Publication
Authored Books
F. Guo, W. Susilo and Y. Mu. Introduction to Security Reduction. Springer, 2018. ISBN: 978-3-319-93048-0.
K.C. Li, X. Chen, and W. Susilo. Advances in Cyber Security: Principles, Techniques, and Applications. Springer, 2019. ISBN: 978-981-13-1483-4
X. Chen, W. Susilo, and E. Bertino. Cyber Security Meets Machine Learning. Springer, 2021. ISBN: 978-981-33-6726-5
Refereed Journal Articles (Selected)
W. Susilo, F. Guo, Z. Zhao, Y. Jiang and C. Ge. Secure Replication-Based Outsourced Computation Using Smart Contracts. IEEE Transactions on Service Computing. 2023.
W. Susilo, F. Guo, Z. Zhao and G. Wu. PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. IEEE Transactions Cloud Computing 10(2): 1476-1488, 2022.
W. Susilo, P. Jiang, J. Lai, F. Guo, G. Yang and R. H. Deng: Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable and Secure Computing 19(3): 2138-2148, 2022.
W. Susilo, J. Tonien and G. Yang: Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA. Computer Standards and Interfaces 74: 103470, 2021.
W. Susilo, F. Guo, Z. Zhao and G. Wu: PKE-MET: Public-Key Encryption with Multi-Ciphertext Equality Test in Cloud Computing. IEEE Transactions on Cloud Computing. 2021.
W. Susilo, J. Tonien and G. Yang: A generalised bound for the Wiener attack on RSA. Journal of Information Security and Applications 53: 102531 (2020).
Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K-K. R. Choo. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Transactions on Dependable and Secure Computing 16(1): 72-83, 2019.
W. Susilo, G. Yang, F. Guo and Q. Huang. Constant-Size Ciphertexts in Threshold Attribute-Based Encryption without Dummy Attributes. Information Sciences, Volume 429, pp. 349360, March 2018. https://doi.org/10.1016/j.ins.2017.11.037
C. Ge, W. Susilo, L. Fang, J. Wang and Y. Shi. A CCA-secure key-policy attribute-based proxy reencryption in the adaptive corruption model for dropbox data sharing system. Design, Codes and Cryptography 86(11): 2587-2603, 2018.
J. Shen, T. Zhou, X. Chen, J. Li and W. Susilo. Anonymous and Traceable Group Data Sharing in Cloud Computing. IEEE Transactions on Information Forensics and Security, 13(4): 912-925, 2017.
W. Susilo, P. Jiang, F. Guo, G. Yang, Y. Yu and Y. Mu. EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Transactions on Information Forensics and Security, Vol. 12, Issue 12, pp. 3110 - 3122, 2017.
J. Shen, J. Shen, X. Chen, X. Huang and W. Susilo. An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data. IEEE Transactions on Information Forensics and Security, Vol. 12, Issue 10, pp. 2402- 2415, 2017.
Y. Wang, Q. Wu, B. Qin, S. Tang and W. Susilo. Online/Offline Provable Data Possession. IEEE Transactions on Information Forensics and Security, Vol. 12, pp. 1182-1194, 2017.
Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni and K-K. R. Choo. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Transactions on Dependable and Secure Computing (TDSC), 2017. DOI:10.1109/tdsc.2017.2662216.
T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo and W. Lou. Secure and Efficient Cloud Data Deduplication with Ramdomized Tag. IEEE Transactions in Information Forensics and Security, Vol 12, Issue 3, pp. 532 - 543, 2017.
Refereed Conference Proceedings (Selected)
S. Wang, Y. Gao, A. Fu, Z. Zhang, Y. Zhang, W. Susilo and D. Liu. CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023, pp. 938-950, 2023 (Distinguished Paper Award).
W. Zong, Y-W. Chow, W. Susilo, K. Do and S. Venkatesh. TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. IEEE Symposium on Security and Privacy 2023, pp. 1667-1683, 2023.
T. Chen, P. Xu, S. Picek, B. Loo, W. Susilo, H. Jin and K. Liang. The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023.
S. Lin, X. Zhang, C. Chen, X. Chen and W. Susilo. ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer. IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20147-20155, 2023.
K. Nguyen, F. Guo, W. Susilo and G. Yang. Multimodal Private Signatures. CRYPTO 2022, pp. 792-822, 2022.
R. Yang, Z. Yu, M. H. Au and W. Susilo. Public-Key Watermarking Schemes for Pseudorandom Functions. CRYPTO 2022, pp. 637 - 668, 2022.
F. Guo and W. Susilo. Optimal Tightness for Chain-Based Unique Signatures. EUROCRYPT 2022, pp. 553 - 583, 2022.
G. Tang, D. H. Duong, A. Joux, T. Plantard, Y. Qiao and W. Susilo. Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. EUROCRYPT 2022, pp. 582 - 612, 2022.
J. Pan, X. Chen, F. Zhang and W. Susilo. Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. ASIACRYPT 2021, pp. 156 - 186, 2021.
K. Nguyen, R. Safavi-Naini, W. Susilo, H. Wang, Y. Xu and N. Zheng. Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. The 24th International Conference on Practice and Theory of Public-Key Cryptography (PKC 2021), 2021.
R. Yang, J. Lai, Z. Huang, M. H. Au, Q. Xu and W. Susilo. Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT 2020, pp. 191-220, 2020.
J. Baek, J. Kim and W. Susilo. Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. AsiaCCS 2020, pp. 116-126, 2020 (best paper award).
W. Susilo, D. H. Duong, H. Q. Le and J. Pieprzyk. Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. ESORICS 2020, pp. 107-127, 2020.
W. Susilo, J. Tonien and G. Yang. The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. ACISP 2019, pp. 381-398, 2019.
F. Guo, R. Chen, W. Susilo, G. Yang, J. Lai and Y. Mu. Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. The 37th International Cryptology Conference - CRYPTO 2017, pp 517-547, 2017.
F. Guo, W. Susilo, Y. Mu, R. Chen, J. Lai and G. Yang. Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. Advances in Cryptology - ASIACRYPT 2016. Lecture Notes in Computer Science 10032, pp. 745-776, 2016.
R. Chen, Y. Mu, G. Yang, W. Susilo, F. Guo and M. Zhang. Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Advances in Cryptology - ASIACRYPT 2016. Lecture Notes in Computer Science 10031, pp. 844-876, 2016.
W. Susilo, R. Chen, F. Guo, G. Yang, Y. Mu and Y-W. Chow. Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext”, The 2016 ACM Asia Conf on Comp and Comm Security (ASIACCS 2016), 2016.
F. Guo, W. Susilo and Y. Mu. Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. 21st ACM Conference on Computer and Communications Security (ACM CCS 2014), 2014.
Q. Wu, Y. Mu, W. Susilo, B. Qin and J. Domingo-Ferrer. Asymmetric Group Key Agreement. EUROCRYPT 2009, pp. 153-170, 2009.
Q. Huang, G. Yang, D. S. Wong and W. Susilo. Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008, pp. 74-89, 2008.
J. Baek, R. Safavi-Naini and W. Susilo. Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005, pp. 644-661, 2005.