2025
- PhiShield: An AI-Based Personalized Anti-Spam Solution with Third-Party IntegrationElectronics, 2025
- Enhancing Gender Prediction Model Performance through Automatic Individual Entity Extraction and Class Balance2025 IEEE International Conference on Big Data and Smart Computing (BigComp), 2025
2024
- A Secure Key Management for TLS SubversionAICompS, 2024
- Gender Bias Mitigation in Gender Prediction Using Zero-shot ClassificationAnnual Conference of KIPS, 2024
2023
2022
- Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust NetworksIEEE Internet of Things Journal, 2022
- Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based EncryptionIEEE Transactions on Dependable and Secure Computing, 2022
- Efficient IoT Management With Resilience to Unauthorized Access to Cloud StorageIEEE Transactions on Cloud Computing, 2022
2021
- P2DPI: Practical and Privacy-Preserving Deep Packet InspectionProceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, 2021
- SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT EnvironmentsComputer Security – ESORICS 2021, 2021
- Utilizing QR codes to verify the visual fidelity of image datasets for machine learningJournal of Network and Computer Applications, 2021
2020
- Inspecting TLS Anytime Anywhere: A New Approach to TLS InterceptionProceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 2020
- Efficient Anonymous Multi-group Broadcast EncryptionApplied Cryptography and Network Security, 2020
-
- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle ProofInformation Security Applications, 2020
-
2019
- Generic Construction of Fair Exchange Scheme with Semi-Trusted AdjudicatorJ. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR CodesMachine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings, 2019
- Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge ComputingProceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019
-
- Chapter 5 - Crowdsensing and Privacy in Smart City ApplicationsSmart Cities Cybersecurity and Privacy, 2019
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR CodesMachine Learning for Cyber Security, 2019
- Puncturable Proxy Re-Encryption Supporting to Group Messaging ServiceComputer Security – ESORICS 2019, 2019
- Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular ApproachInformation Security and Privacy, 2019
- A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order GroupsApplied Cryptography and Network Security, 2019
2018
-
- Functional encryption for computational hiding in prime order groups via pair encodingsDesigns, Codes and Cryptography, 2018
2017
- An Efficient KP-ABE with Short Ciphertexts in Prime Order Groups under Standard AssumptionProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
- Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication2017