.- Secure Federated Distillation Framework for Encrypted Traffic Classification .
.- TriNT: A Framework for ROV Identification based on Triplet.
.- Lattice-Based Universal Designated Multi-Verifiers Signature Scheme.
.- Differential Cryptanalysis against SIMECK Implementation in a Leakage Profiling Scenario.
.- Shrinkable Ring Signatures: It wasn't them.
.- Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC.
.- Isogeny-based Password-Authenticated Key Exchange based on Shuffle Algorithm.
.- A New Construction of Leakage-resilient Identity-based Encryption Scheme.
.- Enhancing Portability in Deep Learning-based Side-Channel Attacks against Kyber.
.- Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption.
.- Breaking GEA-like Stream Ciphers with Lower Time Cost.
.- SNIPER: Detect Complex Attacks Accurately from Traffic.
.- From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework.
.- Efficient Large-Scale Multi-Party Computation Based on Garbled Circuit.
.- Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures.
.- Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection.
.- An eID-based Privacy-enhanced Public Transportation Ticket System.
.- Outsourced and Robust Multi-Party Computation with Identifying Malicious Behavior and Application to Machine Learning.
.- Controlled Multi-Client Functional Encryption for Flexible Access Control.
.- A Secure Incentive Mechanism in Blockchain-based Mobile Crowdsensing.
.- A Comparative Analysis of Phishing Tools: Features and Countermeasures.
.- OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT.