[1] ARG: Testing Query Rewriters via Abstract Rule Guided Fuzzing, 2025 IEEE/ACM International Conference on Automated Software Engineering (ASE 2025) [2] Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants , USENIX Security Symposium 2025 [3] LOGO-based Intellectual Property Right Protection Scheme for GANs on FPGA, IEEE Transactions on Dependable and Secure Computing [4] Fully Anonymous Decentralized Identity Supporting Threshold Traceability with Practical Blockchain, International World Wide Web Conference (WWW 2025) [5] CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground, IEEE Transactions On Dependable And Secure Computing [6] Enhancing the Security of One-Tap Authentication Services via Dynamic Application Identification, IEEE Transactions on Information Forensics and Security [7] How to Prevent Social Media Platforms from Knowing the Images You Share with Friends, IEEE Transactions on Mobile Computing [8] Dissecting Blockchain Network Partitioning Attacks and Novel Defense for Bitcoin and Ethereum, IEEE Transactions on Information Forensics and Security [9] Quantum-Resistant Sharding Blockchain and Its Application in Secure Data Transmission, IEEE Journal on Selected Areas in Communications [10] CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction, IEEE Symposium on Security and Privacy (S&P 2025) |