Publications


Book/Book Chapters:

  • "Security and Privacy in Mobile Social Networks," X. Liang, R. Lu, X. Lin, and X. Shen, Springer Briefs in Computer Science, 2013. ACM Computing Review
  • "Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks," K. Zhang, X. Liang, R. Lu, and X. Shen, Handbook on Opportunistic Mobile Social Networks, CRC Press, Taylo & Francis Group, USA, 2013.

Journal

  1. [TDSC] "Securely Connecting Wearables to Ambient Displays with User Intent", X. Liang, R. Peterson, and D. Kotz, IEEE Transactions on Dependable and Secure Computing, 2018, to appear.
  2. [SmartHealth] "Privacy-preserving Voice-based Search over mHealth Data", M. Hadian, T. Altuwaiyan, X. Liang, and W. Li, Smart Health Journal, 2018, to appear.
  3. [TDSC] "Exploiting social network to enhance human-to-human infection analysis without privacy leakage", K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 607-620 2018.
  4. [CommMag] "Security and Privacy in Smart City Applications: Challenges and Solutions", K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen, IEEE Communications Magazine, vol. 55, no. 1, pp. 122-129, 2017.
  5. [IoT] "SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud", M. Li, N. Ruan, Q. Qian, H. Zhu, X. Liang, and L. Yu, IEEE Internet of Things Journal, vol. 4, no. 2, pp. 583-591, 2017.
  6. [IoT] "Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era", A. Sherif, K. Rabieh, M. Mahmoud, and X. Liang, IEEE Internet of Things Journal, vol. 4, no. 2, pp. 611-618, 2017.
  7. [TIFS] "Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation", Y. Zhang, C. Xu, X. Liang, H. Li, Y. Mu, X. Zhang, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 676-688, 2017.
  8. [TDSC] "Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense", H. Li, H. Zhu, S. Du, X. Liang, and X. Shen, IEEE Transactions on Dependable and Secure Computing, 2016.
  9. [Sensors] "Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees", H. Ren, H. Li, X. Liang, S. He, Y. Dai, and L. Zhao, MDPI Sensors, vol. 16, no. 9, 2016.
  10. [CC] "Cryptographic Public Verification of Data Integrity for Cloud Storage Systems", Y. Zhang, C. Xu, H. Li, X. Liang, IEEE Cloud Computing, vol. 3, no. 5, pp. 44-52, 2016.
  11. [TDSC] "Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data", H. Li, Y. Yang, T. Luan, X. Liang, L. Zhou, and X. Shen, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312-325, 2016.
  12. [TCSS] "PIF: A Personalized Fine-grained Spam Filtering Scheme with Privacy Preservation in Mobile Social Network", K. Zhang, X. Liang, R. Lu, and X. Shen, IEEE Transactions on Computational Social Systems, vol.2, no.3, pp.41-52, 2015.
  13. [WirelessMag] "Security and Privacy for Mobile Healthcare Networks from Quality-of-Protection Perspective", K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. Luo, IEEE Wireless Communications, vol. 22, no. 4, pp.104-112, 2015.
  14. [IS] "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs", K. Zhang, X. Liang, M. Barua, R. Lu, and X. Shen, Information Sciences, Elsevier, vol. 284, pp. 130-141, 2014.
  15. [IoT] "Sybil Attacks and Their Defenses in the Internet of Things," K. Zhang, X. Liang, R. Lu, and X. Shen, IEEE Internet of Things Journal, vol.1, no.5, pp.372-383, 2014.
  16. [CommMag] "Exploiting Multimedia Services in Mobile Social Network from Security and Privacy Perspectives", K. Zhang, X. Liang, R. Lu, and X. Shen, IEEE Communications Magazine, vol.52, no.3, pp.58-65, Mar. 2014.
  17. [WirelessMag] "Security and Privacy in Mobile Social Network: Challenges and Solutions," X. Liang, X. Lin, K. Zhang, and X. Shen, IEEE Wireless Communications, vol. 21, no. 1, pp. 33-41, 2014.
  18. [IoT] "CPAL: A Conditional Privacy-Preserving Authentication with Access Linkability for Roaming Service," C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, IEEE Internet of Things Journal, vol. 1, no. 1, pp. 46-57, 2014.
  19. [TPDS] "EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid," H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053-2064, 2014.
  20. [TBHI] "Exploiting Geo-Distributed Clouds for E-Health Monitoring System with Minimum Service Delay and Privacy Preservation," Q. Shen, X. Liang, X. Shen, X. Lin, and H. Luo, IEEE Transactions on Biomedical and Health Informatics, vol. 18, no. 2, pp. 430-439, 2014.
  21. [TPDS] "Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks," X. Liang, X. Lin, and X. Shen, IEEE Transactions on Parallel and Distributed Systems, vol. 2, no. 5, pp. 310-320, 2014.
  22. [SCN] "SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing,"  M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, Security and Communication Networks, vol. 7, no. 1, pp. 234-244, 2014.
  23. [JSAC] "Fully Anonymous Profile Matching in Mobile Social Networks," X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, and X. Shen, IEEE Journal on Selected Areas of Communications, vol. 31, no. 9, pp. 641-655, 2013.
  24. [Sensor] "EPS: An Efficient and Privacy-Preserving Service Searching Scheme for Smart Community," X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, IEEE Sensor Journal, vol. 13, no. 10, pp. 3702-3710, 2013.
  25. [SCN] "CIT: A Credit-based Incentive Tariff Scheme with Fraud-traceability for Smart Grid," M. Wen, K. Zhang, J. Lei, X. Liang, R. Deng, and X. Shen, Security and Communication Networks, Nov. 2013..
  26. [TETC] "PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid," M. Wen. R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 178-191, 2013.
  27. [MONET] "RCare: Extending Secure Health Care to Rural Area Using VANETs," M. Barua, X. Liang, R. Lu, and X. Shen, ACM Mobile Networks and Applications, vol. 19, no. 3, pp. 318-330, 2013.
  28. [TSG] "UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid," X. Liang, X. Li, R. Lu, X. Lin and X. Shen, IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 141-150, 2013.
  29. [WirelessMag] "Enable Pervasive Healthcare through Continuous Remote Health Monitoring," X. Liang, X. Li, M. Barua, L. Chen, R. Lu, X. Shen, and H. Y. Luo, IEEE Wireless Communications, vol. 19, no. 6, pp. 10-18, 2012.
  30. [CommMag] "Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges," X. Li, X. Liang, R. Lu, X. Lin, H. Zhu, and X. Shen, IEEE Communications Magazine, vol. 50, no. 8, pp. 38-45, 2012.
  31. [TVT] "Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks," X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen, IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3209-3221, 2012.
  32. [TPDS] "EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications," R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621-1631, 2012.
  33. [ComCom] "HealthShare: Achieving Secure and Privacy-preserving Health Information Sharing through Health Social Networks," X. Liang, M. Barua, R. Lu, X. Lin, and X. Shen, Computer Communications, vol. 35, no. 15, pp. 1910-1920, 2012.
  34. [TVT] "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs," R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen, IEEE Transactions on Vehicular Technology, vol. 61, no. 1, pp. 86-96, 2012.
  35. [IJSN] "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing," M. Barua, X. Liang, R. Lu, and X. Shen, International Journal of Security and Networks, vol. 6, no. 2/3, pp. 67-76, 2011.
  36. [MONET] "A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network," R. Lu, X. Lin, X. Liang, and X. Shen, ACM Mobile Networks and Applications, vol. 16, no. 6, pp. 683-694, 2011.
  37. [SCN] "An Efficient and Provably Secure Public Key Encryption Scheme based on Coding Theory," R. Lu, X. Lin, X. Liang, and X. Shen, Security and Communication Networks, vol. 4, no. 12, pp. 1440-1447, 2011.
  38. [E-Letter]"Privacy-preserving Wireless Data Transmission for e-Healthcare Applications," X. Liang, M. Barua, R. Lu, and X. Shen, IEEE COMSOC MMTC E-Letter, vol. 6, no. 11, pp. 39-41, 2011.
  39. [TITS] "A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs," R. Lu, X. Lin, X. Liang, and X. Shen, IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 1, pp. 127-139, 2012.
  40. [CommMag] "Smart Community: an Internet of Things Application," X. Li, R. Lu, X. Liang, J. Chen, X. Lin, and X. Shen, IEEE Communications Magazine, vol. 49, no. 11, pp. 68-75, 2011.
  41. [CommMag] "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications," R. Lu, X. Li, X. Liang, X. Lin, and X. Shen, IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, 2011.
  42. [JCN] "PEC: A Privacy-preserving Emergency Call Scheme for Mobile Healthcare Social Networks," X. Liang, R. Lu, L. Chen, X. Lin, and X. Shen, IEEE Journal of Communications and Networks. vol. 13, no. 2, pp. 102-112, 2011.
  43. [TPDS] "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks,"R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, 2010.
  44. [IS] "Secure threshold multi authority attribute based encryption without a central authority," H. Lin, Z. Cao, X. Liang, J. Shao, Information Sciences, vol. 180, no. 13, pp. 2618-2632, 2010.
  45. [IS] "Proxy re-encryption with keyword search," J. Shao, Z. Cao, X. Liang, H. Lin, Information Sciences, vol. 180, no. 13, pp. 2576-2587, 2010.
  46. [CSI] "Efficient and Secure Protocol in Fair Document Exchange," X. Liang, Z. Cao, R. Lu, and L. Qin, Computer Standards & Interfaces, vol. 30, no. 3, pp. 167-176, 2008.
  47. [IS] "New (t, n) Threshold Directed Signature Scheme with Provable Security," R. Lu, X. Lin, Z. Cao, J. Shao, and X. Liang, Information Sciences, vol. 178, no. 3, 2008, pp. 756-765.

Conference

  1. "WiLock: Exploiting Wireless Signals for Device-free Continuous Authentication," M. Hadian, T. Altuwaiyan, H. Wang, and X. Liang, IEEE GLOBECOM 2018.
  2. "Efficient and Privacy-preserving Roadmap Data Update for Autonomous Vehicles," H. Wang, M. Hadian, and X. Liang, IEEE GLOBECOM 2018.
  3. "WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment," Y. Meng, Z. Wang, W. Zhang, P. Wu, H. Zhu, X. Liang, and Yao Liu, MobiHoc 2018. (Accepting ratio 16.9%)
  4. "EPIC: Efficient Privacy-preserving Contact Tracing for Infection Detection," T. Altuwaiyan, M. Hadian, X. Liang, and W. Li, IEEE ICC 2018.
  5. "Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks," H. Zheng, M. Xue, H. Lu, S. Hao, H. Zhu, X. Liang, and K. Ross, NDSS - Network and DistributedSystem Security Symposium 2018. (Acceptance ratio 20%)
  6. "Re-DPoctor: Real-time health data releasing with w-day differential privacy," J. Zhang, X. Liang, Z. Zhang, S. He, Z. Shi, IEEE GLOBECOM 2017.
  7. "Privacy-preserving Time-sharing Services for Autonomous Vehicles," M. Hadian, T. Altuwaiyan, and X. Liang, VTC-Fall - IEEE 86th Vehicular Technology Conference 2017
  8. "SPICE: Secure Proximity-based Infrastructure for Close Encounters," A. Prasad, X. Liang, and D. Kotz, CrowdSenSys - ACM Workshop on Mobile Crowdsensing Systems and Applications 2017.
  9. "AuthoRing: Wearable User-presence Authentication," X. Liang and D. Kotz, WearSys - ACM Workshop on Wearable Systems and Applications 2017.
  10. "Efficient and Privacy-Preserving Voice-Based Search over mHealth Data," M. Hadian, T. Altuwaiyan, X. Liang, and W. Li, MedSPT - The International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems 2017.
  11. "LightTouch: Securely Connecting Wearables to Ambient Displays with User Intent," X. Liang, T. Yun, R. Peterson, and D. Kotz, INFOCOM - IEEE International Conference on Computer Communications 2017.
  12. "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals," M. Li, Y. Meng, J. Liu, H. Zhu, X. Liang, Y. Liu, and N. Ruan, ACM CCS 2016. (Acceptance ratio 16.5%)
  13. "Privacy-preserving mHealth Data Release with Pattern Consistency," M. Hadian, X. Liang, T. Altuwaiyan, and M. Mahmoud, IEEE GLOBECOM 2016.
  14. "Towards Efficient Privacypreserving Truth Discovery in Crowd Sensing Systems," G. Xu, H. Li, D. Liu, H. Ren, Y. Dai, and X. Liang, IEEE GLOBECOM 2016.
  15. "Towards Efficient and Privacy-preserving Location-based Comment Sharing," Thamer Altuwaiyan, X. Liang, M. Hadian, IEEE ICCC 2016.
  16. "Wanda: securely introducing mobile devices", T. Pierson, X. Liang, R. Peterson, and D. Kotz, Proc. IEEE INFOCOM 2016. (Acceptance ratio 18.25%)
  17. "Exploiting Mobile Social Behaviors for Sybil Detection", K. Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, Proc. IEEE INFOCOM 2015. (Acceptance ratio 19%)
  18. "Securely Connecting Wearable Health Devices to External Displays," X. Liang, and D. Kotz, USENIX Summit on Health Information Technologies, August, 2014.
  19. "RECCE: A Reliable and Efficient Cloud Cooperation Scheme in E-healthcare", Q. Shen, X. Liang, X. Shen, X. Lin, and H. Luo, Proc. IEEE GLOBECOM, 2013.
  20. "ECQ: An Efficient Conjunctive Query Scheme over Encrypted Multidimensional Data in Smart Grid", M. Wen, R. Lu, J. Lei, X. Liang, H. Li and X. Shen, Proc. IEEE GLOBECOM, 2013.
  21. "PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid", K. Zhang, R. Lu, X. Liang, J. Qiao, and X. Shen, Proc. IEEE ICCC, 2013.
  22. "SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks", K. Zhang, X. Liang, R. Lu, and X. Shen, Proc. IEEE ICC, 2013.
  23. "SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks," X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, ICDCS 2012. (Acceptance ratio 13%)
  24. "Enabling Pervasive Healthcare with Privacy Preservation in Smart Community," X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, ICC 2012.
  25. "Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks," X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, INFOCOM 2012. (Acceptance ratio 17.97%)
  26. "PReFilter: A Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks," R. Lu, X. Lin, H. Luan, X. Liang, X. Li, L. Chen, and X. Shen, INFOCOM 2012. (Acceptance ratio 17.97%)
  27. "VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs," K. Zhang, X. Liang, R. Lu, X. Shen, and H. Zhao, GLOBECOM 2012.
  28. "EDR: An Efficient Demand Response Scheme for Achieving Forward Secrecy in Smart Grid," H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, GLOBECOM 2012.
  29. "Coordinate-free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks," X. Li, S. He, J. Chen, X. Liang, R. Lu, and X. Shen, GLOBECOM 2011.
  30. "An Efficient and Secure User Revocation Scheme in Mobile Social Networks," X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, GLOBECOM 2011.
  31. "EPF: An Event-aided Packet Forwarding Protocol for Privacy-preserving Mobile Healthcare Social Networks," L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, GLOBECOM 2011.
  32. "Toward Reliable Actor Service in Wireless Sensor and Actor Networks," X. Li, X. Liang, R. Lu, S. He, J. Chen, and X. Shen, MASS 2011.
  33. "Fine-grained Identification with Real-time Fairness in Mobile Social Networks," X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, ICC 2011.
  34. "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks," X. Li, R. Lu, X. Liang, and X. Shen, ICC 2011.
  35. "Anonymity Analysis on Social Spot based Pseudonym Changing for Location Privacy in VANETs," R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, ICC 2011.
  36. "STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs," X. Lin, R. Lu, X. Liang and X. Shen, INFOCOM 2011. (Acceptance ratio 15.96%)
  37. "PEACE: An Efficient and Secure Patient-centric Access Control Scheme for eHealth Care System," M. Barua, X. Liang, R. Lu, and X. Shen, IEEE INFOCOM'11-SCNC, 2011.
  38. "Secure and Quality of Service Assurance Scheduling Scheme for WBAN with Application to eHealth," M. Barua, M. S. Alam, X. Liang, and X. Shen, WCNC 2011.
  39. "Message Authentication with Non-transferability for Location Privacy in Mobile Ad hoc Networks," X. Liang, R. Lu, X. Lin, X. Shen, GLOBECOM 2010.
  40. "Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET," R. Lu, X. Lin, X. Liang, and X. Shen, GLOBECOM 2010.
  41. "FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road," R. Lu, X. Lin, X. Liang, and X. Shen, GLOBECOM 2010.
  42. "PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks," X. Liang, R. Lu, X. Lin, and X. Shen, VTC 2010-Fall.
  43. "Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network," R. Lu , X. Lin, X. Liang, and X. Shen, BodyNets 2010. Best Paper Award
  44. "Patient Self-controllable Access Policy on PHI in eHealthcare Systems," X. Liang, R. Lu, X. Lin, and X. Shen, AHIC 2010.
  45. "How to Construct Interval Encryption from Binary Tree Encryption," H. Lin, Z. Cao, X. Liang, M. Zhou, H. Zhu, D. Xing, ACNS 2010. (Acceptance ratio 17.98%)
  46. "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing," R. Lu , X. Lin, X. Liang, and X. Shen, ASIACCS 2010. (Acceptance ratio 22.89%)
  47. "Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption," X. Liang, Z. Cao, H. Lin and D. Xing, ASIACCS 2009. (Acceptance ratio 23.6%)
  48. "Attribute Based Proxy Re-encryption with Delegating Capabilities," X. Liang, Z. Cao, H. Lin and J. Shao, ASIACCS 2009. (Acceptance ratio 23.6%)
  49. "Secure Threshold Multi-authority Attribute Based Encryption without a Central Authority," H. Lin, Z. Cao, X. Liang and J. Shao, INDOCRYPT 2008.
  50. "Proxy Re-signature Schemes without Random Oracles," J. Shao, Z. Cao, L. Wang and X. Liang, INDOCRYPT 2007. (Acceptance ratio 20.95%)
  51. "Short Group Signature without Random Oracles," X. Liang, Z. Cao, J. Shao and H. Lin, ICICS 2007. (Acceptance ratio 17.12%)
  52. "ID-based Threshold Blind Signature scheme from Bilinear Pairing," X. Liang, Z. Cao, Z. Chai and R. Lu, ChinaCrypt 2006, pp.244 - 252, 2006.