Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang (2019), Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices, In IEEE Systems Journal Volume 13 p.2775-2785.

Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang (2019), Passive Attacks Against Searchable Encryption, In IEEE Transactions on Information Forensics and Security Volume 14 p.789-802.

Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang (2019), Polynomial-based modifiable blockchain structure for removing fraud transactions, In Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications Volume 99 p.154-163.

Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen (2019), Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.

Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos (2019), Secure Edge Computing with Lightweight Control-Flow Property-based Attestation.

Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han (2019), Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case, In IEEE Internet of Things Journal Volume 6 p.10177-10190.

Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen (2019), Using Sparse Representation to Detect Anomalies in Complex WSNs, In ACM Transactions on Intelligent Systems and Technology Volume 10.

Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu (2018), An efficient access control scheme with outsourcing capability and attribute update for fog computing, In Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications Volume 78 p.753-762.

Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei (2018), Auditable sigma-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing, In IEEE Transactions on Information Forensics and Security Volume 13 p.94-105.

Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang (2018), Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things, In IEEE Transactions on Industrial Informatics Volume 14 p.3618-3627.