scispace - formally typeset
Z

Zhe Liu

Researcher at Nanjing University of Aeronautics and Astronautics

Publications -  266
Citations -  3233

Zhe Liu is an academic researcher from Nanjing University of Aeronautics and Astronautics. The author has contributed to research in topics: Computer science & Elliptic curve cryptography. The author has an hindex of 25, co-authored 156 publications receiving 1981 citations. Previous affiliations of Zhe Liu include University of Waterloo & Pusan National University.

Papers
More filters
Journal ArticleDOI

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age

TL;DR: The design of a scalable, regular, and highly-optimized ECC library for both MICAz and Tmote Sky nodes, which supports both widely-used key exchange and signature schemes and the efforts to evaluate the energy consumption and harden the library against some basic side-channel attacks.
Journal ArticleDOI

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

TL;DR: A novel security notion named revocable identity-based broadcast proxy re-encryption (RIB-BPRE) is presented to address the issue of key revocation and the performance evaluation reveals that the proposed scheme is efficient and practical.
Journal ArticleDOI

Generative Neural Networks for Anomaly Detection in Crowded Scenes

TL;DR: Experimental results show that the proposedinline-formula-VAE outperforms the state-of-the-art algorithms for anomaly detection from video data and can achieve better performance for detecting both local abnormal events and global abnormal events.
Journal ArticleDOI

Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT

TL;DR: This article provides a mixed-integer linear programming (MILP) formulation and proposes an analysis-based two-stage scheme that determines the allocation, operating frequency, and security service of tasks to maximize system quality of security while satisfying the design constraints.
Journal ArticleDOI

Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography

TL;DR: This article first gives a brief overview of post-quantum public-key cryptosystems based on hard mathematical problems related to hash functions, error-correcting codes, multivariate quadratic systems, and lattices.