1、Zechao Liu, Tao Liang, Jiazhuo Lyu, Dapeng Lang. A Security-Enhanced Scheme for MQTT Protocol Based on Domestic Cryptographic Algorithm[J]. Computer Communications, 2024, 221:1-9.
2、Ruinan Liu, Guisheng Yin, Zechao Liu*. Learning to walk with logical embedding for knowledge reasoning[J]. Information Sciences, 2024,667:120471.
3、Yang Yang, Guoyin Zhang, Sizhao Li, Zechao Liu*. Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT[J]. Frontiers of Computer Science, 2024,18(3):183817.
4、Ruinan Liu, Guisheng Yin, Zechao Liu*, Ye Tian. Reinforcement Learning with Time Intervals for Temporal Knowledge Graph Reasoning[J]. Information Systems, 2024,120:102292
5、Zechao Liu, Tao Liang, Wenshan Wang, Ruochen Sun, Sizhao Li. Design and Implementation of a Lightweight Security-Enhanced Scheme for Modbus TCP Protocol [J], Security and Communication Networks. 2023, 5486566:1-12.
6、Yang Yang, Guoyin Zhang, Zechao Liu*. SM9-based ABE Scheme with Outsourcing Decryption and Policy Update for IIoT [J], China Communications, 2023.
7、Ruinan Liu, Guisheng Yin, Zechao Liu*, Liguo Zhang. PTKE: Translation-Based Temporal Knowledge Graph Embedding in Polar Coordinate System. Neurocomputing[J], 2023, 529:80-91.
8、Li Xu, Xin Yan, Weiyue Ding, Zechao Liu*. Attribute rollout: a new way to interpret visual transformer[J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14(1):163-173.
9、Zechao Liu, Jing He, Mingyu Lei, Yulin Wu. Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVM[C], International Conference on Data Intelligence and Security (ICDIS), Shenzhen, China, August 24-26, 2022.
10、Yang Yang, Jianguo Sun, Zechao Liu*, Yuqing Qiao. Implementation of a Revocable CP-ABE Scheme from RLWE for Cloud Computing [J]. Journal of Information Security and Applications, 2022,65:103108.
11、Jianguo Sun, Yang Yang, Zechao Liu*, Yuqing Qiao. Multi-authority Criteria-Based Encryption Scheme for IoT [J]. Security and Communication Networks, 2021, 9174630:1-9174630:15.
12、Jianguo Sun, Yuqing Qiao, Zechao Liu*, Yitao Chen and Yang Yang. Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE [C], the 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA), New York, USA, 1-3 October, 2021.
13、Han Wang, Yang Qin, Zechao Liu, Yibing Li. Processing private queries based on distributed storage in location-based services. Proceedings of the ACM Turing Celebration Conference-China, 2019:1-6.
14、Zechao Liu, Zoe L. Jiang, Xuan Wang, S.M. Yiu. Practical Attribute-Based Encryption: Outsourcing Decryption, Attribute Revocation and Policy Updating [J], Journal of Network and Computer Applications. 2018, (108):112-123.
15、Zechao Liu, Zoe L. Jiang, Xuan Wang, Xinyi Huang, S.M.Yiu, Kunihiko Sadakane. Offline/ Online Attribute-Based Encryption with Verified Outsourced Decryption [J], Concurrency and Computation: Practice and Experience. 2017, 29(7).
16、Zechao Liu, Zoe L. Jiang, Xuan Wang, S.M. Yiu, Ruoqing Zhang, Yulin Wu. A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage, the 17th International Conference on Trust, Security and Privacy (TrustCom2018), July 31th-August 3rd, 2018, New York, USA.
17、Zechao Liu, Zoe L. Jiang, Xuan Wang, Yulin Wu, S.M. Yiu. Multi-Authority Ciphertext Policy Attribute-Based Encryption on Ideal Lattices, the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-2018), Melbourne, Australia,11-13 December, 2018.