACR Cryptology ePrint Archive 2017 590

2017
A Hybrid Learning System to Mitigate Botnet Concept Drift Attacks

Ilsun You , Chunfu Jia , Xiao Zhang , Meiqi Tian
Journal of Internet Technology 18 ( 6) 1419 -1428

2
2017
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.

Joseph K. Liu , Jin Li , Yang Xiang , Zheli Liu
IACR Cryptology ePrint Archive 2017 1105

4
2017
Channel state information-based detection of Sybil attacks in wireless networks

Xiaochun Cheng , Likun Zhu , Zhentang Zhao , Chundong Wang
J. Internet Serv. Inf. Secur. 8 2 -17

6
2018
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free

Grigorios Loukides , Changyu Dong , Jin Li , Zheli Liu
usenix security symposium

1
2021
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things

Jiqiang Liu , Thar Baker , Wenjia Niu , Zheli Liu
IEEE Transactions on Green Communications and Networking 5 ( 2) 645 -657

2021
A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks

Peizhuang Cong , Yuchao Zhang , Zheli Liu , Thar Baker
Computer Networks 192 108057

9
2021
ADA: Adaptive Deep Log Anomaly Detector

Yali Yuan , Sripriya Srikant Adhatarao , Mingkai Lin , Yachao Yuan
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications 2449 -2458

26
2020
New order preserving encryption model for outsourced databases in cloud environments

Zheli Liu , Xiaofeng Chen , Jun Yang , Chunfu Jia
Journal of Network and Computer Applications 59 198 -207

63
2016
Outsourced privacy-preserving classification service over encrypted data

Tong Li , Zhengan Huang , Ping Li , Zheli Liu
Journal of Network and Computer Applications 106 100 -110

22
2018
Multi-authority fine-grained access control with accountability and its application in cloud

Jin Li , Xiaofeng Chen , Sherman S.M. Chow , Qiong Huang
Journal of Network and Computer Applications 112 89 -96

72
2018
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage

Zheli Liu , Jin Li , Xiaofeng Chen , Jun Yang
Information Security and Privacy 115 -130

26
2014
Data Provenance With Retention of Reference Relations

Chundong Wang , Lei Yang , Yijie Wu , Yuduo Wu
IEEE Access 6 77033 -77042

4
2018
ShadowPWD: practical browser-based password manager with a security token

Shuang Liang , Yue Zhang , Bo Li , Xiaojie Guo
Proceedings of the ACM Turing 50th Celebration Conference - China 30

1
2017
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks

Zheli Liu , Dejiang Luo , Jin Li , Xiaofeng Chen
International Journal of Computer Mathematics 93 ( 2) 384 -400

26
2016
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud

Jingwei Li , Jin Li , Xiaofeng Chen , Chunfu Jia
Network and System Security 490 -502

38
2012
Format-Preserving Encryption for Character Data

Min Li , Zheli Liu , Jingwei Li , Chunfu Jia
Journal of Networks 7 ( 8) 1239 -1244

19
2012
An efficient DDoS detection based on SU-Genetic feature selection

Chundong Wang , Honglei Yao , Zheli Liu
Cluster Computing 22 ( 1) 2505 -2515

12
2019
Efficient Identity-based Broadcast Encryption without Random Oracles

Liang Hu , Zheli Liu , Xiaochun Cheng
Journal of Computers 5 ( 3) 331 -336

20
2010