Q.Liu, Y. Peng, M. Xu, H. Jiang, J. Wu, T. Wang,T. Peng, and G. Wang, "MPV: Enabling fine-grained query authentication inhybrid-storage blockchain," IEEE Transactions on Knowledge and DataEngineering, 2024.(CCF A)
Q.Liu, Y. Peng, Z. Tang, H. Jiang, J. Wu, T. Wang,T. Peng, and G. Wang, "veffChain: Enabling freshness authentication of richqueries over blockchain databases," IEEE Transactions on Knowledge andData Engineering, 2024.(CCF A)
Q.Liu, Y. Peng, H. Jiang, J. Wu, T. Wang, T. Peng,and G. Wang, "Authorized keyword search on mobile devices in secure dataoutsourcing," IEEE Transactions on Mobile Computing, 2024.(CCF A)
S. Wang, Q. Liu*, Y. Xu, H. Jiang, J. Wu, T. Wang, T. Peng, and G. Wang, "Protecting inference privacy with accuracy iImprovement in mobile-cloud deep learning," IEEE Transactions on Mobile Computing, 2024.(CCF A)
Q.Liu, Y. Peng, Q. Xu, H. Jiang, J. Wu, T. Wang,T. Peng, G. Wang, and S. Zhang, "MARS: Enabling verifiable range-aggregatequeries in multi-source environments," IEEE Transactions on Dependable andSecure Computing, 2023.(CCF A)
Q.Liu, Y. Peng, H. Jiang, J. Wu, T. Wang, T. Peng,and G. Wang, "SlimBox: Lightweight packet inspection over encryptedtraffic," IEEE Transactions on Dependable and Secure Computing, 2023.(CCF A)
Q. Liu,Y. Peng, S. Pei, J. Wu, T. Peng, and G. Wang, “Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search,” IEEE Transactions on Services Computing, 2022.(CCF A,ESI高被引论文)
Q. Liu, Y.Tian, J. Wu, T. Peng, and G. Wang, "Enabling Verifiable and dynamic ranked search over outsourced data," Transactions on Services Computing,2022.(CCF A,ESI高被引论文)
Q. Liu, G.Wang, F. Li, S. Yang , and J. Wu, "Preserving privacy with probabilistic indistinguishability in weighted social networks," IEEE Transactionson Parallel and Distributed Systems, 2017.(CCF A)
Q. Liu, C.C. Tan, J. Wu, and G. Wang, "Towards differential query services in cost-efficient clouds," IEEE Transactions on Parallel and DistributedSystems,2014. (CCF A类期刊)
Q. Liu, G.Wang, and J. Wu, "Time-based proxy re-encryption scheme for secure data sharing in a cloud environment," Information Sciences, 2014.(CCF B类期刊)
Q. Liu, G.Wang, and J. Wu, "Secure and privacy preserving keyword search for cloud storage," Journal of Network and Computer Applications, 2012. (CCF C类期刊)
G. Wang, Q. Liu,and J. Wu, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Computers & Security, 2011. (CCF B类期刊)
Q. Liu, J. Yang, H. Jiang, J. Wu, T. Peng, T. Wang, and G. Wang, “When deep learning meets steganography: Protecting inferenceprivacy in the dark,” Proc. of INFOCOM 2022. (CCF A)
Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, and Guojun Wang "Secure and efficient multi-attribute range queries based on comparable inner product encoding," Proc. of CNS 2018.
Q. Liu, X. Nie, X. Liu, T. Peng, and J. Wu,"Verifiable ranked search over dynamic encrypted data in cloud computing," Proc. of IWQoS 2017. (CCF B)
G. Wang, Q. Liu*, F. Li, S. Yang, and J. Wu, "Outsourcing privacy-preserving social networks to a cloud," Proc. of INFOCOM 2013. (CCF A)
Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," Proc of INFOCOM 2012. (CCF A)
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud computing," Proc. of ACM CCS 2010. (CCF A)