H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 55 Citations 8,450 221 World Ranking 2183 National Ranking 58

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Cryptography

His primary areas of study are Computer security, Encryption, Ring signature, Computer network and Public-key cryptography. The study incorporates disciplines such as Revocation and Cloud computing security in addition to Computer security. His Encryption study frequently draws parallels with other fields, such as Cryptography.

His Ring signature research incorporates themes from Random oracle, Group signature, Anonymity, Algorithm and Computer security model. His Random oracle research is multidisciplinary, incorporating perspectives in Cryptocurrency, Theoretical computer science and Schnorr signature. As a part of the same scientific study, Joseph K. Liu usually deals with the Public-key cryptography, concentrating on Certificate and frequently concerns with Adversary.

His most cited work include:

  • Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (216 citations)
  • Toward efficient and privacy-preserving computing in big data era (188 citations)
  • Malicious KGC attacks in certificateless cryptography (166 citations)

What are the main themes of his work throughout his whole career to date?

Joseph K. Liu mostly deals with Computer security, Encryption, Ring signature, Computer network and Random oracle. His study in Public-key cryptography, Cryptography, Key, Computer security model and Cryptocurrency falls within the category of Computer security. Joseph K. Liu interconnects Theoretical computer science and Revocation in the investigation of issues within Encryption.

His Ring signature research is multidisciplinary, relying on both Group signature, Schnorr signature and Anonymity. His research in Random oracle intersects with topics in Algorithm and Identity. His study looks at the intersection of Ciphertext and topics like Semantic security with Malleability and Ciphertext indistinguishability.

He most often published in these fields:

  • Computer security (52.46%)
  • Encryption (40.14%)
  • Ring signature (20.07%)

What were the highlights of his more recent work (between 2019-2021)?

  • Encryption (40.14%)
  • Computer network (18.31%)
  • Computer security (52.46%)

In recent papers he was focusing on the following fields of study:

Joseph K. Liu mainly focuses on Encryption, Computer network, Computer security, Theoretical computer science and Cryptography. Joseph K. Liu has researched Encryption in several fields, including Information privacy and Server. Computer security is represented through his Cryptocurrency and Privacy preserving research.

His Theoretical computer science study combines topics from a wide range of disciplines, such as Homomorphic encryption, Correctness and Symmetric-key algorithm. His Cryptography research includes themes of Computational complexity theory, Relation, Reduction and Lattice. The Ciphertext study combines topics in areas such as Proxy, Plaintext, Computer hardware and Key encapsulation.

Between 2019 and 2021, his most popular works were:

  • Private Machine Learning Classification Based on Fully Homomorphic Encryption (22 citations)
  • DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT (20 citations)
  • Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data (14 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Cryptography

Encryption, Access control, Theoretical computer science, Ciphertext and Privacy preserving are his primary areas of study. His study in Encryption is interdisciplinary in nature, drawing from both Information privacy, Data processing and Cryptography. His studies in Access control integrate themes in fields like Server and Database.

His Privacy preserving study integrates concerns from other disciplines, such as Security analysis, Deep learning, Secrecy and Zero-knowledge proof. He studied Confidentiality and Protocol that intersect with Computer security. His research in Computer security is mostly concerned with Ring signature.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups

Joseph K. Liu;Victor K. Wei;Duncan S. Wong.
australasian conference on information security and privacy (2004)

421 Citations

Toward efficient and privacy-preserving computing in big data era

Rongxing Lu;Hui Zhu;Ximeng Liu;Joseph K. Liu.
IEEE Network (2014)

320 Citations

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

271 Citations

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid

Joonsang Baek;Quang Hieu Vu;Joseph K. Liu;Xinyi Huang.
ieee international conference on cloud computing technology and science (2015)

248 Citations

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang;Junwei Zhou;Joseph K. Liu;Jianping Yu.
IEEE Transactions on Information Forensics and Security (2016)

192 Citations

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.

Joseph K. Liu;Man Ho Au;Willy Susilo.
IACR Cryptology ePrint Archive (2006)

188 Citations

Secure sharing of Personal Health Records in cloud computing

Jianghua Liu;Xinyi Huang;Joseph K. Liu.
Future Generation Computer Systems (2015)

177 Citations

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract

Joseph K. Liu;Man Ho Au;Willy Susilo.
computer and communications security (2007)

173 Citations

Efficient online/offline identity-based signature for wireless sensor network

Joseph K. Liu;Joonsang Baek;Jianying Zhou;Yanjiang Yang.
International Journal of Information Security (2010)

154 Citations

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero

Shi Feng Sun;Shi Feng Sun;Man Ho Au;Joseph K. Liu;Tsz Hon Yuen.
european symposium on research in computer security (2017)

154 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Joseph K. Liu

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 73

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 71

Yi Mu

Yi Mu

Fujian Normal University

Publications: 55

Debiao He

Debiao He

Wuhan University

Publications: 48

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 39

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 38

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 37

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 33

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 31

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 31

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 29

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 28

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 28

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 27

Lei Zhang

Lei Zhang

Southeast University

Publications: 21

Something went wrong. Please try again later.