Jianwei Liu

Jianwei Liu
University of Macau · Department of Electrical and Computer Engineering

About

202
Publications
28,132
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,167
Citations
Citations since 2017
123 Research Items
1504 Citations
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
Introduction
Skills and Expertise

Publications

Publications (202)
Article
Full-text available
Smart grid is gradually replacing traditional grid with two-way communication and improved management. Besides the efficiency and reliability it brings, the smart grid is inevitably fraught with rampant physical and cyber-attack. Although several physical unclonable function (PUF)-based schemes have been proposed, they are unsuited to the end-edge-...
Article
Full-text available
Classical one-way function is a fundamental part of cryptography. Its one-wayness is threatened by the emerging quantum computers. Quantum one-way function (QOWF) was proposed to solve this dilemma. It is computable but almost irreversible in quantum polynomial time. However, there is not a purely full quantum one-way function which takes quantum s...
Chapter
It usually takes a lot of time and resources to train a high-accurate Machine Learning model, so it is believed that the trainer owns the Intellectual Property (IP) of the model. With the help of various computing accelerators, a Machine Learning model can run on FPGAs, and model providers render services by selling FPGAs with models embedded. Unau...
Article
Full-text available
As a typical application of Internet of Things (IoT), home automation systems, namely, smart homes, provide a more convenient and intelligent life experience through event recognition, automation control, and remote device access. However, smart home systems have also given rise to new complications for security issues. As an event-driven IoT syste...
Article
Statistical analysis on genomic data can explore the relationship between gene sequence and phenotype. Particularly, counting the genomic mutation samples and associating with related phenotypes for statistical analysis can annotate the variation sites and help to diagnose genovariation. Expansion of the size of variation sample data helps to incre...
Article
With the continuous development of edge computing and IIoT technology, there are growing types of IIoT devices, and the number of such devices is continuously climbing. It is indispensable to authenticate devices in the IIoT environment. In this paper, we propose two blockchain-based authentication for IIoT devices with PUF. The first one relies on...
Chapter
The rapid development of global wireless networks has promoted the innovation of 5G network application scenarios and the improvement of infrastructure. The deployment of 5G network in high-speed railway network system has important practical application prospects. Data security and user experience are significant factors to consider for 5G high-sp...
Preprint
The core issue of cyberspace detecting and mapping is to accurately identify and dynamically track devices. However, with the development of anonymization technology, devices can have multiple IP addresses and MAC addresses, and it is difficult to map multiple virtual attributes to the same physical device by existing detecting and mapping technolo...
Article
Full-text available
In cryptography, obfuscation is one of the strongest forms of encryption. Point functions have been widely discussed in classical obfuscation so that obfuscation of point functions becomes an important branch of obfuscation theory. For quantum circumstance, a series of positive results in quantum point obfuscation have been proposed and indicate th...
Article
With the continuous advancement of edge intelligence, edge servers undertake more and more intelligent computing tasks. Nowadays, there are a large number of IoT devices in the network in idle state. For instance, the mining process for consensus of miners in blockchain such as Bitcoin causes a waste of computing resources and energy. A natural que...
Article
Full-text available
In the era of big data, next-generation sequencing produces a large amount of genomic data. With these genetic sequence data, research in biology fields will be further advanced. However, the growth of data scale often leads to privacy issues. Even if the data is not open, it is still possible for an attacker to steal private information by a membe...
Article
Full-text available
Blockchain is a decentralized ledger system that enables transactional consensus among untrusted nodes. Due to the independence between blockchains, it is tough to complete asset exchange tasks between diverse chains. Facing this problem, multiple cross-chain exchange schemes were proposed, but they have not been widely used due to various defects...
Chapter
The immutability of blockchain means that data in blockchain cannot be modified once confirmed. It guarantees the reliability and integrity of blockchain. However, absolute immutability is not conducive to timely correction of blockchain. Currently, there are some researches on redactable blockchain. They replaced hash functions with chameleon hash...
Chapter
Full-text available
A complete sharding blockchain consists of many vital components, the two most important of which are the intra-shard consensus algorithm and the cross-shard transaction processing method. The latter usually requires a two-phase commit protocol, which usually relies on the shard leaders to transfer critical messages among different shards. In the p...
Article
With the proliferation of cryptocurrency, many automated cross-ledger trading platforms were set up. These platforms introduce new challenges in tracing the money flows and getting evidence of illicit behaviors. Yousaf, Kappos, and Meiklejohn (USENIX Security’19) are the first to link the cross-ledger money flows. However, their scheme is only appl...
Chapter
Nowadays, mass-surveillance is becoming an increasingly severe threat to the public’s privacy. The PRISM and a series of other events showed that inner attacks such as subversion attacks may exist in the current network extensively. As an important strategy to defend users’ privacy against these attacks, cryptographic reverse firewall (CRF) is desi...
Article
中本聪共识是区块链共识机制中最基础和研究最广泛的一种共识机制, 其安全性对整个区块链领域的发展具有重要的理论意义和应用价值. 现有大量研究在各种模型假设下 对中本聪共识进行了安全性分析和证明. 本文首先详细描述了中本聪共识的执行模型, 包括时间模型, 网络模型, 敌手模型等. 其次, 系统总结了中本聪共识安全性的形式化定义. 再次, 根据时间模型将中本聪共识研究方法分为基于离散时间模型和连续时间模型两类, 并指出不同方法的优缺点. 最后对中本聪共识的安全性研究进行展望, 旨在为区块链共识机制的研究提供技术支撑.
Article
Android is undergoing unprecedented malicious threats daily, but the existing methods for malware detection often fail to cope with evolving camouflage in malware. To address this issue, we present Hawk, a new malware detection framework for evolutionary Android applications. We model Android entities and behavioral relationships as a heterogeneous...
Preprint
Android is undergoing unprecedented malicious threats daily, but the existing methods for malware detection often fail to cope with evolving camouflage in malware. To address this issue, we present HAWK, a new malware detection framework for evolutionary Android applications. We model Android entities and behavioural relationships as a heterogeneou...
Article
Full-text available
Quantum decoherence leads to environment-induced superselection of preferred states. Some information in the measurement apparatus is lost during communication. Even if the measurement apparatus is not entangled with the system of interest, the loss of information would occur. In this paper, we propose a feasible quantum network coding scheme reduc...
Chapter
Quantum obfuscation means encrypting the functionality of circuits or functions by quantum mechanics. It works as a form of quantum computation to improve the security and confidentiality of quantum programs. Although some quantum encryption schemes have been discussed, any quantum asymmetric scheme based on quantum obfuscation is not still propose...
Article
Full-text available
Traceable ring signature (TRS), a variant of ring signature, allows a signer to sign a message anonymously labeled with a tag on behalf of a group of users, but may reveal the signer’s identity if he creates two signatures with the same tag. TRS provides accountable anonymity for users, and serves as an important role in e-voting systems and e-coup...
Article
Full-text available
Fully homomorphic encryption enables computation on encrypted data while maintaining secrecy. This leads to an important open question whether quantum computation can be delegated and verified in a non-interactive manner or not. In this paper, we affirmatively answer this question by constructing quantum fully homomorphic encryption (QFHE) schemes...
Article
With the wide application of electronic hardware in aircraft such as air-to-ground communication, satellite communication, positioning system and so on, aircraft hardware is facing great secure pressure. Focusing on the secure problem of aircraft hardware, this paper proposes a supervisory control architecture based on secure System-on-a-Chip (SoC)...
Article
Full-text available
With the rapid development of the digital world, digital rights management (DRM) becomes increasingly important. Multi-Authority Attribute Based Encryption (MA-ABE) schemes provide suitable solutions for flexible fine-grained access control in DRM. However, there are two accountable problems unsolved when applying existing ABE schemes to DRM direct...
Preprint
Full-text available
Sharding is the prevalent approach to breaking the trilemma of simultaneously achieving decentralization, security, and scalability in traditional blockchain systems, which are implemented as replicated state machines relying on atomic broadcast for consensus on an immutable chain of valid transactions. Sharding is to be understood broadly as techn...
Article
Full-text available
Smart contracts are regarded as one of the most promising and appealing notions in blockchain technology. Their self-enforcing and event-driven features make some online activities possible without a trusted third party. Nevertheless, problems such as miscellaneous attacks, privacy leakage, and low processing rates prevent them from being widely ap...
Article
Full-text available
Cloud storage is an effective way for data owners to outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services. In traditional cloud storage systems, cloud data integrity verification relies on centralized entities and data is stored in a small number of storage servicers. However, these centralized entiti...
Article
Full-text available
Sharding blockchains are proposed to solve the scalability problem while maintaining security and decentralization. However, there are still many issues to be solved. First, the member selection and assignment process are not strictly analyzed, which might lead to an increase in the adversary proportion. Second, current intra-shard consensus algori...
Article
Full-text available
We propose an attribute-based fast data cloud-outsourcing (FDCO) scheme, which shows great performance in mobile devices. Technically, this work is a CCA-secure online/offline key encapsulation scheme based on ciphertext-policy attribute-based encryption with public validity test and indirect user revocation mechanism. We adapt it to a mobile cloud...
Article
Full-text available
With the rapid development of the genomic sequencing technology, the cost of obtaining personal genomic data and analyzing it effectively has been gradually reduced, and the analysis and utilization of genomic data came into the public view, while the leakage of genomic data privacy has aroused the attention of researchers. The security of genomic...
Article
Full-text available
The PRISM made the research of cryptography against subversion attacks flourish these years. In a subversion attack, surveillants can compromise the security of users’ systems by subverting implementations of cryptographic algorithms. While the scenario of a single‐surveillant has been researched by several works, the multi‐surveillant setting attr...
Article
Full-text available
Metamaterials, artificially engineered structures with extraordinary physical properties, offer multifaceted capabilities in interdisciplinary fields. To address the looming threat of stealthy monitoring, the detection and identification of metamaterials is the next research frontier but have not yet been explored. Here, we show that the crypto-ori...
Conference Paper
Full-text available
Sharding blockchains could improve the transaction throughput and achieve scalibility, making the application fields of the blockchain technology more extensive. Cross-shard transactions account for a large fraction of transactions in a sharding blockchain, so the processing method of cross-shard transactions is of vital importance to the system ef...
Conference Paper
Full-text available
Sharding blockchains are promising in improving transaction throughput and achieving network scalability. Intra-shard consensus and cross-shard communication are two essential parts for almost every kind of sharding blockchain. However, some security problems still exist in current sharding solutions such as replay attacks, and there is still room...
Chapter
With the wide application of the mobile Internet, many aspects such as mobile payment, mobile office, private-data protection, security control of terminals and so on will face huge secure pressure. For that reason, this paper presents a supervisory control architecture based on secure SOC system with attack-immune and trustworthiness for intellige...
Preprint
Full-text available
Smart contract has been regarded as one of the most promising and appealing notions in blockchain technology. Its self-enforcing and event-driven features make some online activities possible without a trusted third party, especially those related to financial and business. However, problems such as high security risk and low processing rate preven...
Chapter
As a combination of cloud computing and edge computing, cloud-fog-end computing models are gradually replacing traditional centralized cloud computing models due to their high controllability and low latency. However, this model has certain shortcomings in terms of resource awareness of edge devices. Two problems are the most prominent. One is that...
Article
Internet of Things is a critical infrastructure component as well as an enabling technology to support the fast-developing cross-region, cross-application, and diversified collaborative smart city services that require systematic cooperation among multiple smart city systems. Speech recognition-based voice controllable systems become one of the mos...
Article
Full-text available
Performance of routing protocol at network layer in Cognitive Radio Adhoc Networks (CRAHNs) is mainly based on the probability of channel availability for application data transmission. To attain, end-to-end channel-route control messages should be disseminated in an efficient mechanism with minimal channel-route re-connection delays. In CRAHNs, en...
Article
Full-text available
Committee-based blockchain consensus protocols combine permissionless consensus and classical state machine replication protocols to process transactions efficiently. Due to corruptions by the adversary, reconfiguration mechanisms have to be deployed to update committee members. How to select enough fraction of honest nodes is a key issue that need...
Chapter
In this chapter, we review the principle of some common quantum attacks, such as intercept-and-resend attack, teleportation attack, man-in-the-middle attack, participant attack, and implementation attack. Also, we introduce some general security analysis methods, such as BAN logic, random oracle model, and quantum-accessible random oracle model. Th...
Chapter
Considering the practical advantage of continuous variables, in this chapter, we introduce continuous-variable quantum network coding (CVQNC) schemes. Basic operations are provided. To verify the identity of different data sources in a quantum network, we introduce a continuous-variable quantum homomorphic signature scheme. It is based on continuou...
Chapter
How to design network coding beyond the butterfly network is desired to be resolved. Quantum repeaters are potential candidates to create nonlocal entanglement between distant particles and realize long-distance quantum communication.
Chapter
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible random oracle for post-quantum cryptography and quantum random oracle for quantum cryptography. T...
Chapter
Quantum network coding is vulnerable to pollution attacks, especially when using classical channel as an auxiliary resource. In this chapter, we introduce a secure quantum network coding scheme against pollution attacks.
Chapter
Many quantum network coding schemes are different in terms of node, channel, resources, security, etc. Considering their own special properties characterized by the additional resources used, quantum network coding schemes can be precisely classified according to what kind of additional resources are used.
Chapter
Many quantum authentication schemes have been designed according to quantum key distribution. Scheme security is proved heuristically by employing attack strategies such as intercept-measure-resend attack, entanglement-measure attack, etc. In this chapter, we introduce security analysis based on BAN logic. In contrast to analyzing protocols with co...
Chapter
Quantum communication is a new interdiscipline combining quantum mechanics and information theory, which has the feature of unconditional security. Usually, the handling of quantum information is harder than that of the classical counterparts. Copying and coding are two typical operations of network coding. The question is whether or not quantum ne...
Chapter
Opportunistic coding can take advantage of channel characteristic to maximize the gain from network coding. The achievement of air-to-ground quantum key distribution represents a key milestone toward quantum communication in free space. Thus it is worth concerning whether quantum network coding with opportunistic characteristic is also feasible or...
Chapter
Controlled teleportation introduces the concept of a controller and can control the reconstruction process of a receiver by sharing a GHZ state between the sender and the receiver.
Chapter
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being paid increasing attention to.
Chapter
Quantum cryptography has developed some fundamental primitives such as quantum one-time pad and quantum IND (indistinguishability)-security. Compared with other terms in quantum cryptography, quantum obfuscation attracts less attention and is still in its infancy due to its difficulty in implementation and application. In this chapter, we provide a...
Chapter
Most k-anonymization mechanisms that have been developed presently are vulnerable to re-identification attacks, e.g., those generating a generalized value based on input databases. k-anonymization mechanisms do not properly capture the notion of hiding in a crowd, because they do not impose any constraints on the mechanisms. In this paper, we defin...
Article
One‐way functions are fundamental tools for cryptography. Until now, quantum one‐way functions have several input‐output categories such as “classical‐to‐classical,” “classical‐to‐quantum,” and “quantum‐to‐classical,” which are used for postquantum cryptography or quantum cryptography. However, there are still no intrinsic “quantum‐to‐quantum” quan...
Article
Full-text available
With the continuous development and popularity of blockchain technology, anonymity of cryptocurrency has attracted wide attention. Zcash is an altcoin of Bitcoin aiming to protect blockchain anonymity. Its anonymity is highly guaranteed by zero-knowledge proofs. However, it is still practicable to decrease Zcash’s anonymity. In this paper, we provi...
Article
Full-text available
The application of cloud storage system has been deployed widely in recent years. A lot of electronic medical records (EMRs) are collected and uploaded to the cloud for scalable sharing among the authority users. It is necessary to guarantee the confidentiality of EMRs and the privacy of EMR owners. To achieve this target, we summarize a series of...
Chapter
Traceable ring signature (TRS), a variant of ring signature, allows a signer to sign a message anonymously labeled with a tag on behalf of a group of users, but may reveal the signer’s identity if he creates two signatures with the same tag. TRS provides accountable anonymity for users, and serves as an important role in e-voting systems and e-coup...
Article
Full-text available
Due to the basic nature of mobile ad hoc networks, that is, infrastructure-less, it is prone to individual or collective misbehaviors by participating node(s). Participating nodes could act selfishly and does cause massive loss to network performance because of limited resources or belonging to a different administrative domain. Reputation-based so...
Article
Full-text available
Ethereum accelerates the transaction process through a quicker block creation design. Since the time interval between the generation of blocks is very short (about 15s), block propagation time in an inefficient network is not negligible compared with the block time interval. This lead to the production of a large number of orphan blocks. In order t...
Book
This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the b...
Article
The software-defined network (SDN) enabled internet of things (IoT) architecture is deployed in many industrial systems. The ability of SDN to intelligently route traffic and use underutilised network resources, enables IoT networks to cope with data onslaught smoothly. SDN also eliminates bottlenecks and helps to process IoT data efficiently witho...
Article
Abstract: The software-defined network (SDN) enabled internet of things (IoT) architecture is deployed in many industrial systems. The ability of SDN to intelligently route traffic and use underutilised network resources, enables IoT networks to cope with data onslaught smoothly. SDN also eliminates bottlenecks and helps to process IoT data efficie...
Chapter
With the rapid development of genomic sequencing technology, the cost of obtaining personal genomic data and analyzing it effectively has been gradually reduced. The analysis and utilization of genomic data have gradually come into the public view, the privacy leakage of genomic data has aroused the attention of researchers. Genomic data has unique...
Chapter
In the existing Software-Defined Networking (SDN), the network infrastructure is divided into different network domains according to the operators assigned to it. In this paper, by adding monitor meta to the switch layer, the flow table rules and logs issued by the controller are distributed recorded. The consortium blockchain is constructed by dis...
Article
Identity-based remote data auditing schemes can verify data integrity and provide a simple identity authentication and management for multiple users. However, prior works on identity-based remote data auditing lack the support of dynamic operations. In these schemes, tag generation is linked to the index of data block, which is related to update op...