default search action
Qin Liu 0001
Person information
- affiliation: Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
- affiliation (former): Temple University, Department of Computer and Information Sciences, Philadelphia, PA, USA
- affiliation (PhD 2012): Central South University, School of Information Science and Engineering, Changsha, China
Other persons with the same name
- Qin Liu — disambiguation page
- Qin Liu 0002 — Nanjing University, Software Institute, China (and 1 more)
- Qin Liu 0003 — Wuhan University, School of Computing, China
- Qin Liu 0004 — Tongji University at Shanghai, School of Software Engineering, China (and 1 more)
- Qin Liu 0005 — University of Maryland, College Park, MD, USA
- Qin Liu 0006 — Xidian University, State Key Laboratory of Integrated Service Networks, Xian, China
- Qin Liu 0007 — University of Georgia, Complex Systems Control Laboratory, Athens, GA, USA (and 1 more)
- Qin Liu 0008 — University of North Carolina at Chapel Hill, NC, USA
- Qin Liu 0009 — Moqi Inc. (and 2 more)
Other persons with a similar name
- Jian-Qin Liu
- Jian-qin Liu
- Li Qin Liu
- Qin-Xue Liu — Central China Normal University, Wuhan, China
- Qin-Yun Liu
- Qin Yu Liu
- Qinhuo Liu (aka: Qin-Huo Liu)
- Qinming Liu (aka: Qin Ming Liu)
- Xiaoqin Liu (aka: Xiao-qin Liu, Xiao-Qin Liu) — disambiguation page
- Liu Qin
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Wenhua Wang, Yilin Zhang, Qin Liu, Tian Wang, Weijia Jia:
Edge-Intelligence-Based Computation Offloading Technology for Distributed Internet of Unmanned Aerial Vehicles. IEEE Internet Things J. 11(12): 20948-20957 (2024) - [j56]Qin Liu, Yu Peng, Qian Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang, Shaobo Zhang:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. IEEE Trans. Dependable Secur. Comput. 21(4): 1994-2011 (2024) - [j55]Qin Liu, Yu Peng, Ziyi Tang, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases. IEEE Trans. Knowl. Data Eng. 36(5): 2285-2300 (2024) - [j54]Qin Liu, Yu Peng, Mingzuo Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain. IEEE Trans. Knowl. Data Eng. 36(7): 3297-3311 (2024) - [j53]Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing. IEEE Trans. Mob. Comput. 23(5): 4181-4195 (2024) - [j52]Shulan Wang, Qin Liu, Yang Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning. IEEE Trans. Mob. Comput. 23(6): 6522-6537 (2024) - [j51]Yaxin Mei, Wenhua Wang, Yuzhu Liang, Qin Liu, Shuhong Chen, Tian Wang:
Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization. ACM Trans. Sens. Networks 20(4): 84:1-84:19 (2024) - [c50]Yuzhu Liang, Guo Li, Jianxiong Guo, Qin Liu, Xi Zheng, Tian Wang:
Efficient Request Scheduling in Cross-Regional Edge Collaboration via Digital Twin Networks. IWQoS 2024: 1-6 - 2023
- [j50]Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. Future Gener. Comput. Syst. 145: 189-199 (2023) - [j49]Shaobo Zhang, Yuechao Wang, Entao Luo, Qin Liu, Ke Gu, Guojun Wang:
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse. J. Syst. Archit. 140: 102899 (2023) - [j48]Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. IEEE Trans. Dependable Secur. Comput. 20(5): 4359-4371 (2023) - [c49]Yuzhu Liang, Wenhua Wang, Xi Zheng, Qin Liu, Liang Wang, Tian Wang:
Collaborative Edge Service Placement for Maximizing QoS with Distributed Data Cleaning. IWQoS 2023: 1-4 - [c48]Shangrui Wu, Yupeng Li, Yang Xu, Qin Liu, Weijia Jia, Tian Wang:
EKDF: An Ensemble Knowledge Distillation Framework for Robust Collaborative Inference on Heterogeneous Edge Devices. MSN 2023: 191-198 - 2022
- [j47]Qin Liu, Liqiong Chen, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks. Ad Hoc Networks 124: 102727 (2022) - [j46]Xiaoyu Zhu, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo, Fang Qi, Qin Liu, Guojun Wang:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j45]Qin Liu, Guojun Wang, Jiankun Hu, Jie Wu:
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications. Future Gener. Comput. Syst. 133: 169-170 (2022) - [j44]Qin Liu, Yue Tian, Jie Wu, Tao Peng, Guojun Wang:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. IEEE Trans. Serv. Comput. 15(1): 69-82 (2022) - [j43]Qin Liu, Yu Peng, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. IEEE Trans. Serv. Comput. 15(4): 1799-1812 (2022) - [c47]Qin Liu, Jiamin Yang, Hongbo Jiang, Jie Wu, Tao Peng, Tian Wang, Guojun Wang:
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark. INFOCOM 2022: 590-599 - 2021
- [j42]Qiang Zhang, Guojun Wang, Wenjuan Tang, Karim Alinani, Qin Liu, Xin Li:
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176: 81-90 (2021) - [j41]Qin Liu, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, Shaobo Zhang:
SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems. J. Syst. Archit. 120: 102300 (2021) - [j40]Qin Liu, Yu Peng, Jie Wu, Tian Wang, Guojun Wang:
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing. IEEE Trans. Netw. Serv. Manag. 18(2): 2046-2062 (2021) - [c46]Junhai Zhou, Haihan Wu, Yaping Lin, Wei Liang, Qin Liu:
Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of Vehicles. CSCloud/EdgeCom 2021: 194-199 - [c45]Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. TrustCom 2021: 420-427 - [c44]Meirong Liu, Hong Zheng, Qin Liu, Xiaofei Xing, Yinglong Dai:
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. UbiSec 2021: 1-12 - 2020
- [j39]Leilei Du, Kenli Li, Qin Liu, Zhiqiang Wu, Shaobo Zhang:
Dynamic multi-client searchable symmetric encryption with support for boolean queries. Inf. Sci. 506: 234-257 (2020) - [j38]Qin Liu, Md. Zakirul Alam Bhuiyan, Jiankun Hu, Jie Wu:
Preface: Security & privacy in social big data. J. Parallel Distributed Comput. 141: 59-60 (2020) - [j37]Tao Peng, Jierong Liu, Guojun Wang, Qin Liu, Jianer Chen, Jiawei Zhu, Chenxi Huang:
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks. Sci. Program. 2020: 7832875:1-7832875:13 (2020)
2010 – 2019
- 2019
- [j36]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Efficient Authentication of Multi-Dimensional Top-k Queries. IEEE Access 7: 4748-4762 (2019) - [j35]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang, Shuhong Chen:
Multidimensional privacy preservation in location-based services. Future Gener. Comput. Syst. 93: 312-326 (2019) - [j34]Yuezhong Wu, Qin Liu, Changyun Li, Guojun Wang:
A hybrid filtering-based network document recommendation system in cloud storage. Int. J. Comput. Sci. Eng. 20(2): 269-279 (2019) - [j33]Qiang Zhang, Guojun Wang, Qin Liu:
Enabling Cooperative Privacy-preserving Personalized search in cloud environments. Inf. Sci. 480: 1-13 (2019) - [j32]Qin Liu, Panlin Hou, Guojun Wang, Tao Peng, Shaobo Zhang:
Intelligent route planning on large road networks with efficiency and privacy. J. Parallel Distributed Comput. 133: 93-106 (2019) - [j31]Xin Yao, Yizhu Zou, Zhigang Chen, Ming Zhao, Qin Liu:
Topic-based rank search with verifiable social data outsourcing. J. Parallel Distributed Comput. 134: 1-12 (2019) - 2018
- [j30]Xin Yao, Yaping Lin, Qin Liu, Junwei Zhang:
Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud. IEEE Access 6: 3809-3823 (2018) - [j29]Qiang Zhang, Qin Liu, Guojun Wang:
PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data. IEEE Access 6: 31541-31552 (2018) - [j28]Tao Peng, Qin Liu, Baishuang Hu, Jierong Liu, Jiawei Zhu:
Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing. IEEE Access 6: 68948-68960 (2018) - [j27]Marimuthu Karuppiah, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 65: 261-264 (2018) - [j26]Marimuthu Karuppiah, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 70: 1092-1095 (2018) - [j25]Shaobo Zhang, Kim-Kwang Raymond Choo, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. 86: 881-892 (2018) - [j24]Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang:
An Anonymous Offline RFID Grouping-Proof Protocol. Future Internet 10(1): 2 (2018) - [j23]Shaobo Zhang, Guojun Wang, Md. Zakirul Alam Bhuiyan, Qin Liu:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. IEEE Internet Things J. 5(5): 4191-4200 (2018) - [j22]Shaobo Zhang, Guojun Wang, Qin Liu, Jemal H. Abawajy:
A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18): 6121-6133 (2018) - [c43]Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding. CNS 2018: 1-9 - [c42]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server. IWQoS 2018: 1-6 - [c41]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Skyline Query over Road Networks. SpaCCS 2018: 72-83 - [c40]Xinbo Liu, Yaping Lin, Qin Liu, Xin Yao:
A Privacy-Preserving Principal Component Analysis Outsourcing Framework. TrustCom/BigDataSE 2018: 1354-1359 - [c39]Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:
Achieving Secure and Effective Search Services in Cloud Computing. TrustCom/BigDataSE 2018: 1386-1391 - 2017
- [j21]Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:
Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59: 153-164 (2017) - [j20]Shiwen Zhang, Yaping Lin, Qin Liu, Junqiang Jiang, Bo Yin, Kim-Kwang Raymond Choo:
Secure hitch in location based social networks. Comput. Commun. 100: 65-77 (2017) - [j19]Tao Peng, Qin Liu, Guojun Wang:
A Multilevel Access Control Scheme for Data Security in Transparent Computing. Comput. Sci. Eng. 19(1): 46-53 (2017) - [j18]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [j17]Qin Liu, Avinash Srinivasan, Jiankun Hu, Guojun Wang:
Preface: Security and privacy in big data clouds. Future Gener. Comput. Syst. 72: 206-207 (2017) - [j16]Shiwen Zhang, Qin Liu, Yaping Lin:
Anonymizing popularity in online social networks with full utility. Future Gener. Comput. Syst. 72: 227-238 (2017) - [j15]Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
Dynamic access policy in cloud-based personal health record (PHR) systems. Inf. Sci. 379: 62-81 (2017) - [j14]Tao Peng, Qin Liu, Dacheng Meng, Guojun Wang:
Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387: 165-179 (2017) - [j13]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Effective Query Grouping Strategy in Clouds. J. Comput. Sci. Technol. 32(6): 1231-1249 (2017) - [j12]Tao Peng, Qin Liu, Guojun Wang:
Enhanced Location Privacy Preserving Scheme in Location-Based Services. IEEE Syst. J. 11(1): 219-230 (2017) - [j11]Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, Jie Wu:
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Trans. Parallel Distributed Syst. 28(5): 1417-1429 (2017) - [c38]Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu:
DABKS: Dynamic attribute-based keyword search in cloud computing. ICC 2017: 1-6 - [c37]Tao Peng, Qin Liu, Guojun Wang, Jianer Chen:
A Lightweight Privacy Aware Friend Locator in Mobile Social Networks. ISPA/IUCC 2017: 17-23 - [c36]Shaobo Zhang, Guojun Wang, Qin Liu, Xi Wen, Junguo Liao:
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services. ISPA/IUCC 2017: 1004-1010 - [c35]Yunhao Mu, Qin Liu, Junhai Zhou, Kang Xie, Guojun Wang:
Achieving Flow-Oriented Reliable Services in Cloud Computing. ISPA/IUCC 2017: 1011-1017 - [c34]Qiang Zhang, Guojun Wang, Qin Liu, Tao Peng:
Attribute-Based Encryption with Personalized Search. ISPA/IUCC 2017: 1172-1178 - [c33]Qin Liu, Xiaohong Nie, Xuhui Liu, Tao Peng, Jie Wu:
Verifiable Ranked Search over dynamic encrypted data in cloud computing. IWQoS 2017: 1-6 - [c32]Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang:
An ECC-Based Off-line Anonymous Grouping-Proof Protocol. SpaCCS 2017: 186-200 - [c31]Entao Luo, Guojun Wang, Qin Liu:
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks. TrustCom/BigDataSE/ICESS 2017: 58-64 - [c30]Shaobo Zhang, Guojun Wang, Qin Liu:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. TrustCom/BigDataSE/ICESS 2017: 402-408 - 2016
- [j10]Entao Luo, Qin Liu, Guojun Wang:
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks. IEEE Commun. Lett. 20(9): 1772-1775 (2016) - [c29]Xiaohong Nie, Qin Liu, Xuhui Liu, Tao Peng, Yapin Lin:
Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds. ICA3PP 2016: 557-571 - [c28]Xin Yao, Yaping Lin, Qin Liu, Yanchao Zhang:
A secure hierarchical deduplication system in cloud storage. IWQoS 2016: 1-10 - [c27]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang:
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services. SpaCCS 2016: 26-38 - [c26]Shaobo Zhang, Qin Liu, Guojun Wang:
A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services. SpaCCS Workshops 2016: 73-82 - [c25]Qiang Zhang, Qin Liu, Guojun Wang:
A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data. SpaCCS 2016: 265-278 - [c24]Lei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang:
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation. Trustcom/BigDataSE/ISPA 2016: 451-457 - [c23]Shaobo Zhang, Qin Liu, Guojun Wang:
Enhancing Location Privacy through User-Defined Grid in Location-Based Services. Trustcom/BigDataSE/ISPA 2016: 730-736 - [c22]Xiaoyu Zhu, Qin Liu, Guojun Wang:
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing. Trustcom/BigDataSE/ISPA 2016: 845-851 - [e1]Jesús Carretero, Javier García Blas, Victor Gergel, Vladimir V. Voevodin, Iosif B. Meyerov, Juan A. Rico-Gallego, Juan Carlos Díaz Martín, Pedro Alonso, Juan José Durillo, José Daniel García Sánchez, Alexey L. Lastovetsky, Fabrizio Marozzo, Qin Liu, Md. Zakirul Alam Bhuiyan, Karl Fürlinger, Josef Weidendorfer, José Gracia:
Algorithms and Architectures for Parallel Processing - ICA3PP 2016 Collocated Workshops: SCDT, TAPEMS, BigTrust, UCER, DLMCS, Granada, Spain, December 14-16, 2016, Proceedings. Lecture Notes in Computer Science 10049, Springer 2016, ISBN 978-3-319-49955-0 [contents] - 2015
- [c21]Qin Liu, Guojun Wang, Jie Wu, Wei Chang:
User-Controlled Security Mechanism in Data-Centric Clouds. HPCC/CSS/ICESS 2015: 647-653 - [c20]Shaobo Zhang, Qin Liu, Guojun Wang:
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. ICA3PP (3) 2015: 417-428 - [c19]Entao Luo, Qin Liu, Guojun Wang:
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks. ICA3PP (3) 2015: 463-474 - [c18]Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems. ICA3PP (3) 2015: 562-576 - [c17]Xiaoyu Zhu, Qin Liu, Guojun Wang:
Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing. ICA3PP (3) 2015: 655-666 - [c16]Xin Yao, Yaping Lin, Qin Liu, Shuai Long:
Efficient and privacy-preserving search in multi-source personal health record clouds. ISCC 2015: 803-808 - 2014
- [j9]Qin Liu, Guojun Wang, Jie Wu:
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258: 355-370 (2014) - [j8]Qin Liu, Guojun Wang, Jie Wu:
Consistency as a Service: Auditing Cloud Consistency. IEEE Trans. Netw. Serv. Manag. 11(1): 25-35 (2014) - [j7]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Towards Differential Query Services in Cost-Efficient Clouds. IEEE Trans. Parallel Distributed Syst. 25(6): 1648-1658 (2014) - [c15]Guojun Wang, Qin Liu, Yang Xiang, Jianer Chen:
Security from the transparent computing aspect. ICNC 2014: 216-220 - [c14]Wei Zhang, Yaping Lin, Sheng Xiao, Qin Liu, Ting Zhou:
Secure distributed keyword search in multiple clouds. IWQoS 2014: 370-379 - [c13]Shiwen Zhang, Yaping Lin, Qin Liu:
Secure and Efficient Video Surveillance in Cloud Computing. MASS 2014: 222-226 - 2013
- [j6]Guojun Wang, Fengshun Yue, Qin Liu:
A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2): 279-290 (2013) - [j5]Guojun Wang, Qiushuang Du, Wei Zhou, Qin Liu:
A scalable encryption scheme for multi-privileged group communications. J. Supercomput. 64(3): 1075-1091 (2013) - [c12]Tao Peng, Qin Liu, Guojun Wang:
Privacy Preserving for Location-Based Services Using Location Transformation. CSS 2013: 14-28 - [c11]Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. INFOCOM 2013: 2886-2894 - 2012
- [j4]Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3): 927-933 (2012) - [j3]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Cooperative private searching in clouds. J. Parallel Distributed Comput. 72(8): 1019-1031 (2012) - [c10]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Dynamic Grouping Strategy in Cloud Computing. CGC 2012: 59-66 - [c9]Qin Liu, Guojun Wang, Jie Wu:
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds. ICPP Workshops 2012: 304-305 - [c8]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Efficient information retrieval for ranked queries in cost-effective cloud environments. INFOCOM 2012: 2581-2585 - 2011
- [j2]Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5): 320-331 (2011) - [j1]Guojun Wang, Qin Liu, Jie Wu:
Achieving fine-grained access control for secure data sharing on cloud servers. Concurr. Comput. Pract. Exp. 23(12): 1443-1464 (2011) - [c7]Chiu C. Tan, Qin Liu, Jie Wu:
Secure Locking for Untrusted Clouds. IEEE CLOUD 2011: 131-138 - [c6]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Reliable Re-Encryption in Unreliable Clouds. GLOBECOM 2011: 1-5 - 2010
- [c5]Qin Liu, Guojun Wang, Jie Wu:
Efficient Sharing of Secure Cloud Storage Services. CIT 2010: 922-929 - [c4]Guojun Wang, Qin Liu, Jie Wu:
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. CCS 2010: 735-737 - [c3]Qiushuang Du, Guojun Wang, Qin Liu:
A Scalable Encryption Scheme for Multi-Privileged Group Communications. EUC 2010: 597-602 - [c2]Fengshun Yue, Guojun Wang, Qin Liu:
A Secure Self-Destructing Scheme for Electronic Data. EUC 2010: 651-658
2000 – 2009
- 2009
- [c1]Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. CSE (2) 2009: 715-720
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint