Ximeng Liu

Ximeng Liu
Fuzhou University · Department of Computer Science and Technology

Ph.D

About

336
Publications
43,920
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,687
Citations
Additional affiliations
November 2014 - August 2019
Singapore Management University
Position
  • Research Assistant
September 2013 - September 2014
Nanyang Technological University
Position
  • Research Assistant

Publications

Publications (336)
Article
Full-text available
In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. Using POCR, a user can securely outsource the storing and processing of rational numbers to a cloud server without compromising the security of the (original) data and the computed results. We present the...
Article
Full-text available
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys, which we refer to as EPOM. Using EPOM, a large scale of users can securely outsource their data to a cloud server for storage. Moreover, encrypted data belonging to multiple users can be processed without compromising on th...
Article
Full-text available
Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data gener...
Article
Full-text available
In this paper, we propose a new efficient privacy-preserving outsourced computation framework over public data, called EPOC. EPOC allows a user to outsource the computation of a function over multi-dimensional public data to the cloud while protecting the privacy of the function and its output. Specifically, we introduce three types of EPOC in orde...
Preprint
Evolutionary algorithms (EAs), such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users do not have enough capability to implement EAs to solve COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud ser...
Article
Full-text available
With the popularity of mobile terminal equipment and wireless sensing network, the applications of mobile crowdsensing-based traffic violation monitoring are increasingly widely used. However, the enormous amount of sensing data with complex types brings a critical challenge to the limited bandwidth and storage space. Meanwhile, there is a serious...
Preprint
Full-text available
The neural network (NN) becomes one of the most heated type of models in various signal processing applications. However, NNs are extremely vulnerable to adversarial examples (AEs). To defend AEs, adversarial training (AT) is believed to be the most effective method while due to the intensive computation, AT is limited to be applied in most applica...
Article
Wireless body area networks (WBANs) consist of a number of low-power sensors, through which specialists can remotely monitor the real-time vital parameters of patients. This facility can improve healthcare quality and reduce associated costs considerably. However, WBAN devices typically have limited resources that severely hinder the quality of ser...
Article
Full-text available
As an emerging sensing data collection paradigm, mobile crowdsensing (MCS) enjoys good scalability and low deployment cost but raises privacy concerns. In this paper, we propose a privacy-preserving MCS system called CROWDFL by seamlessly integrating federated learning (FL) into MCS. At a high level, in order to protect participants' privacy and fu...
Article
Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain...
Preprint
Transferability of adversarial examples is of critical importance to launch black-box adversarial attacks, where attackers are only allowed to access the output of the target model. However, under such a challenging but practical setting, the crafted adversarial examples are always prone to overfitting to the proxy model employed, presenting poor t...
Preprint
Full-text available
Starting from the local structures to study hierarchical trees is a common research method. However, the cumbersome analysis and description make the naive method challenging to adapt to the increasingly complex hierarchical tree problems. To improve the efficiency of hierarchical tree research, we propose an embeddable matrix representation for hi...
Preprint
Full-text available
Backdoor injection attack is an emerging threat to the security of neural networks, however, there still exist limited effective defense methods against the attack. In this paper, we propose BAERASE, a novel method that can erase the backdoor injected into the victim model through machine unlearning. Specifically, BAERASE mainly implements backdoor...
Article
Encrypted image retrieval is a promising technique for achieving data confidentiality and searchability the in cloud-assisted Internet of Things (IoT) environment. However, most of the existing top-k ranked image retrieval solutions have low retrieval efficiency, and may leak the values and orders of similarity scores to the cloud server. Hence, if...
Article
Full-text available
Ranked keyword search over encrypted data has been extensively studied in cloud computing as it enables data users to find the most relevant results quickly. However, existing ranked multi-keyword search solutions cannot achieve efficient ciphertext search and dynamic updates with forward security simultaneously. To solve the above problems, we fir...
Article
Load balancing mechanism in technologies such as cloud computing has provided a huge opportunity for the development of large-scale projects. Although the conventional view is to build mechanisms that adopt a dynamic load balancing strategy, existing strategies cannot automatically scale platform (network) servers (nodes) to adapt for dynamic reque...
Article
Nowadays, the impressive performance of Deep Neural Networks (DNNs) greatly advances the development of Internet of Things (IoT) in diverse scenarios. However, the exceptional vulnerability of DNNs to adversarial attack leads IoT devices to be exposed to potential security issues. Up to now, since adversarial training empirically remains robust aga...
Article
Location-based routing is a widely adopted message transmission mechanism in Vehicular Ad Hoc Networks (VANETs). While the existing location-based routing schemes of VANETs ignore the location privacy protection of vehicles, leading that the drivers to be tracked, and further threaten the safety of their life and property. To address the above issu...
Article
With the increasing popularity of GPS-equipped mobile devices in cloud-assisted fog computing scenarios, massive spatio-textual data is generated and outsourced to cloud servers for storage and analysis. Existing privacy-preserving range query or ranked keyword search schemes does not support a unified index, and are just applicable for the symmetr...
Article
The processor failures in a multiprocessor system have a negative impact on its distributed computing efficiency. Because of the rapid expansion of multiprocessor systems, the importance of fault diagnosis is becoming increasingly prominent. The [Formula: see text]-component diagnosability of [Formula: see text], denoted by [Formula: see text], is...
Article
Full-text available
The emergence of poison attack brings a serious risk to deep neural networks (DNNs). Specifically, an adversary can poison the training dataset to train a backdoor model, which behaves fine on clean data but induces targeted misclassification on arbitrary data with the crafted trigger. However, previous defense methods have to purify the backdoor m...
Article
A set of k spanning trees in a graph $G$ are called completely independent spanning trees (CISTs for short) if the paths joining every pair of vertices x and $y$ in any two trees have neither vertex nor edge in common, except for x and $y$ . The existence of multiple CISTs in the underlying graph of a network has applications in fault-toleran...
Article
Full-text available
Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field of data retrieval. This paper presents an attribute based date retrieval with proxy re-encryption (ABDR...
Preprint
In response to the threat of adversarial examples, adversarial training provides an attractive option for enhancing the model robustness by training models on online-augmented adversarial examples. However, most of the existing adversarial training methods focus on improving the robust accuracy by strengthening the adversarial examples but neglecti...
Article
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangeable encryption key in the cloud. That is because the trivial solution needs great communication overhead. To overcome this challenge,...
Article
With the popularity of location based services, spatial keyword query has become an important application. In order to save the storage and computational costs, most data owners will outsource the data to the cloud server, but this will lead to two problems, such as privacy leakage and heavy network bandwidth burden. To solve above problems, we pro...
Article
Full-text available
In this paper, according to the known results of some normalized permutation polynomials with degree 5 over , we determine sufficient and necessary conditions on the coefficients such that permutes . Meanwhile, we obtain a class of complete permutation binomials over . 1. Introduction Denote as a finite field with elements, where is a prime power;...
Chapter
The big data system based on data center network provides low-latency, high-quality services for big data applications. When server failure occurs in data center network, the security of the big data platform and the service quality of big data applications will be severely affected. A highly scalable data center network (HSDC) is an emerging serve...
Article
Full-text available
Evolutionary game theory is widely applied in network attack and defense. The existing network attack and defense analysis methods based on evolutionary games adopt the bounded rationality hypothesis. However, the existing research ignores that both sides of the game get more information about each other with the deepening of the network attack and...
Article
Internet of Things (IoT) devices and systems are becoming increasingly commonplace, and as such systems scale up, so do the computational and storage requirements. Hence, one recent trend is to outsource data from IoT devices to remote systems. To facilitate both ciphertext retrieval and data confidentiality in the outsourced data, a number of sear...
Chapter
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangeable encryption key in the cloud. That is because the trivial solution needs great communication overhead. To overcome this challenge,...
Chapter
Message passing neural network (MPNN) is one of the excellent deep learning models for drug discovery and development, drug laboratory usually outsource the MPNN model to cloud servers to save the research and development cost. However, drug-related data privacy has become a noticeable hindrance for outsourcing cooperation in drug discovery. In thi...
Chapter
Computation outsourcing using virtual environment is getting more and more prevalent in cloud computing, which several parties want to run a joint application and preserves the privacy of input data in secure computation protocols. However, it is still a challenging task to improve the efficiency and speed of secure floating point calculations in c...
Article
As a novel network infrastructure that realizes the interconnection of humans, machines, and things, 5G enables a large number of devices with communication and sensing capabilities to securely, quickly, and reliably connect to the Internet and facilitates Industrial Internet of Things (IIoT) applications such as smart cities, smart homes, and smar...
Article
Fog-assisted Internet of Things (IoT) can outsource the massive data of resource-constraint IoT devices to cloud and fog nodes. Meanwhile, it enables convenient and low time-delay data sharing services which relies heavily on high security of data confidentiality and fine-grained access control. Many efforts have been focused on this urgent require...
Article
As the scale of the system expands, processor failures are inevitable. Fault diagnosis has great significance in analyzing the reliability of multiprocessing systems. Probabilistic fault diagnosis is a method that attempts to diagnose nodes correctly with high probability. In this paper, we extend the threshold $t \leq 2$ to threshold $t=3$ for reg...
Conference Paper
The distributed denial of service (DDoS) attack is detrimental to businesses and individuals as people are heavily relying on the Internet. Due to remarkable profits, crackers favor DDoS as cybersecurity weapons to attack a victim. Even worse, edge servers are more vulnerable. Current solutions lack adequate consideration to the expense of attacker...
Article
Full-text available
For group signatures (GS) supporting membership revocation, verifier-local revocation (VLR) mechanism is the most flexible choice. As a post-quantum secure cryptographic counterpart of classical schemes, the first dynamic GS-VLR scheme over lattices was put forward by Langlois et al. at PKC 2014; furthermore, a corrected version was shown at TCS 20...
Chapter
Revocable identity-based encryption (RIBE) with server-aided ciphertext evolution (RIBE-CE), recently proposed by Sun et al. at TCS 2020, offers significant advantages over previous identity (or key) revocation mechanisms when considering the scenario of a secure data sharing in the cloud setting. In this new system model, the user (i.e., a recipie...
Article
Full-text available
Structured Encryption (STE), which allows a server to provide secure search services on encrypted data structures, has been widely investigated in recent years. To meet expressive search requirements in practical applications, a large number of STE constructions have been proposed either on textual keywords or spatial data. However, STE on spatio-t...
Article
Symmetric Searchable Encryption (SSE) schemes facilitate searching over encrypted data, and have been extensively explored to improve function, efficiency or security. There are, however, additional functions that we need to consider in a real-world setting. For example, forward and backward privacy are required to adequately secure newly added doc...
Article
With the rapid expansion of the scale of multiprocessor systems, the importance of fault tolerance and fault diagnosis is increasingly concerned. For an interconnection network G, the h-component connectivity is an important indicator for evaluating the fault tolerance of G, which is defined as the minimum number of vertices whose deletion will dis...
Chapter
High cost of training time caused by multi-step adversarial example generation is a major challenge in adversarial training. Previous methods try to reduce the computational burden of adversarial training using single-step adversarial example generation schemes, which can effectively improve the efficiency but also introduce the problem of “catastr...
Article
Full-text available
Searchable encryption is an effective way to ensure the security and availability of encrypted outsourced cloud data. Among existing solutions, the keyword exact search solution is relatively inflexible, while the fuzzy keyword search solution either has a high index overhead or suffers from the false-positive. Furthermore, no existing fuzzy keywor...
Article
In this paper, by employing the AGW criterion and determining the number of solutions to some equations over finite fields, we further investigate nine classes of permutation polynomials over $ \mathbb{F}_{p^n} $ with the form $ (x^{p^m}-x+\delta)^{s_1}+(x^{p^m}-x+\delta)^{s_2}+x $ and propose five classes of complete permutation polynomials over $...
Article
Having emerged as a novel intelligent perception paradigm of the Internet of Things, mobile crowdsensing (MCS) is capable of handling large-scale and complex social sensing tasks and service applications in human society by motivating modern intelligent sensing devices to provide high-quality sensing data. With the exploding growth of smart devices...
Article
The increasing awareness in privacy has partly contributed to the renewed interest in privacy-preserving encrypted image retrieval, and designing for outsourced images stored on cloud servers, etc. However, there are some limitations in these existing schemes such as low retrieval accuracy, low retrieval efficiency, and less efficient result verifi...
Article
Full-text available
As an emerging concept in the intelligent transportation system (ITS), Opportunistic Autonomous Vehicle Platoon (OAVP) enables autonomous vehicles to self-organize a temporary platoon and travel together. Whereas, electing the platoon leader is a crucial issue to be solved in this scenario. The platoon leader not only suffers from more wind resista...
Article
Blockchain allows for secure management of a shared ledger by agreement protocols, where transactions are validated over network without central authorities. Although the agreement protocol has been thoroughly conducted of propagation and consensus researches, mobility of nodes in unstructured overlay networks has not received much attention. Besid...
Article
Ciphertext retrieval under heterogeneous datasets is a critical concern in the cloud-assisted Internet of Things (IoT). Previous ciphertext retrieval schemes eliminate computation burden and security concerns to some extent, but cannot support the encrypted heterogeneous datasets. To solve this problem, in this paper we propose a transparent cipher...
Article
Ranked keyword search has gained increasing attention due to its attractive advantages such as flexibility and accessibility. However, most existing ranked keyword search schemes ignore the semantic associations between the documents and queries. To solve this challenging issue in cloud-assisted edge computing, we first design the Semantic-aware Ra...
Article
Vehicular Ad hoc Networks (VANETs) play an increasing role in a number of applications, particularly those associated with location-based services (e.g., spatial keyword searches -- SKS). However, there is a need to strike a balance between privacy guarantee and search efficiency, and existing SKS solutions cannot be directly implemented in VANETs....
Article
Controller Area Network (CAN) bus anomaly detection on the Internet of Vehicle (IoV) is a topic of ongoing interest and increasing importance, particularly as IoV becomes commonplace. However, existing abnormal detection schemes are not ideal due to the lack of abnormal data in IoV and the difficulty of parsing the diverse message rules in existing...
Article
Full-text available
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the potent encryption paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the access policy of the traditional CP-ABE is in plaintext form that reveals significant sensitive information of data owners and data visitors. To mitigate this problem, tw...