.- AI-based Security Applications and Technologies.
.- Dual-FER: A Dual-Network Approach to Facial Expression Recognition
with Enhanced Generalization.
.- Digital Forensics in Ransomware Analysis for Windows-Based
Computer Systems.
.- Evaluating Deep Learning in Gait Recognition.
.- Composite Weather Image Restoration Based on Two-Stage Feature
Learning.
.- An Efficient Explainability Framework for Graph Neural Networks.
.- Cryptographic Protocols Design and Analysis.
.- Post-Quantum Privacy-Preserving Smart Meter Data Collection
Scheme from Coding.
.- High-Throughput Threshold SM2 Signatures with Robustness.
.- Attacks on Implementations of Lindell 17 and its Variants.
.- RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium
for VANETs.
.- A Key Derivation Tree-Based Encryption and Verification Scheme for
EV Data Auditing.
.- Security Weaknesses in ISO 15118-Based CCS2 Charging.
.- Model Security and Copyright Protection.
.- SemBits: Multi-Bit Semantic Watermarking with Sentence-Level
Hashing for LLMs.
.- Robust Ownership Verification in Large Language Models via
Equivalent Neuron Pair Encoding.
.- FreMark: Frequency-Domain Watermark Embedding in Quantized LLMs.
.- Bypassing Cross-Domain Restrictions with Unsupervised Visual
Translation.