


default search action
Lin Liu 0018
Person information
- affiliation (PhD 2020): National University of Defense Technology, College of Computer, Changsha, Hunan, China
Other persons with the same name
- Lin Liu (aka: Liu Lin) — disambiguation page
- Lin Liu 0001 — Tsinghua University, School of Software, Beijing, China
- Lin Liu 0002 — Université de Montréal, Département de Biochimie, Canada
- Lin Liu 0003
— University of South Australia, Mawson Lakes, Australia - Lin Liu 0004 — Stony Brook University, NY, USA
- Lin Liu 0005
— University of Cincinnati, Department of Geography, OH, USA (and 1 more) - Lin Liu 0006
— Hunan Normal University, Department of Physics, Changsha, China (and 1 more) - Lin Liu 0007
— University of Science and Technology Beijing, School of Mathematics and Physics, China - Lin Liu 0008
— Jiangsu University, College of Electrical Information and Engineering, Zhenjiang, China - Lin Liu 0009
— North China Electric Power University, School of Electrical and Electronic Engineering, Beijing, China - Lin Liu 0010
— Chinese University of Hong Kong, Earth System Science Programme, Hong Kong (and 2 more) - Lin Liu 0011
— Huazhong University of Science and Technology, School of Physics, Hubei Key Laboratory of Gravitation and Quantum Physics, Wuhan, China (and 1 more) - Lin Liu 0012 — MediaTek, Inc., Hsinchu, Taiwan
- Lin Liu 0013
— Michigan Technological University, Department of Electrical and Computer Engineering, Houghton, MI, USA - Lin Liu 0014 — Wuhan University of Technology Library, Wuhan, China
- Lin Liu 0015
(aka: Liu Lin 0015) — Shandong University of Science and Technology, College of Geodesy and Geomatics, Qingdao, China - Lin Liu 0016
— University of Science and Technology of China, CAS Key Laboratory of Technology in GIPAS, Electronic and Electronic Ingeneering Department, China (and 1 more) - Lin Liu 0017 — iFLYTEK Co. Ltd, iFLYTEK Research, Hefei, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j13]Yujie Xue
, Lin Liu
, Yuchuan Luo
, Bing Sun, Shaojing Fu
:
FLUTE: FSS-Based Secure Two-Party LLM Inference Using Partial Transformer Encryption. IEEE Trans. Dependable Secur. Comput. 23(1): 685-702 (2026)
[i5]Xinwen Gao, Shaojing Fu, Lin Liu, Zhuotao Liu, Yuchuan Luo, Yongjun Wang:
Euston: Efficient and User-Friendly Secure Transformer Inference with Non-Interactivity. IACR Cryptol. ePrint Arch. 2026: 46 (2026)
[i4]Zihao Wang, Rongmao Chen, Xinwen Gao, Yi Wang, Lin Liu, Zixin Lan, Zhaoyu Wang, Shaojing Fu, Qiong Wang, Xinyi Huang:
STIP: Efficient and Secure Non-Interactive Transformer Inference via Compact Packing. IACR Cryptol. ePrint Arch. 2026: 174 (2026)- 2025
[j12]Luming Yang
, Yongjun Wang, Lin Liu
, Junjie Huang
, Jiangyong Shi
, Shaojing Fu
, Shize Guo
:
unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. IEEE Trans. Inf. Forensics Secur. 20: 3330-3345 (2025)
[j11]Luming Yang
, Shaojing Fu
, Yongjun Wang, Lin Liu
, Yuchuan Luo
:
The Analysis of Encrypted Video Stream Based on Low-Dimensional Embedding Method. IEEE Trans. Inf. Forensics Secur. 20: 8280-8295 (2025)
[j10]Luming Yang
, Lin Liu
, Junjie Huang
, Jiangyong Shi
, Shaojing Fu
, Yongjun Wang, Jinshu Su
:
Robustness Matters: Pre-Training Can Enhance the Performance of Encrypted Traffic Analysis. IEEE Trans. Inf. Forensics Secur. 20: 10588-10603 (2025)
[c35]Luming Yang
, Lin Liu
, Junjie Huang
, Zhuotao Liu
, Shiyu Liang
, Shaojing Fu
, Yongjun Wang
:
MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis. CCS 2025: 1664-1678
[c34]Peijun Zhao, Lin Liu, Shaojing Fu, Yuchuan Luo:
MSFS: Maliciously Secure 3-Party Feature Selection via Mutual Information. Inscrypt (2) 2025: 45-65
[c33]Hanbo Huang, Yihan Li, Bowen Jiang, Bo Jiang, Lin Liu, Zhuotao Liu, Ruoyu Sun, Shiyu Liang:
A Middle Path for On-Premises LLM Deployment: Preserving Privacy Without Sacrificing Model Confidentiality. EMNLP 2025: 8321-8359
[c32]Shang Song, Lin Liu, Rongmao Chen, Wei Peng:
Concretely Efficient Three-party Oblivious Selection. ICME 2025: 1-6
[c31]Yujie Xue, Lin Liu, Yuchuan Luo, Bing Sun, Shaojing Fu:
PrivMLLM: Efficient Three-Party Multimodal Large Language Model Secure Inference Supported Prompt Privacy. ICNP 2025: 1-24
[c30]Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu:
ENSI: Efficient Non-Interactive Secure Inference for Large Language Models. SRDS 2025: 83-94
[c29]Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu:
LEA: Label Enumeration Attack in Vertical Federated Learning. SRDS 2025: 345-356
[c28]Jinzhu Yan, Zhuotao Liu, Yuyang Xie, Shiyu Liang, Lin Liu, Ke Xu:
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis. USENIX Security Symposium 2025: 7349-7368
[i3]Wenhao Jiang, Yuchuan Luo, Guilin Deng, Silong Chen, Xu Yang, Shihong Wu, Xinwen Gao, Lin Liu, Shaojing Fu:
Federated Large Language Models: Feasibility, Robustness, Security and Future Directions. CoRR abs/2505.08830 (2025)
[i2]Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu:
ENSI: Efficient Non-Interactive Secure Inference for Large Language Models. CoRR abs/2509.09424 (2025)- 2024
[j9]Xinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo:
BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning. Frontiers Comput. Sci. 18(5): 185810 (2024)
[j8]Lin Liu
, Shaojing Fu
, XueLun Huang
, Yuchuan Luo
, Xuyun Zhang
, Kim-Kwang Raymond Choo
:
SecDM: A Secure and Lossless Human Mobility Prediction System. IEEE Trans. Serv. Comput. 17(4): 1793-1805 (2024)
[c27]Ying Wang, Yuchuan Luo, Shaojing Fu, Zhenyu Qiu, Lin Liu:
Diffusion-based Adversarial Attack to Automatic Speech Recognition. ACML 2024: 889-904
[c26]Yu Chen
, Lin Liu
, Rongmao Chen
, Shaojing Fu
, Yuexiang Yang
:
Honest-Majority Maliciously Secure Skyline Queries on Outsourced Data. CIKM 2024: 344-353
[c25]Wenhao Jiang, Songwei Luo, Shaojing Fu, Lin Liu, Yuchuan Luo:
Privacy-Preserving Byzantine-Robust Federated Learning via Multiparty Homomorphic Encryption. COCOON (2) 2024: 432-446
[c24]Yu Chen, Lin Liu, Rongmao Chen, Shaojing Fu, Yuexiang Yang, Jiangyong Shi, Liangzhong He:
Speedy Privacy-Preserving Skyline Queries on Outsourced Data. ESORICS (2) 2024: 430-450
[c23]Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu, Yongjun Wang:
FedSV: A Privacy-Preserving Byzantine-Robust Federated Learning Scheme with Self-validation. ICA3PP (1) 2024: 242-260
[c22]Yuxin Zhang
, Hui Han, Guangliang Sun, Wei Wu
, Lin Liu
:
PrivARM: Privacy-Preserving Association Rule Mining in the Cloud. ICA3PP (1) 2024: 271-290
[c21]Lin Liu, Ziling Wei, Shuhui Chen, Jinshu Su, Yong Yuan:
KP-WF: Cross-Domain Few-Shot Website Fingerprinting. ICDF2C (2) 2024: 227-245
[c20]Ying Wang, Yuchuan Luo, Zhenyu Qiu, Lin Liu, Shaojing Fu:
Defend from Scratch: A Diffusion-Based Proactive Defense Method for Unauthorized Speech Synthesis. ICONIP (1) 2024: 1-15
[c19]Lin Liu, Ziling Wei, Shuhui Chen, Zixuan Dong, Jinshu Su:
FingerMamba: Mamba-based Efficient Multi-tab Website Fingerprinting. IPCCC 2024: 1-9
[c18]Yong Yuan, Ziling Wei, Lin Liu, Shuhui Chen, Jinshu Su:
AST-Trans: Detecting Web Tracking using Transformer-based Deep Learning with Abstract Syntax Tree. IPCCC 2024: 1-7
[c17]Luming Yang, Yongjun Wang, Lin Liu, Junjie Huang, Shaojing Fu:
ExpMD: an Explainable Framework for Traffic Identification Based on Multi-Domain Features. IWQoS 2024: 1-10
[i1]Hanbo Huang, Yihan Li, Bowen Jiang, Lin Liu, Ruoyu Sun, Zhuotao Liu, Shiyu Liang:
Archilles' Heel in Semi-open LLMs: Hiding Bottom against Recovery Attacks. CoRR abs/2410.11182 (2024)- 2023
[j7]Xinyi Huang
, Yuchuan Luo
, Lin Liu, Wentao Zhao, Shaojing Fu:
Randomization is all you need: A privacy-preserving federated learning framework for news recommendation. Inf. Sci. 637: 118943 (2023)
[j6]Shaojing Fu
, XueLun Huang
, Lin Liu
, Yuchuan Luo
:
BFCRI: A Blockchain-Based Framework for Crowdsourcing With Reputation and Incentive. IEEE Trans. Cloud Comput. 11(2): 2158-2174 (2023)
[j5]Lin Liu
, Jinshu Su
, Ximeng Liu
, Rongmao Chen
, Xinyi Huang
, Guang Kou
, Shaojing Fu
:
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. IEEE Trans. Cloud Comput. 11(3): 3211-3225 (2023)
[c16]Shang Song, Lin Liu, Rongmao Chen, Wei Peng, Yi Wang:
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing. ESORICS (3) 2023: 411-430
[c15]Mengyao Du
, Miao Zhang
, Lin Liu
, Kai Xu
, Quanjun Yin
:
Credit-based Differential Privacy Stochastic Model Aggregation Algorithm for Robust Federated Learning via Blockchain. ICPP 2023: 452-461
[c14]Songwei Luo
, Shaojing Fu
, Yuchuan Luo
, Lin Liu
, Yanxiang Deng
, Shixiong Wang:
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data. NSS 2023: 195-216
[c13]Yanxiang Deng
, Lin Liu
, Shaojing Fu
, Yuchuan Luo
, Wei Wu
, Shixiong Wang
:
Privacy Preserving Outsourced K-means Clustering Using Kd-tree. ProvSec 2023: 345-364
[c12]Luming Yang, Yongjun Wang, Shaojing Fu, Lin Liu, Yuchuan Luo:
EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis. SECON 2023: 537-545
[c11]Xinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo, Luming Yang:
EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPC. TrustCom 2023: 28-37
[c10]Yuting Yang, Lin Liu, Shaojing Fu, Jun-Jie Huang, Yuchuan Luo:
SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis. TrustCom 2023: 1119-1126- 2022
[j4]Jinrong Chen
, Lin Liu
, Rongmao Chen
, Wei Peng
, Xinyi Huang
:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. IEEE Trans. Dependable Secur. Comput. 19(5): 3168-3182 (2022)
[c9]Yuliang Lin, Rongmao Chen, Yi Wang, Baosheng Wang, Lin Liu:
Substitution Attacks Against Sigma Protocols. CSS 2022: 192-208
[c8]Yinqiu Wang, Yuchuan Luo, Lin Liu, Shaojing Fu:
pCOVID: A Privacy-Preserving COVID-19 Inference Framework. ICA3PP 2022: 21-42
[c7]Yifei Wang, Yuliang Lin, Yi Wang, Wei Peng, Lin Liu:
Algorithm Substitution Attacks on Identity-Based Encryption. SocialSec 2022: 15-31- 2021
[c6]Zhihui Hu, Guang Kou, Haoyu Zhang, Na Li, Ke Yang, Lin Liu:
Rectifying Pseudo Labels: Iterative Feature Clustering for Graph Representation Learning. CIKM 2021: 720-729
[c5]Lijie Chen, Shaojing Fu, Lin Liu, Yuchuan Luo, Wentao Zhao:
Privacy-Preserving Swarm Learning Based on Homomorphic Encryption. ICA3PP (3) 2021: 509-523
[c4]Luming Yang, Shaojing Fu, Yongjun Wang, Chao Li, Shanghuai Feng, Yuchuan Luo, Lin Liu:
Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic. ISPA/BDCloud/SocialCom/SustainCom 2021: 1126-1134- 2020
[j3]Lin Liu
, Jinshu Su, Baokang Zhao, Qiong Wang, Jinrong Chen, Yuchuan Luo:
Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things. Symmetry 12(1): 103 (2020)
[j2]Lin Liu
, Rongmao Chen
, Ximeng Liu
, Jinshu Su, Linbo Qiao
:
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud. IEEE Trans. Inf. Forensics Secur. 15: 2914-2929 (2020)
[c3]Jinrong Chen
, Lin Liu, Rongmao Chen, Wei Peng:
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition. ACISP 2020: 309-329
2010 – 2019
- 2019
[j1]Lin Liu
, Jinshu Su
, Ximeng Liu
, Rongmao Chen
, Kai Huang
, Robert H. Deng
, Xiaofeng Wang:
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data. IEEE Internet Things J. 6(6): 9841-9852 (2019)
[c2]Lin Liu, Jinshu Su, Rongmao Chen, Jinrong Chen, Guangliang Sun, Jie Li:
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data. ML4CS 2019: 361-377- 2018
[c1]Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ACISP 2018: 431-451
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-07 00:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







