Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen (2019), Using Sparse Representation to Detect Anomalies in Complex WSNs, In ACM Transactions on Intelligent Systems and Technology Volume 10.

Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu (2018), An efficient access control scheme with outsourcing capability and attribute update for fog computing, In Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications Volume 78 p.753-762.

Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei (2018), Auditable sigma-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing, In IEEE Transactions on Information Forensics and Security Volume 13 p.94-105.

Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang (2018), Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things, In IEEE Transactions on Industrial Informatics Volume 14 p.3618-3627.

Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim Kwang Raymond Choo (2018), CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage, In IEEE Transactions on Services Computing.

Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao (2018), Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format, In IEEE Transactions on Services Computing.

Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen (2018), Message integration authentication in the internet-of-things via lattice-based batch signatures, In Sensors (Switzerland) Volume 18.

Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning (2018), Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat, In Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications Volume 79 p.337-349.

Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang (2018), Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list, Bart Preneel, Frederik Vercauteren (Eds.), In Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings p.516-534, Springer.

Guanghui Zhao, Xingyan Zi, Kaitai Liang, Panyi Yun, Junwei Zhou (2017), A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes, In GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017) p.222-236.