Publications


Book

  1. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. Security and Privacy in Mobile Social Networks. Springer Briefs in Computer Science, ISBN 978-1-4614-8856-9, 2013. (recommended by ACM Computing Reviews)
  2. Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, and Xuemin (Sherman) Shen. Querying over Encrypted Data in Smart Grids. SpringerBriefs in Computer Science, ISBN: 978-3-319-06354-6, 2014.

Book Chapter

  1. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks, Handbook on Opportunistic Mobile Social Networks. CRC Press, Taylo \& Francis Group, USA, 2013.

Refereed Journal Papers

  1. Bang Tran and Xiaohui Liang. Exploiting Peer-to-peer Communications for Query Privacy Preservation in Voice Assistant Systems. Peer-to-Peer Networking and Applications, Springer, 2020.
  2. Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan. Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Transactions on Mobile Computing, vol. 19, no. 2, 2020.
  3. Xiaohui Liang, Ronald Peterson, and David Kotz. Securely Connecting Wearables to Ambient Displays with User Intent. IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 4, 2020.
  4. Donghuan Yao, Mi Wen, Xiaohui Liang, Zipeng Fu, Kai Zhang, and Baojia Yang. Energy Theft Detection with Energy Privacy Preservation in the Smart Grid. IEEE Internet of Things Journal, vol. 6, no. 5, pp. 7659-7669, 2019.
  5. Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, and Haojin Zhu. Privacy-preserving Task Scheduling for Time-sharing Services of Autonomous Vehicles. IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 5260-5270, 2019.
  6. Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, and Wei Li. Privacy-preserving Voice-based Search over mHealth Data. Smart Health Journal, vol. 12, pp. 24-34, 2019.
  7. Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang, and Xuemin (Sherman) Shen. Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage. IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 607-620, 2018.
  8. Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin (Sherman) Shen. Security and Privacy in Smart City Applications: Challenges and Solutions. IEEE Communications Magazine, vol. 55, no. 1, pp. 122-129, 2017.
  9. Mengyuan Li, Ruan Na, Qiyang Qian, Haojin Zhu, Xiaohui Liang, and Le Yu. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud. IEEE Internet of Things Journal, vol. 4, no. 2, pp. 583-591, 2017.
  10. Ahmed Sherif, Khaled Rabieh, Mohamed Mahmoud, and Xiaohui Liang. Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era. IEEE Internet of Things Journal, vol. 4, no. 2, pp. 611-618, 2017.
  11. Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Mu Yi, and Xiaojun Zhang. Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 676-688, 2017.
  12. Huaxin Li, Haojin Zhu, Suguo Du, Xiaohui Liang, and Xuemin (Sherman) Shen. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense. IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 646-660, 2016.
  13. Hao Ren, Hongwei Li, Xiaohui Liang, Shibo He, Yuanshun Dai, and Lian Zhao. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees. MDPI Sensors, vol. 16, no. 9, 2016.
  14. Yuan Zhang, Chunxiang Xu, Hongwei Li, and Xiaohui Liang. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. IEEE Cloud Computing, vol. 3, no. 5, pp. 44-52, 2016.
  15. Hongwei Li, Yi Yang, Tom Luan, Xiaohui Liang, Liang Zhou, and Xuemin (Sherman) Shen. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data. IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 13, no. 3, pp. 312-325, 2016.
  16. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. PIF: A Personalized Fine-grained Spam Filtering Scheme with Privacy Preservation in Mobile Social Network. IEEE Transactions on Computational Social Systems (TCSS), vol. 2, no. 3, pp. 41-52, 2015.
  17. Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin (Sherman) Shen, and Henry Luo. Security and Privacy for Mobile Healthcare Networks -- from Quality-of-Protection Perspective. IEEE Wireless Communications, vol. 22, no. 4, pp. 104-112, 2015.
  18. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372-383, 2014.
  19. Kuan Zhang, Xiaohui Liang, Mrinmoy Barua, Rongxing Lu, and Xuemin (Sherman) Shen. PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs. Information Sciences, Elsevier, vol. 284, pp. 130-141, 2014.
  20. Xiaohui Liang, Xiaodong Lin, Kuan Zhang, and Xuemin (Sherman) Shen. Security and Privacy in Mobile Social Network: Challenges and Solutions. IEEE Wireless Communications, vol.21, no.1, pp.33-41, 2014.
  21. Chengzhe Lai, Hui Li, Xiaohui Liang, Rongxing Lu, Kuan Zhang, and Xuemin (Sherman) Shen. CPAL: A Conditional Privacy-Preserving Authentication with Access Linkability for Roaming Service. IEEE Internet of Things Journal, vol. 1, no. 1, pp. 46-57, 2014.
  22. Xiaohui Liang, Xiaodong Lin, and Xuemin (Sherman) Shen. Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 2, pp. 310-320, 2014.
  23. Kuan Zhang, Xiaohui Liang, Xuemin (Sherman) Shen, and Rongxing Lu. Exploiting Multimedia Services in Mobile Social Networks from Security and Privacy Perspectives. IEEE Communications Magazine, vol.52, no.3, pp.58-65, 2014.
  24. Qinghua Shen, Xiaohui Liang, Xuemin (Sherman) Shen, Xiaodong Lin, and Henry Luo. Exploiting Geo-Distributed Clouds for E-Health Monitoring System with Minimum Service Delay and Privacy Preservation. IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, pp. 430-439, 2014.
  25. Hongwei Li, Xiaodong Lin, Haomiao Yang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 8, pp. 2053-2064, 2014.
  26. Mi Wen, Rongxing Lu, Jingsheng Lei, Hongwei Li, Xiaohui Liang, and Xuemin (Sherman) Shen. SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing. Security and Communication Networks (SCN), vol. 7, no. 1, pp. 234-244, 2014.
  27. Xiaohui Liang, Xu Li, Kuan Zhang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. Fully Anonymous Profile Matching in Mobile Social Networks. IEEE Journal on Selected Areas of Communications (JSAC), vol. 31, no. 9, pp. 641-655, 2013.
  28. Xiaohui Liang, Kuan Zhang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. EPS: An Efficient and Privacy-Preserving Service Searching Scheme for Smart Community. IEEE Sensor Journal, vol. 13, no. 10, pp. 3702-3710, 2013.
  29. Mi Wen, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Ruilong Deng, and Xuemin (Sherman) Shen. CIT: A Credit-based Incentive Tariff Scheme with Fraud-traceability for Smart Grid. Security and Communication Networks, Nov. 2013.
  30. Mi Wen. Rongxing Lu, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, and Xuemin (Sherman) Shen. PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid. IEEE Transactions on Emerging Topics in Computing (TETC), vol. 1, no. 1, pp. 178-191, 2013.
  31. Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. RCare: Extending Secure Health Care to Rural Area Using VANETs. ACM Mobile Networks and Applications (MONET), vol. 19, no. 3, pp. 318-330, 2013.
  32. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid. IEEE Transactions on Smart Grid (TSG), vol. 4, no. 1, pp. 141-150, 2013.
  33. Xiaohui Liang, Xu Li, Tom Luan, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks. IEEE Transactions on Vehicular Technology (TVT), vol. 61, no. 7, pp. 3209-3221, 2012.
  34. Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin (Sherman) Shen. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 9, pp. 1621-1631, 2012.
  35. Xiaohui Liang, Xu Li, Mrinmoy Barua, Le Chen, Rongxing Lu, Xuemin (Sherman) Shen, and Henry Luo. Enable Pervasive Healthcare through Continuous Remote Health Monitoring. IEEE Wireless Communications, vol. 19, no. 6, pp. 10-18, 2012.
  36. Xu Li, Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Haojing Zhu, and Xuemin (Sherman) Shen. Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges. IEEE Communications Magazine, vol. 50, no. 8, pp. 38-45, 2012.
  37. Xiaohui Liang, Mrinmoy Barua, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. HealthShare: Achieving Secure and Privacy-preserving Health Information Sharing through Health Social Networks. Computer Communications, vol. 35, no. 15, pp. 1910-1920, 2012.
  38. Rongxing Lu, Xiaodong Lin, Tom Luan, Xiaohui Liang, and Xuemin (Sherman) Shen. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs. IEEE Transactions on Vehicular Technology (TVT), vol. 61, no. 1, pp. 86-96, 2012.
  39. Xu Li, Rongxing Lu, Xiaohui Liang, Jiming Chen, Xiaodong Lin, and Xuemin (Sherman) Shen. Smart Community: an Internet of Things Application. IEEE Communications Magazine, vol. 49, no. 11, pp. 68-75, 2011.
  40. Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing. International Journal of Security and Networks, vol. 6, no. 2, pp. 67-76, 2011.
  41. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network. ACM Mobile Networks and Applications (MONET), vol. 16, no. 6, pp. 683-694, 2011.
  42. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. An Efficient and Provably Secure Public Key Encryption Scheme based on Coding Theory. Security and Communication Networks (SCN), vol. 4, no. 12, pp. 1440-1447, 2011.
  43. Xiaohui Liang, Mrinmoy Barua, Rongxing Lu, and Xuemin (Sherman) Shen. Privacy-preserving Wireless Data Transmission for e-Healthcare Applications. IEEE COMSOC MMTC E-Letter, vol. 6, no. 11, pp. 39-41, 2011.
  44. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. IEEE Transactions on Intelligent Transportation Systems (TITS), vol. 13, no. 1, pp. 127-139, 2012.
  45. Xiaohui Liang, Rongxing Lu, Le Chen, Xiaodong Lin, and Xuemin (Sherman) Shen. PEC: A Privacy-preserving Emergency Call Scheme for Mobile Healthcare Social Networks. IEEE Journal of Communications and Networks, vol. 13, no. 2, pp. 102-112, 2011.
  46. Rongxing Lu, Xu Li, Xiaohui Liang, Xiaodong Lin, and Xuemin (Sherman) Shen. GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications. IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, 2011.
  47. Rongxing Lu, Xiaodong Lin, Haojing Zhu, Xiaohui Liang, and Xuemin (Sherman) Shen. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 1, pp. 32-43, 2010.
  48. Huang Lin, Zhenfu Cao, Xiaohui Liang, and Jun Shao. Secure Threshold Multi Authority Attribute based Encryption without a Central Authority. Information Sciences, vol. 180, no. 13, pp. 2618-2632, 2010.
  49. Jun Shao , Zhenfu Cao , Xiaohui Liang , and Huang Lin. Proxy Re-encryption with Keyword Search. Information Sciences, vol. 180, no. 13, pp. 2576-2587, 2010.
  50. Xiaohui Liang, Zhenfu Cao, Rongxing Lu, and Liuquan Qin. Efficient and Secure Protocol in Fair Document Exchange. Computer Standards and Interfaces, vol. 30, no. 3, pp. 167-176, 2008.
  51. Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, and Xiaohui Liang. New (t, n) Threshold Directed Signature Scheme with Provable Security. Information Sciences, vol. 178, no. 3, 2008, pp. 756-765.

Refereed Conference Papers

  1. Thamer Altuwaiyan, Mohammad Hadian, Samuel Rubel, and Xiaohui Liang. Exploiting Privacy-preserving Voice Query in Healthcare-based Voice Assistant System. IEEE International Conference on Communications (ICC), 2020.
  2. Shuaiqi Shen, Song Ci, Kuan Zhang, and Xiaohui Liang. Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model. IEEE GLOBECOM Workshop on Cyber-Physical Energy System for Sustainable ICT, 2019.
  3. Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, Bo Sheng, and Kuan Zhang. SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis. IEEE International Conference on Computing, Networking and Communications (ICNC), 2019. (Accepting ratio 28%)
  4. Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, and Bo Sheng. FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices. IEEE International Conference on Computing, Networking and Communications (ICNC), 2019. (Accepting ratio 28%)
  5. Mohammad Hadian, Thamer Altuwaiyan, Haoyu Wang, and Xiaohui Liang. WiLock: Exploiting Wireless Signals for Device-free Continuous Authentication. IEEE Global Telecommunications Conference (GLOBECOM), December 2018.
  6. Haoyu Wang, Mohammad Hadian, and Xiaohui Liang. Efficient and Privacy-preserving Roadmap Data Update for Autonomous Vehicles. IEEE Global Telecommunications Conference (GLOBECOM), December 2018.
  7. Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, and Yao Liu. WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2018.
  8. Thamer Altuwaiyan, Mohammad Hadian, Xiaohui Liang, and Wei Li. EPIC: Efficient Privacy-preserving Contact Tracing for Infection Detection. IEEE International Conference on Communications (ICC), 2018.
  9. Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith Ross. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. Network and Distributed System Security Symposium (NDSS), 2018.
  10. J. Zhang, Xiaohui Liang, Z. Zhang, Shibo He, and Zhiguo Shi. Re-DPoctor: Real-time health data releasing with w-day differential privacy. IEEE Global Telecommunications Conference (GLOBECOM), December 2017.
  11. Mohammad Hadian, Thamer Altuwaiyan, and Xiaohui Liang. Privacy-preserving Time-sharing Services for Autonomous Vehicles. IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017.
  12. Aarathi Prasad, Xiaohui Liang, and David Kotz. SPICE: Secure Proximity-based Infrastructure for Close Encounters. ACM Workshop on Mobile Crowdsensing Systems and Applications (CrowdSense), 2017.
  13. Xiaohui Liang and David Kotz. AuthoRing: Wearable User-presence Authentication. ACM Workshop on Wearable Systems and Applications (WearSys), pages 5-10, 2017.
  14. Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, and Wei Li. Efficient and Privacy-Preserving Voice-Based Search over mHealth Data. The International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT), 2017.
  15. Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz. LightTouch: Securely Connecting Wearables to Ambient Displays with User Intent. IEEE International Conference on Computer Communications (INFOCOM), 2017. (Acceptance rate is 20.93%)
  16. Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. The 23rd ACM Conference on Computer and Communications Security (CCS), 2016. (Acceptance rate is 16.37%)
  17. Mohammad Hadian, Xiaohui Liang, Thamer Altuwaiyan, and Mohamed Mahmoud. Privacy-preserving mHealth Data Release with Pattern Consistency. IEEE Global Telecommunications Conference (GLOBECOM), December 2016.
  18. Guowen Xu, Hongwei Li, Dongxiao Liu, Hao Ren, Yuanshun Dai, Xiaohui Liang. Towards Efficient Privacy-preserving Truth Discovery in Crowd Sensing Systems. IEEE Global Telecommunications Conference (GLOBECOM), December 2016.
  19. Thamer Altuwaiyan, Xiaohui Liang, and Mohammad Hadian. Towards Efficient and Privacy-preserving Location-based Comment Sharing. IEEE/CIC International Conference on Communications in China (ICCC), July, 2016.
  20. Tim Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. Wanda: Securely Introducing Mobile Devices. IEEE International Conference on Computer Communications (INFOCOM), 2016. (Acceptance rate is 18.25%)
  21. Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, and Xuemin (Sherman) Shen. Exploiting Mobile Social Behaviors for Sybil Detection. IEEE International Conference on Computer Communications (INFOCOM), 2015. (Acceptance rate is 19%)
  22. Aarathi Prasad, Xiaohui Liang, David Kotz. Balancing Disclosure and Utility of Personal Information. ACM MobiSys Poster, 2014.
  23. Xiaohui Liang, and David Kotz. Securely Connecting Wearable Health Devices to External Displays. USENIX Summit on Health Information Technologies, August, 2014.
  24. Qinghua Shen, Xiaohui Liang, Xuemin (Sherman) Shen, Xiaodong Lin, and Henry Luo. RECCE: A Reliable and Efficient Cloud Cooperation Scheme in E-healthcare. IEEE Global Telecommunications Conference (GLOBECOM), December 2013.
  25. Kuan Zhang, Rongxing Lu, Xiaohui Liang, Jian Qiao, and Xuemin (Sherman) Shen. PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid. IEEE \& CIC International Conference on Communications in China (ICCC), August 2013.
  26. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. SAFE: A Social Based Updatable Filtering Protocol with Privacy Preservation in Mobile Social Networks. IEEE International Conference on Communications (ICC), June 2013.
  27. Hongwei Li, Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. EDR: An Efficient Demand Response Scheme for Achieving Forward Secrecy in Smart Grid. IEEE Global Telecommunications Conference (GLOBECOM), December 2012.
  28. Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin (Sherman) Shen, and Hai Zhao. VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs. IEEE Global Telecommunications Conference (GLOBECOM), December 2012.
  29. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks. International Conference on Distributed Computing Systems (ICDCS), June 2012. (Acceptance rate is 13%)
  30. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. Enabling Pervasive Healthcare with Privacy Preservation in Smart Community. IEEE International Conference on Communications (ICC), June 2012.
  31. Xiaohui Liang, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen, and Weihua Zhang. Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks. IEEE International Conference on Computer Communications (INFOCOM), March 2012. (Acceptance rate is 17.97%)
  32. Rongxing Lu, Xiaodong Lin, Tom Luan, Xiaohui Liang, Xu Li, Le Chen, and Xuemin (Sherman) Shen. PReFilter: A Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks. IEEE International Conference on Computer Communications (INFOCOM), March 2012. (Acceptance rate is 17.97%)
  33. Xu Li, Shibo He, Jiming Chen, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. Coordinate-free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks. IEEE Global Communications Conference (GLOBECOM), December 2011.
  34. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. An Efficient and Secure User Revocation Scheme in Mobile Social Networks. IEEE Global Communications Conference (GLOBECOM), December 2011.
  35. Le Chen, Zhenfu Cao, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen. EPF: An Event-aided Packet Forwarding Protocol for Privacy-preserving Mobile Healthcare Social Networks. IEEE Global Communications Conference (GLOBECOM), December 2011.
  36. Xu Li, Xiaohui Liang, Rongxing Lu, Shibo He, Jiming Chen, and Xuemin (Sherman) Shen. Toward Reliable Actor Service in Wireless Sensor and Actor Networks. IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), October 2011.
  37. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. Fine-grained Identification with Real-time Fairness in Mobile Social Networks. IEEE International Conference on Communications (ICC), June 2011.
  38. Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen. Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks. IEEE International Conference on Communications (ICC), June 2011.
  39. Rongxing Lu, Xiaodong Lin, Tom Luan, Xiaohui Liang, and Xuemin (Sherman) Shen. Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs. IEEE International Conference on Communications (ICC), June 2011.
  40. Xiaodong Lin, Rongxing Lu, Xiaohui Liang and Xuemin (Sherman) Shen. STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs. IEEE International Conference on Computer Communications (INFOCOM), April 2011. (Acceptance rate is 15.96%)
  41. Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen. PEACE: An Efficient and Secure Patient-Centric Access Control Scheme for eHealth Care System. IEEE International Conference on Computer Communications workshops on Security in Computers, Networking and Communications (INFOCOM-SCNC), April 2011.
  42. Mrinmoy Barua, Md. Shamsul Alam, Xiaohui Liang, and Xuemin (Sherman) Shen. Secure and Quality of Service Assurance Scheduling Scheme for WBAN with Application to EHealth. IEEE Wireless Communications and Networking Conference (WCNC), March 2011.
  43. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen. Message Authentication with Non-transferability for Location Privacy in Mobile Ad hoc Networks. IEEE Global Communications Conference (GLOBECOM), December 2010.
  44. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road. IEEE Global Communications Conference (GLOBECOM), December 2010.
  45. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. Sacrificing the Plum Tree for the Peach Tree: A Social-spot Tactic for Protecting Receiver-location Privacy in VANET. IEEE Global Communications Conference (GLOBECOM), December 2010.
  46. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks. IEEE Vehicular Technology Conference (VTC-Fall), September, 2010.
  47. Rongxing Lu , Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network. International Conference on Body Area Networks (BodyNets), September, 2010. Best Paper Award
  48. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen. Patient Self-controllable Access Policy on PHI in eHealthcare Systems. Advances in Health Informatics Conference (AHIC), April 2010.
  49. Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing. How to Construct Interval Encryption from Binary Tree Encryption. Applied Cryptography and Network Security (ACNS), April 2010. (Acceptance rate is 17.98%)
  50. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing. ACM Symposium on Information, Computer and Communications Security (ASIACCS), April, 2010. (Acceptance rate is 22.89%)
  51. Xiaohui Liang, Zhenfu Cao, Huang Lin and Dongsheng Xing. Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption. ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2009. (Acceptance rate is 23.6%)
  52. Xiaohui Liang, Zhenfu Cao, Huang Lin and Jun Shao. Attribute Based Proxy Re-encryption with Delegating Capabilities. ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2009. (Acceptance rate is 23.6%)
  53. Huang Lin, Zhenfu Cao, Xiaohui Liang, and Jun Shao. Secure Threshold Multi-authority Attribute Based Encryption without a Central Authority. International Conference on Cryptology in India (INDOCRYPT), December 2008.
  54. Jun Shao, Zhenfu Cao, Licheng Wang, and Xiaohui Liang. Proxy Re-signature Schemes without Random Oracles. International Conference on Cryptology in India (INDOCRYPT), December 2007. (Acceptance rate is 20.95%)
  55. Xiaohui Liang, Zhenfu Cao, Jun Shao, and Huang Lin. Short Group Signature without Random Oracles. International Conference on Information and Communications Security (ICICS), December 2007. (Acceptance rate is 17.12%)
  56. Xiaohui Liang, Zhenfu Cao, Zhenchuan Chai and Rongxing Lu. ID-based Threshold Blind Signature scheme from Bilinear Pairing. ChinaCrypt 2006.

Patent Application

  1. Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. Apparatus for securely configuring a target device and associated methods. U.S. Patent application PCT/US2016/039009; international patent application WO2016210125A1, June 2016. Priority date 2015-06-23; Filing date 2016-06-23; Publication date 2016-12-29. [PDF]
  2. Xiaohui Liang, Tianlong Yun, Ron Peterson, and David Kotz. Secure system for coupling wearable devices to computerized devices with displays. U.S. Patent Application PCT/US2015/045651; International Patent Application WO2016028752A1, August 2015. Priority date 2014-08-18; Filing date 2015-08-18; Publication date 2017-09-28. [PDF]