Scientific Publications​

  1. Miniadou, Kyriaki, Asterios Leonidis, Georgios Th Papadopoulos, and Constantine Stephanidis. "Encrypted Biometric Search: A Deep Learning Approach to Scalable and Secure Cross-Border Data Exchange." In 2024 IEEE International Conference on Big Data (BigData), pp. 2794-2800. IEEE, 2024. {DOI} {ZENODO}

  2. Benos, Georgios, Konstantinos Koutsoukos, Chrysostomos Symvoulidis, and Dimitrios Drakoulis. "Enhancing International Security: A Secure Biometric Data Sharing Framework for Effective Cross-Border Crime and Terrorism Prevention." In 2024 IEEE International Conference on Big Data (BigData), pp. 2690-2696. IEEE, 2024. {DOI} {ZENODO}

  3. Kyriakou, Katerina, Apostolos Apostolaras, Polychronis Velentzas, Georgios Benos, Konstantinos Koutsoukos, Chrysostomos Symvoulidis, Kaitai Liang et al. "A Secure and Trustworthy Biometric Data Ecosystem for Cross-border Suspect Identification." In 2024 IEEE International Conference on Big Data (BigData), pp. 2762-2771. IEEE, 2024. {DOI} {ZENODO}

  4. Wang, Rui, Xingkai Wang, Huanhuan Chen, Jérémie Decouchant, Stjepan Picek, Nikolaos Laoutaris, and Kaitai Liang. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1-41. {DOI} {ZENODO}

  5. Zhang, Manning, Zeshun Shi, HuanHuan Chen, and Kaitai Liang. "Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF), pp. 441-453. IEEE Computer Society, 2024. {DOI} {ZENODO}

  6. Langhout, Tjard Jan, Huanhuan Chen, and Kaitai Liang. "File-injection attacks on searchable encryption, based on binomial structures." In European Symposium on Research in Computer Security, pp. 424-443. Cham: Springer Nature Switzerland, 2024. {DOI} {ZENODO}

  7. Ho, Björn, Huanhuan Chen, Zeshun Shi, and Kaitai Liang. "Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages." In European Symposium on Research in Computer Security, pp. 105-126. Cham: Springer Nature Switzerland, 2024. {DOI} {ZENODO}

  8. Miniadou, Kyriaki, Asterios Leonidis, Georgios Th Papadopoulos, and Constantine Stephanidis. "Enhancing secure cross-border collaboration among law enforcement agencies for facial biometric search." In 2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE), pp. 1-6. IEEE, 2024. {DOI} {ZENODO}

  9. Kyriakou, Katerina, Apostolos Apostolaras, Polychronis Velentzas, Ilias Syrigos, Stavroula Maglavera, Spyridon Evangelatos, Eleni Veroni, and Thanasis Korakis. "Biometrics data space: Ensuring trustworthy and secure data exchange for suspect identification." In 2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE), pp. 1-6. IEEE, 2024. {DOI} {ZENODO}

  10. Nikolakopoulos, Anastasios, Spyridon Evangelatos, Eleni Veroni, Konstantinos Chasapas, Nikolaos Gousetis, Apostolos Apostolaras, Christos D. Nikolopoulos, and Thanasis Korakis. "Large language models in modern forensic investigations: Harnessing the power of generative artificial intelligence in crime resolution and suspect identification." In 2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE), pp. 1-5. IEEE, 2024. {DOI} {ZENODO}

  11. Qiao, Yanqi, Dazhuang Liu, Rui Wang, and Kaitai Liang. "Stealthy Backdoor Attack against Federated Learning through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage." IEEE Journal on Emerging and Selected Topics in Circuits and Systems (2024). {DOI} {ZENODO}

  12. Ren, Liangqin, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, and Bo Luo. "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption." Proceedings on Privacy Enhancing Technologies 3 (2024): 1-18. {DOI} {ZENODO}

  13. Liu, Dongli, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, and Kaitai Liang. "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases." arXiv preprint arXiv:2403.01182 (2024). 33rd USENIX Security Symposium (USENIX Security '24), Philadelphia, Pennsylvania, USA {DOI} {ZENODO}

  14. Nie, Hao, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, and Kaitai Liang. "Query Recovery from Easy to Hard: Jigsaw Attack against SSE." arXiv preprint arXiv:2403.01155 (2024). 33rd USENIX Security Symposium (USENIX Security '24), Philadelphia, Pennsylvania, USA {DOI} {ZENODO}

  15. Chen, Huanhuan, Yao Jiang Galteland, and Kaitai Liang. "CCA-1 secure updatable encryption with adaptive security." In International Conference on the Theory and Application of Cryptology and Information Security, pp. 374-406. Singapore: Springer Nature Singapore, 2023. {DOI} {ZENODO}

  16. Wang, Wei, Dongli Liu, Peng Xu, Laurence Tianruo Yang, and Kaitai Liang. "Keyword search shareable encryption for fast and secure data replication." IEEE Transactions on Information Forensics and Security (2023). {DOI} {ZENODO}

Find all TENSOR publications on ZENODO!

Subscribe to our newsletter

Subscribe to our newsletter for updates from all the latest news of the Project!