default search action
Weiran Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. Proc. ACM Manag. Data 2(1): 30:1-30:27 (2024) - [j15]Zhaozong Wang, Jiangfeng Cheng, Weiran Liu, Xiaofu Zou, Fei Tao:
A fault localization approach based on multi-system PCA and dynamic SDG: Application in train lifting equipment. Robotics Comput. Integr. Manuf. 87: 102694 (2024) - [j14]Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Yuke Hu, Jinfei Liu, Kui Ren, Zhan Qin:
Privacy Enhancement Via Dummy Points in the Shuffle Model. IEEE Trans. Dependable Secur. Comput. 21(3): 1001-1016 (2024) - [j13]Ming Gao, Fu Xiao, Wentao Guo, Zixin Lin, Weiran Liu, Jinsong Han:
Practical EMI Attacks on Smartphones With Users' Commands Cancelled. IEEE Trans. Dependable Secur. Comput. 21(4): 2327-2343 (2024) - [c26]Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu:
Private Set Operations from Multi-query Reverse Private Membership Test. Public Key Cryptography (3) 2024: 387-416 - [c25]Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang:
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval. USENIX Security Symposium 2024 - [i16]Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Long Phan, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Adam Khoja, Zhenqi Zhao, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Liu, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Russell Kaplan, Ian Steneker, David Campbell, Brad Jokubaitis, Alex Levinson, Jean Wang, William Qian, Kallol Krishna Karmakar, Steven Basart, Stephen Fitz, Mindy Levine, Ponnurangam Kumaraguru, Uday Kiran Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks:
The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning. CoRR abs/2403.03218 (2024) - [i15]Shang Liu, Yang Cao, Takao Murakami, Weiran Liu, Seng Pei Liew, Tsubasa Takahashi, Jinfei Liu, Masatoshi Yoshikawa:
Federated Graph Analytics with Differential Privacy. CoRR abs/2405.20576 (2024) - [i14]Xinyu Peng, Feng Han, Li Peng, Weiran Liu, Zheng Yan, Kai Kang, Xinyuan Zhang, Guoxing Wei, Jianling Sun, Jinfei Liu:
MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation. CoRR abs/2408.01246 (2024) - [i13]Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, Yuan Hong:
Efficient Differentially Private Set Intersection. IACR Cryptol. ePrint Arch. 2024: 1239 (2024) - [i12]Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang:
Unbalanced Private Set Union with Reduced Computation and Communication. IACR Cryptol. ePrint Arch. 2024: 1340 (2024) - 2023
- [j12]Kexin Fan, Weiran Liu, Yuchen Miao, Zhen Li, Guozhen Liu:
Engineering Strategies for Advancing Optical Signal Outputs in Smartphone-Enabled Point-of-Care Diagnostics. Adv. Intell. Syst. 5(6) (2023) - [c24]Biswapesh Chattopadhyay, Pedro Pedreira, Sameer Agarwal, Yutian Sun, Suketu Vakharia, Peng Li, Weiran Liu, Sundaram Narayanan:
Shared Foundations: Modernizing Meta's Data Lakehouse. CIDR 2023 - [c23]Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. ICICS 2023: 351-369 - [c22]Ming Gao, Fu Xiao, Weiran Liu, Wentao Guo, Yangtao Huang, Yajie Liu, Jinsong Han:
Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference. INFOCOM 2023: 1-10 - [c21]Qiheng Sun, Xiang Li, Jiayao Zhang, Li Xiong, Weiran Liu, Jinfei Liu, Zhan Qin, Kui Ren:
ShapleyFL: Robust Federated Learning Based on Shapley Value. KDD 2023: 2096-2108 - [c20]Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Linear Private Set Union from Multi-Query Reverse Private Membership Test. USENIX Security Symposium 2023: 337-354 - [i11]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. CoRR abs/2311.16062 (2023) - [i10]Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. IACR Cryptol. ePrint Arch. 2023: 986 (2023) - [i9]Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong:
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage. IACR Cryptol. ePrint Arch. 2023: 1619 (2023) - [i8]Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang:
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval. IACR Cryptol. ePrint Arch. 2023: 1636 (2023) - 2022
- [j11]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. Proc. VLDB Endow. 16(2): 202-215 (2022) - [c19]Weiran Liu, Yong Zhang, Yumei Liu:
Attention-based BiLSTM model for stock price prediction. AIPR 2022: 257-263 - [c18]Yumei Liu, Yong Zhang, Weiran Liu:
A Novel Face Forgery Detection Method Based on Augmented Dual-Stream Networks. AIPR 2022: 331-337 - [c17]Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou:
Strengthening Order Preserving Encryption with Differential Privacy. CCS 2022: 2519-2533 - [c16]Feng Han, Lan Zhang, Hanwen Feng, Weiran Liu, Xiang-Yang Li:
Scape: Scalable Collaborative Analytics System on Private Database with Malicious Security. ICDE 2022: 1740-1753 - [c15]Weiran Liu, Qiyu Ruan, Liang Zhang, Wei Ren:
An Improved Semantic Link Based Cyber Community Discovery Model on Social Network. KSEM (3) 2022: 329-338 - [i7]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. CoRR abs/2210.01318 (2022) - [i6]Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. IACR Cryptol. ePrint Arch. 2022: 358 (2022) - 2021
- [c14]Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren:
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation. ESORICS (2) 2021: 699-720 - 2020
- [j10]Yanting Zhang, Jianwei Liu, Zongyang Zhang, Weiran Liu:
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices. Int. J. Inf. Sec. 19(6): 639-656 (2020) - [i5]Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou:
Intertwining Order Preserving Encryption and Differential Privacy. CoRR abs/2009.05679 (2020) - [i4]Xiaochen Li, Weiran Liu, Ziyi Chen, Kunzhe Huang, Zhan Qin, Lei Zhang, Kui Ren:
DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model. CoRR abs/2009.13738 (2020) - [i3]Yibiao Lu, Bingsheng Zhang, Weiran Liu, Lei Zhang, Kui Ren:
Silent Two-party Computation Assisted by Semi-trusted Hardware. IACR Cryptol. ePrint Arch. 2020: 1259 (2020) - [i2]Ziyuan Liang, Weiran Liu, Fan Zhang, Bingsheng Zhang, Jian Liu, Lei Zhang, Kui Ren:
A Framework of Private Set Intersection Protocols. IACR Cryptol. ePrint Arch. 2020: 1541 (2020)
2010 – 2019
- 2019
- [j9]Biswapesh Chattopadhyay, Priyam Dutta, Weiran Liu, Ott Tinn, Andrew McCormick, Aniket Mokashi, Paul Harvey, Hector Gonzalez, David Lomax, Sagar Mittal, Roee Ebenstein, Nikita Mikhaylin, Hung-Ching Lee, Xiaoyan Zhao, Tony Xu, Luis Perez, Farhad Shahmohammadi, Tran Bui, Neil Mckay, Selcuk Aya, Vera Lychagina, Brett Elliott:
Procella: Unifying serving and analytical data at YouTube. Proc. VLDB Endow. 12(12): 2022-2034 (2019) - 2018
- [j8]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Efficient subtree-based encryption for fuzzy-entity data sharing. Soft Comput. 22(23): 7961-7976 (2018) - 2017
- [j7]Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu:
Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds. Comput. J. 60(12): 1871-1888 (2017) - [j6]Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai:
Energy Efficiency Optimization for Communication of Air-Based Information Network with Guaranteed Timing Constraints. J. Signal Process. Syst. 86(2-3): 299-312 (2017) - [c13]Hanwen Feng, Jianwei Liu, Qianhong Wu, Weiran Liu:
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext. Inscrypt 2017: 278-298 - [c12]Dawei Li, Jie Chen, Jianwei Liu, Qianhong Wu, Weiran Liu:
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption. CSS 2017: 103-118 - [c11]Zhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao:
Provably Secure Self-Extractable Encryption. ProvSec 2017: 3-23 - 2016
- [j5]Qianhong Wu, Yang Sun, Bo Qin, Jiankun Hu, Weiran Liu, Jianwei Liu, Yong Ding:
Batch Public Key Cryptosystem with batch multi-exponentiation. Future Gener. Comput. Syst. 62: 196-204 (2016) - [j4]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yan Li:
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption. Int. J. Inf. Sec. 15(1): 35-50 (2016) - [j3]Jianwei Liu, Weiran Liu, Qianhong Wu, Dawei Li, Shigang Chen:
Survey on key security technologies for space information networks. J. Commun. Inf. Networks 1(1): 72-85 (2016) - [j2]Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng, Bo Qin:
SAKE: scalable authenticated key exchange for mobile e-health networks. Secur. Commun. Networks 9(15): 2754-2765 (2016) - [c10]Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. ACISP (2) 2016: 87-102 - [c9]Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu:
Anonymous Role-Based Access Control on E-Health Records. AsiaCCS 2016: 559-570 - [c8]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605 - [c7]Dawei Li, Jianwei Liu, Weiran Liu:
Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network. SmartCloud 2016: 228-233 - [i1]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing. IACR Cryptol. ePrint Arch. 2016: 634 (2016) - 2015
- [c6]Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai:
Energy Optimization of Air-Based Information Network with Guaranteed Security Protection. CSCloud 2015: 218-223 - [c5]Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu, Jun Zhang, Yan Li:
Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs. HPCC/CSS/ICESS 2015: 336-341 - [c4]Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Jun Zhang:
Optimization for Communication Energy Efficiency of Air-Based Information Network While Satisfying Timing Constraints. HPCC/CSS/ICESS 2015: 553-558 - 2014
- [c3]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin:
Hierarchical Identity-Based Broadcast Encryption. ACISP 2014: 242-257 - [c2]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yunya Zhou:
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS (2) 2014: 91-108 - [c1]Zhuoqi Li, Xinwu Xie, Weixing Chen, Weiran Liu, Ran Li:
On-chip manipulating and impedance spectroscopy sensing of single mouse embryo. NEMS 2014: 220-224 - 2011
- [j1]Biswapesh Chattopadhyay, Liang Lin, Weiran Liu, Sagar Mittal, Prathyusha Aragonda, Vera Lychagina, Younghee Kwon, Michael Wong:
Tenzing A SQL Implementation On The MapReduce Framework. Proc. VLDB Endow. 4(12): 1318-1327 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 01:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint