If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2019

A flexible instant payment system based on blockchain

Zhong, L., Wang, H., Xie, J., Qin, B., Liu, J. K. & Wu, Q., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 289-306 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

A generic construction of tightly secure signatures in the multi-user setting

Zhang, X., Liu, S., Gu, D. & Liu, J. K., 5 Jul 2019, In : Theoretical Computer Science. 775, p. 32-52 21 p.

Research output: Contribution to journalArticleResearchpeer-review

A multi-client DSSE scheme supporting range queries

Loh, R., Zuo, C., Liu, J. K. & Sun, S. F., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 289-307 19 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications

Meng, M. H., Bai, G., Liu, J. K., Luo, X. & Wang, Y., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 349-369 21 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Building a dynamic searchable encrypted medical database for multi-client

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 19 May 2019, In : Information Sciences. 28 p.

Research output: Contribution to journalArticleResearchpeer-review

DGM: a dynamic and revocable Group Merkle signature

Buser, M., Liu, J., Steinfeld, R., Sakzad, A. & Sun, S-F., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 194-214 21 p. (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient and Adaptive Procurement Protocol with Purchasing Privacy

Jiang, P., Guo, F., Susilo, W., Au, M. H., Huang, X. & Liu, J. K., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Efficient threshold password-authenticated secret sharing protocols for cloud computing

Yi, X., Tari, Z., Hao, F., Chen, L., Liu, J. K., Yang, X., Lam, K. Y., Khalil, I. & Zomaya, A. Y., Jun 2019, In : Journal of Parallel and Distributed Computing. 128, p. 57-70 14 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Evaluating CryptoNote-style blockchains

Han, R., Yu, J., Liu, J. & Zhang, P., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 29-48 20 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Fast-to-finalize Nakamoto-like consensus

Tang, S., Chow, S. S. M., Liu, Z. & Liu, J. K., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 271-288 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Generic multi-keyword ranked search on encrypted cloud data

Kasra Kermanshahi, S., Liu, J. K., Steinfeld, R. & Nepal, S., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 322-343 22 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

GraphSE2: an encrypted graph database for privacy-preserving social search

Lai, S., Yuan, X., Sun, S-F., Liu, J. K., Liu, Y. & Liu, D., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 41-54 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications

Esgin, M. F., Steinfeld, R., Liu, J. K. & Liu, D., 2019, Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference Santa Barbara, CA, USA, August 18–22, 2019 Proceedings, Part I. Boldyreva, A. & Micciancio, D. (eds.). Cham Switzerland: Springer, p. 115-146 32 p. (Lecture Notes in Computer Science ; vol. 11692 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets

Alberto Torres, W., Kuchta, V., Steinfeld, R., Sakzad, A., Liu, J. K. & Cheng, J., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

On the unforkability of Monero

Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D. & Yu, J., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 621-632 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File
3 Citations (Scopus)

Private machine learning classification based on fully homomorphic encryption

Sun, X., Zhang, P., Liu, J. K., Yu, J. & Xie, W., 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. p. 1-13 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Proof-of-QoS: QoS based blockchain consensus protocol

Yu, B., Liu, J., Nepal, S., Yu, J. & Rimba, P., Nov 2019, In : Computers & Security. 87, 13 p., 101580.

Research output: Contribution to journalArticleResearchpeer-review

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Strong leakage and tamper-resilient PKE from refined hash proof system

Sun, S. F., Gu, D., Au, M. H., Han, S., Yu, Y. & Liu, J., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 486-506 21 p. (Lecture Notes in Computer Science; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Time-dependent decision-making and decentralization in Proof-of-Work Cryptocurrencies

Zolotavkin, Y., Garcia, J. & Liu, J., 2019, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. Delaune, S. & Jia, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 108-121 14 p. 8823663

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards multi-user searchable encryption supporting Boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W., Baek, J., You, I. & Chen, X., 28 Mar 2019, In : Journal of Universal Computer Science. 25, 3, p. 222-244 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2018
1 Citation (Scopus)

Access control encryption with efficient verifiable sanitized decryption

Wang, H., Chen, K., Liu, J. K., Hu, Z. & Long, Y., Oct 2018, In : Information Sciences. 465, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Adding confidential transactions to cryptocurrency IOTA with Bulletproofs

Ince, P., Liu, J. K. & Zhang, P., 2018, Network and System Security : 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland: Springer, p. 32-45 14 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

A multi-client dynamic searchable symmetric encryption system with physical deletion

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security : 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 516-528 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

23 Citations (Scopus)

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Attribute-based hybrid boolean keyword search over outsourced encrypted data

He, K., Guo, J., Weng, J., Weng, J., Liu, J. K. & Yi, X., 6 Aug 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Compact ring signature in the standard model for blockchain

Ren, H., Zhang, P., Shentu, Q., Liu, J. K. & Yuen, T. H., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 50-65 16 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

6 Citations (Scopus)

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 228-246 19 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Expressive attribute-based keyword search with constant-size ciphertext

Han, J., Yang, Y., Liu, J. K., Li, J., Liang, K. & Shen, J., Aug 2018, In : Soft Computing. 22, 15, p. 5163-5177 15 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Zuo, C., Shao, J., Liu, J. K., Wei, G. & Ling, Y., Jan 2018, In : IEEE Transactions on Information Forensics and Security. 13, 1, p. 186-196 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018 Guangzhou, China, November 15–17, 2018 Proceedings, Part IV. Vaidya, J. & Li, J. (eds.). Cham Switzerland: Springer, p. 85-97 13 p. (Lecture Notes in Computer Science ; vol. 11337 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption

Li, Y., Tao, X., Wu, W. & Liu, J. K., 2018, In : International Journal of Embedded Systems. 10, 1, p. 62-70 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Leakage-resilient chosen-ciphertext secure functional encryption from garbled circuits

Wang, H., Chen, K., Liu, J. K. & Hu, Z., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 119-140 22 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Monero ring attack: recreating zero mixin transaction effect

Wijaya, D. A., Liu, J., Steinfeld, R. & Liu, D., 5 Sep 2018, Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1196-1201 6 p. 8456034

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

Platform-independent secure blockchain-based voting system

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P. & Au, M. H., 2018, Information Security: 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science ; vol. 11060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Position paper on blockchain technology: smart contract and applications

Meng, W., Wang, J., Wang, X., Liu, J., Yu, Z., Li, J., Zhao, Y. & Chow, S. S. M., 2018, Network and System Security: 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland : Springer, p. 474-483 10 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

9 Citations (Scopus)

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

Au, M. H. A., Liang, K. A., Liu, J. K., Lu, R. & Ning, J., Feb 2018, In : Future Generation Computer Systems. 79, 1, p. 337-349 12 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Rethinking authentication on smart mobile devices

Wang, D., Shen, J., Liu, J. K. & Choo, K-K. R., 18 Dec 2018, In : Wireless Communications and Mobile Computing. 2018, 5 p., 7079037.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File

Revocable Identity-based encryption from the Computational Diffie-Hellman problem

Hu, Z., Liu, S., Chen, K. & Liu, J. K., 2018, Information Security and Privacy : 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 265-283 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

9 Citations (Scopus)

Server-Aided Attribute-Based Signature with Revocation for Resource-Constrained Industrial Internet of Things Devices

Cui, H., Deng, R. H., Liu, J. K., Yi, X. & Li, Y., Aug 2018, In : IEEE Transactions on Industrial Informatics. 14, 8, p. 3724-3732 9 p.

Research output: Contribution to journalArticleResearchpeer-review

7 Citations (Scopus)

Time-based direct revocable Ciphertext-Policy Attribute-Based Encryption with short revocation list

Liu, J. K., Yuen, T. H., Zhang, P. & Liang, K., 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018 Leuven, Belgium, July 2–4, 2018 Proceedings. Preneel, B. & Vercauteren, F. (eds.). Cham Switzerland: Springer, p. 516-534 19 p. (Lecture Notes in Computer Science ; vol. 10892 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

5 Citations (Scopus)

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review