default search action
Cong Wang 0001
Person information
- unicode name: 王聰
- affiliation: City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation (until 2012): Illinois Institute of Technology, Chicago, IL, USA
Other persons with the same name
- Cong Wang — disambiguation page
- Cong Wang 0002 — Simon Fraser University, Burnaby, Canada
- Cong Wang 0003 — Beijing University of Posts and Telecommunications, School of Software Engineering, China
- Cong Wang 0004 — Tianjin University of Science and Technology, College of Computer Science and Information Engineering, China (and 1 more)
- Cong Wang 0005 — Harbin Institute of Technology, School of Electronics and Information Engineering, China (and 1 more)
- Cong Wang 0006 — George Mason University, USA (and 2 more)
- Cong Wang 0007 — Shandong University, School of Control Science and Engineering, Jinan, China (and 3 more)
- Cong Wang 0008 — Army Engineering University of PLA, College of Communications Engineering, Nanjing, China
- Cong Wang 0009 — Northeastern University at Qinhuangdao, School of Computer and Communication Engineering, China
- Cong Wang 0010 — École Polytechnique Fédérale de Lausanne, Switzerland
- Cong Wang 0011 — Southeast University, National Mobile Commutation Research Laboratory, Nanjing, China (and 1 more)
- Cong Wang 0012 — University of California Santa Cruz, CA, USA (and 2 more)
- Cong Wang 0013 — Northwestern Polytechnical University, School of Computer Science, Shaanxi Provincial Key Laboratory of Speech and Image Information Processing, Xi'an, China
- Cong Wang 0014 — University of North Carolina at Chapel Hill, NC, USA (and 1 more)
- Cong Wang 0015 — New Jersey Institute of Technology, Newark, NJ, USA (and 1 more)
- Cong Wang 0016 — Wright State University, Dayton, OH, USA
- Cong Wang 0017 — Tianjin University, College of Intelligence and Computing, China
- Cong Wang 0018 — Hong Kong Polytechnic University, Department of Computing, Hong Kong (and 1 more)
- Cong Wang 0019 — Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Cong Wang 0020 — Tsinghua University, School of Software, KLISS, BNRist, Beijing, China
- Cong Wang 0021 — University of Queensland, Queensland Brain Institute, Saint Lucia, QLD, Australia (and 1 more)
- Cong Wang 0022 — Macquarie University, Department of Economics, Sydney, NSW, Australia
- Cong Wang 0023 — Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Cong Wang 0024 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 1 more)
- Cong Wang 0025 — Singapore-MIT Alliance for Research and Technology, Singapore (and 1 more)
- Cong Wang 0026 — Tianjin University, School of Electrical and Information Engineering, China (and 1 more)
- Cong Wang 0027 — Chinese Academy of Sciences, Shenyang Institute of Automation, China (and 1 more)
- Cong Wang 0028 — Nanjing University of Aeronautics and Astronautics, Department of Biomedical Engineering, China
- Cong Wang 0029 — Capital Normal University, School of Mathematical Sciences, Beijing, China (and 1 more)
- Cong Wang 0030 — China University of Mining and Technology, School of Mechanical, Electronic and Information Engineering, Beijing, China
- Cong Wang 0031 — Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, Jiangsu Key Laboratory of Medical Optics, China (and 1 more)
- Cong Wang 0032 (aka: Cherry Cong Wang) — University of Washington, Information School, Seattle, WA, USA
- Cong Wang 0033 — Northwestern Polytechnical University, School of Artificial Intelligence, OPtics and ElectroNics, iOPEN, Xi'an, China (and 2 more)
- Cong Wang 0034 — Nanjing University, State Key Laboratory for Novel Software Technology, Nanjing, China
- Cong Wang 0035 — Jilin University, College of Communication Engineering, Changchun, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j130]Lei Xu, Jiaqing Chen, Shan Chang, Cong Wang, Bo Li:
Toward Quality-Aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond. IEEE Netw. 38(5): 213-219 (2024) - [j129]Zhengxiang Zhou, Cong Wang:
ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation. IEEE Open J. Comput. Soc. 5: 95-106 (2024) - [j128]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. Proc. VLDB Endow. 17(10): 2445-2458 (2024) - [j127]Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. IEEE Trans. Dependable Secur. Comput. 21(2): 789-803 (2024) - [j126]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IEEE Trans. Dependable Secur. Comput. 21(4): 1918-1934 (2024) - [j125]Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia:
Machine Unlearning: Solutions and Challenges. IEEE Trans. Emerg. Top. Comput. Intell. 8(3): 2150-2168 (2024) - [j124]Yu Guo, Yu Zhao, Saihui Hou, Cong Wang, Xiaohua Jia:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. IEEE Trans. Inf. Forensics Secur. 19: 708-721 (2024) - [j123]Mingyue Wang, Zizhuo Chen, Yinbin Miao, Hejiao Huang, Cong Wang, Xiaohua Jia:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. IEEE Trans. Inf. Forensics Secur. 19: 1213-1226 (2024) - [j122]Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. IEEE Trans. Inf. Forensics Secur. 19: 3309-3323 (2024) - [j121]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Cong Wang:
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security. IEEE Trans. Inf. Forensics Secur. 19: 5999-6014 (2024) - [j120]Yuefeng Du, Anxin Zhou, Cong Wang:
DWare: Cost-Efficient Decentralized Storage With Adaptive Middleware. IEEE Trans. Inf. Forensics Secur. 19: 8529-8543 (2024) - [j119]Ningping Mou, Binqing Guo, Lingchen Zhao, Cong Wang, Yue Zhao, Qian Wang:
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures. IEEE Trans. Inf. Forensics Secur. 19: 9803-9818 (2024) - [j118]Yu Guo, Yuxin Xi, Haodi Wang, Mingyue Wang, Cong Wang, Xiaohua Jia:
FedEDB: Building a Federated and Encrypted Data Store via Consortium Blockchains. IEEE Trans. Knowl. Data Eng. 36(11): 6210-6224 (2024) - [j117]Jie Xu, Sen Peng, Cong Wang, Xiaohua Jia:
PuffChain: A Dynamic Scaling Blockchain System With Optimal Effective Throughput. IEEE Trans. Netw. Sci. Eng. 11(3): 3199-3212 (2024) - [j116]Jie Xu, Yulong Ming, Zihan Wu, Cong Wang, Xiaohua Jia:
X-Shard: Optimistic Cross-Shard Transaction Processing for Sharding-Based Blockchains. IEEE Trans. Parallel Distributed Syst. 35(4): 548-559 (2024) - [j115]Zhongyun Hua, Yufei Yao, Mingyang Song, Yifeng Zheng, Yushu Zhang, Cong Wang:
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service. IEEE Trans. Serv. Comput. 17(3): 821-835 (2024) - [j114]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024) - [c114]Rui Lian, Yulong Ming, Chengjun Cai, Yifeng Zheng, Cong Wang, Xiaohua Jia:
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting. ESORICS (2) 2024: 247-267 - [c113]Yichen Zang, Chengjun Cai, Wentao Dong, Lei Xu, Cong Wang:
HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB. ICDCS 2024: 1260-1271 - [c112]Yiqi Liu, Shan Chang, Ye Liu, Bo Li, Cong Wang:
FairFed: Improving Fairness and Efficiency of Contribution Evaluation in Federated Learning via Cooperative Shapley Value. INFOCOM 2024: 621-630 - [c111]Shan Chang, Ye Liu, Zhijian Lin, Hongzi Zhu, Bingzhu Zhu, Cong Wang:
FedTrojan: Corrupting Federated Learning via Zero-Knowledge Federated Trojan Attacks. IWQoS 2024: 1-10 - [c110]Yi Liu, Cong Wang, Xingliang Yuan:
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning. KDD 2024: 1944-1955 - [c109]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. ACM Multimedia 2024: 3578-3586 - [c108]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Network by Analyzing Training Data. USENIX Security Symposium 2024 - [c107]Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen:
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. USENIX Security Symposium 2024 - [c106]Yichen Zang, Chengjun Cai, Wentao Dong, Cong Wang:
VizardFL: Enabling Private Participation in Federated Learning Systems. WISE (2) 2024: 243-257 - [c105]Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia:
Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process. WISE (2) 2024: 290-305 - [i46]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Networks by Analyzing Training Data. CoRR abs/2401.09740 (2024) - [i45]Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia:
LMEraser: Large Model Unlearning through Adaptive Prompt Tuning. CoRR abs/2404.11056 (2024) - [i44]Yi Liu, Cong Wang, Xingliang Yuan:
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning. CoRR abs/2406.12222 (2024) - [i43]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. CoRR abs/2407.15050 (2024) - [i42]Leqian Zheng, Zheng Zhang, Wentao Dong, Yao Zhang, Ye Wu, Cong Wang:
H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM. CoRR abs/2409.07167 (2024) - [i41]Haodi Wang, Tangyu Jiang, Yu Guo, Chengjun Cai, Cong Wang, Xiaohua Jia:
GReDP: A More Robust Approach for Differential Private Training with Gradient-Preserving Noise Reduction. CoRR abs/2409.11663 (2024) - 2023
- [j113]Zheng Zheng, Qian Wang, Cong Wang:
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones. IEEE Commun. Mag. 61(12): 213-219 (2023) - [j112]Jie Xu, Cong Wang, Xiaohua Jia:
A Survey of Blockchain Consensus Protocols. ACM Comput. Surv. 55(13s): 278:1-278:35 (2023) - [j111]Yanling Wang, Qian Wang, Lingchen Zhao, Cong Wang:
Differential privacy in deep learning: Privacy and beyond. Future Gener. Comput. Syst. 148: 408-424 (2023) - [j110]Zhengxiang Zhou, Cong Wang:
Practical Anti-Fuzzing Techniques With Performance Optimization. IEEE Open J. Comput. Soc. 4: 206-217 (2023) - [j109]Jing Yao, Xiangyi Meng, Yifeng Zheng, Cong Wang:
Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes. IEEE Trans. Cloud Comput. 11(2): 1854-1870 (2023) - [j108]Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au, Qian Wang:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 20(1): 708-723 (2023) - [j107]Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [j106]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. IEEE Trans. Dependable Secur. Comput. 20(2): 988-1001 (2023) - [j105]Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j104]Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j103]Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, Qi Li:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j102]Yu Guo, Chen Zhang, Cong Wang, Xiaohua Jia:
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain. IEEE Trans. Dependable Secur. Comput. 20(3): 2111-2126 (2023) - [j101]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
Optimizing Secure Decision Tree Inference Outsourcing. IEEE Trans. Dependable Secur. Comput. 20(4): 3079-3092 (2023) - [j100]Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang:
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services. IEEE Trans. Dependable Secur. Comput. 20(5): 4343-4358 (2023) - [j99]Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j98]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Qian Wang, Cong Wang:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2929-2944 (2023) - [j97]Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng. 35(4): 4236-4252 (2023) - [j96]Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, Cong Wang:
SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases. IEEE Trans. Knowl. Data Eng. 35(9): 8955-8967 (2023) - [j95]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service. IEEE Trans. Knowl. Data Eng. 35(10): 10478-10496 (2023) - [j94]Mingyue Wang, Yinbin Miao, Yu Guo, Hejiao Huang, Cong Wang, Xiaohua Jia:
AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems. IEEE Trans. Parallel Distributed Syst. 34(1): 92-107 (2023) - [j93]Jie Xu, Qingyuan Xie, Sen Peng, Cong Wang, Xiaohua Jia:
AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication. IEEE Trans. Parallel Distributed Syst. 34(6): 1909-1922 (2023) - [j92]Mingyue Wang, Yu Guo, Chen Zhang, Cong Wang, Hejiao Huang, Xiaohua Jia:
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. IEEE Trans. Serv. Comput. 16(1): 438-451 (2023) - [j91]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. IEEE Trans. Serv. Comput. 16(1): 656-669 (2023) - [j90]Sen Peng, Yufei Chen, Jie Xu, Zizhuo Chen, Cong Wang, Xiaohua Jia:
Intellectual property protection of DNN models. World Wide Web (WWW) 26(4): 1877-1911 (2023) - [c104]Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CCS 2023: 3003-3017 - [c103]Wentao Dong, Cong Wang:
Poster: Towards Lightweight TEE-Assisted MPC. CCS 2023: 3609-3611 - [c102]Peipei Jiang, Qian Wang, Yihao Wu, Cong Wang:
Poster: Metadata-private Messaging without Coordination. CCS 2023: 3615-3617 - [c101]Jiamin Li, Qiang Su, Yitao Yang, Yimin Jiang, Cong Wang, Hong Xu:
Adaptive Gating in Mixture-of-Experts based Language Models. EMNLP 2023: 3577-3587 - [c100]Jiamin Li, Hong Xu, Yibo Zhu, Zherui Liu, Chuanxiong Guo, Cong Wang:
Lyra: Elastic Scheduling for Deep Learning Clusters. EuroSys 2023: 835-850 - [c99]Xinyan Li, Yuefeng Du, Cong Wang:
RangeQC: A Query Control Framework for Range Query Leakage Quantification and Mitigation. ICDCS 2023: 749-759 - [c98]Yufei Cui, Ziquan Liu, Xiangyu Liu, Xue Liu, Cong Wang, Tei-Wei Kuo, Chun Jason Xue, Antoni B. Chan:
Bayes-MIL: A New Probabilistic Perspective on Attention-based Multiple Instance Learning for Whole Slide Images. ICLR 2023 - [c97]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [c96]Yanling Wang, Yuchen Liu, Qian Wang, Cong Wang, Chenliang Li:
Poisoning Self-supervised Learning Based Sequential Recommendations. SIGIR 2023: 300-310 - [c95]Jiamin Li, Yimin Jiang, Yibo Zhu, Cong Wang, Hong Xu:
Accelerating Distributed MoE Training and Inference with Lina. USENIX ATC 2023: 945-959 - [c94]Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang:
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation. USENIX Security Symposium 2023: 1307-1324 - [c93]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Cong Wang, Chao Shen:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [e5]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i40]Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia:
Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process. CoRR abs/2306.03436 (2023) - [i39]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. CoRR abs/2306.16851 (2023) - [i38]Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia:
Machine Unlearning: Solutions and Challenges. CoRR abs/2308.07061 (2023) - [i37]Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CoRR abs/2309.04697 (2023) - [i36]Jiamin Li, Qiang Su, Yitao Yang, Yimin Jiang, Cong Wang, Hong Xu:
Adaptive Gating in Mixture-of-Experts based Language Models. CoRR abs/2310.07188 (2023) - 2022
- [j89]Xinyu Tang, Cheng Guo, Yizhi Ren, Cong Wang, Kim-Kwang Raymond Choo:
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems. IEEE Syst. J. 16(2): 1717-1728 (2022) - [j88]Yifeng Zheng, Huayi Duan, Cong Wang, Ruochen Wang, Surya Nepal:
Securely and Efficiently Outsourcing Decision Tree Inference. IEEE Trans. Dependable Secur. Comput. 19(3): 1841-1855 (2022) - [j87]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. IEEE Trans. Dependable Secur. Comput. 19(5): 3038-3054 (2022) - [j86]Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, Liming Fang:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Trans. Dependable Secur. Comput. 19(5): 3055-3070 (2022) - [j85]Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. IEEE Trans. Dependable Secur. Comput. 19(5): 3149-3167 (2022) - [j84]Yu Guo, Hongcheng Xie, Cong Wang, Xiaohua Jia:
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services. IEEE Trans. Dependable Secur. Comput. 19(5): 3401-3416 (2022) - [j83]Chengjun Cai, Lei Xu, Anxin Zhou, Cong Wang:
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains. IEEE Trans. Dependable Secur. Comput. 19(6): 3640-3655 (2022) - [j82]Wanyu Lin, Baochun Li, Cong Wang:
Towards Private Learning on Decentralized Graphs With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 17: 2936-2946 (2022) - [j81]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. IEEE Trans. Inf. Forensics Secur. 17: 3582-3596 (2022) - [j80]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j79]Libin Liu, Hong Xu, Zhixiong Niu, Jingzong Li, Wei Zhang, Peng Wang, Jiamin Li, Chun Jason Xue, Cong Wang:
ScaleFlux: Efficient Stateful Scaling in NFV. IEEE Trans. Parallel Distributed Syst. 33(12): 4801-4817 (2022) - [j78]Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [j77]Yu Guo, Hongcheng Xie, Yinbin Miao, Cong Wang, Xiaohua Jia:
FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain. IEEE Trans. Serv. Comput. 15(4): 2060-2073 (2022) - [c92]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. CCS 2022: 441-454 - [c91]Yuefeng Du, Anxin Zhou, Cong Wang:
Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization. ICDCS 2022: 1133-1143 - [c90]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c89]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. INFOCOM 2022: 1749-1758 - [c88]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. NeurIPS 2022 - [c87]Zhengxiang Zhou, Cong Wang, Qingchuan Zhao:
No-Fuzz: Efficient Anti-fuzzing Techniques. SecureComm 2022: 731-751 - [c86]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. SERVICES 2022: 14 - [c85]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. USENIX Security Symposium 2022: 3593-3610 - [c84]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [e4]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i35]Wanyu Lin, Baochun Li, Cong Wang:
Towards Private Learning on Decentralized Graphs with Local Differential Privacy. CoRR abs/2201.09398 (2022) - [i34]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022) - [i33]Jiamin Li, Hong Xu, Yibo Zhu, Zherui Liu, Chuanxiong Guo, Cong Wang:
Aryl: An Elastic Cluster Scheduler for Deep Learning. CoRR abs/2202.07896 (2022) - [i32]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. CoRR abs/2203.07320 (2022) - [i31]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. CoRR abs/2209.03526 (2022) - [i30]Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, Cong Wang:
SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases. CoRR abs/2209.07064 (2022) - [i29]Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. CoRR abs/2210.11334 (2022) - [i28]Jiamin Li, Yimin Jiang, Yibo Zhu, Cong Wang, Hong Xu:
Lita: Accelerating Distributed Training of Sparsely Activated Models. CoRR abs/2210.17223 (2022) - [i27]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. CoRR abs/2211.00463 (2022) - [i26]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IACR Cryptol. ePrint Arch. 2022: 894 (2022) - [i25]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. IACR Cryptol. ePrint Arch. 2022: 1115 (2022) - 2021
- [j76]Chen Zhang, Yu Guo, Xiaohua Jia, Cong Wang, Hongwei Du:
Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain. IEEE Internet Things J. 8(8): 6624-6636 (2021) - [j75]Minghui Li, Yuejing Yan, Qian Wang, Minxin Du, Zhan Qin, Cong Wang:
Secure Prediction of Neural Network in the Cloud. IEEE Netw. 35(1): 251-257 (2021) - [j74]Xinyan Li, Yufei Chen, Cong Wang, Chao Shen:
When Deep Learning Meets Differential Privacy: Privacy, Security, and More. IEEE Netw. 35(6): 148-155 (2021) - [j73]Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j72]Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng:
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 18(1): 117-130 (2021) - [j71]Chengjun Cai, Jian Weng, Xingliang Yuan, Cong Wang:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE Trans. Dependable Secur. Comput. 18(1): 131-144 (2021) - [j70]Yifeng Zheng, Huayi Duan, Xiaoting Tang, Cong Wang, Jiantao Zhou:
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising. IEEE Trans. Dependable Secur. Comput. 18(3): 1261-1275 (2021) - [j69]Shengshan Hu, Leo Yu Zhang, Qian Wang, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [j68]Helei Cui, Yajin Zhou, Cong Wang, Xinyu Wang, Yuefeng Du, Qian Wang:
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. IEEE Trans. Dependable Secur. Comput. 18(4): 1762-1778 (2021) - [j67]Chengjun Cai, Yifeng Zheng, Yuefeng Du, Zhan Qin, Cong Wang:
Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains. IEEE Trans. Dependable Secur. Comput. 18(4): 1893-1907 (2021) - [j66]Yufei Chen, Chao Shen, Cong Wang, Qixue Xiao, Kang Li, Yu Chen:
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications. IEEE Trans. Dependable Secur. Comput. 18(5): 2017-2028 (2021) - [j65]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j64]Chengjun Cai, Yifeng Zheng, Anxin Zhou, Cong Wang:
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams. IEEE Trans. Dependable Secur. Comput. 18(6): 2601-2616 (2021) - [j63]Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [j62]Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 5310-5325 (2021) - [j61]Dian Chen, Haobo Yuan, Shengshan Hu, Qian Wang, Cong Wang:
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication. IEEE Trans. Parallel Distributed Syst. 32(4): 786-798 (2021) - [j60]Wanyu Lin, Helei Cui, Baochun Li, Cong Wang:
Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 32(5): 1072-1084 (2021) - [j59]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [j58]Helei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang:
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection. IEEE Trans. Serv. Comput. 14(4): 998-1012 (2021) - [c83]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c82]Mingyue Wang, Yinbin Miao, Yu Guo, Cong Wang, Hejiao Huang, Xiaohua Jia:
Attribute-based Encrypted Search for Multi-owner and Multi-user Model. ICC 2021: 1-7 - [c81]Jie Xu, Yingying Cheng, Cong Wang, Xiaohua Jia:
Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain. ICDCS 2021: 618-628 - [c80]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c79]Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. INFOCOM 2021: 1-10 - [c78]Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c77]Rui Lian, Anxin Zhou, Yifeng Zheng, Cong Wang:
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics. QSHINE 2021: 42-53 - [e3]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i24]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021) - [i23]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i22]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i21]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. CoRR abs/2106.12478 (2021) - [i20]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - [i19]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
Optimizing Secure Decision Tree Inference Outsourcing. CoRR abs/2111.00397 (2021) - [i18]Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 1593 (2021) - 2020
- [j57]Xingliang Yuan, Chengjun Cai, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - [j56]Yu Guo, Mingyue Wang, Cong Wang, Xingliang Yuan, Xiaohua Jia:
Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes. IEEE Internet Things J. 7(6): 5359-5370 (2020) - [j55]Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu:
Toward Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Netw. 34(1): 108-115 (2020) - [j54]Kui Ren, Qian Wang, Cong Wang, Zhan Qin, Xiaodong Lin:
The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proc. IEEE 108(2): 357-372 (2020) - [j53]Yifeng Zheng, Huayi Duan, Xingliang Yuan, Cong Wang:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. IEEE Trans. Dependable Secur. Comput. 17(1): 121-133 (2020) - [j52]Yue Zhang, Jia Yu, Rong Hao, Cong Wang, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. IEEE Trans. Dependable Secur. Comput. 17(3): 608-619 (2020) - [j51]Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 17(6): 1218-1231 (2020) - [j50]Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, Cong Wang:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. IEEE Trans. Inf. Forensics Secur. 15: 315-328 (2020) - [j49]Xu Yuan, Xingliang Yuan, Yihe Zhang, Baochun Li, Cong Wang:
Enabling Encrypted Boolean Queries in Geographically Distributed Databases. IEEE Trans. Parallel Distributed Syst. 31(3): 634-646 (2020) - [j48]Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, Cong Wang:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. IEEE Trans. Serv. Comput. 13(3): 410-424 (2020) - [c76]Jing Yao, Yifeng Zheng, Yu Guo, Cong Wang:
SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search. SBC@AsiaCCS 2020: 14-20 - [c75]Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao, Feifei Li:
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services. ICDCS 2020: 23-33 - [c74]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. ICDCS 2020: 201-211 - [c73]Yuechen Tao, Bo Li, Jingjie Jiang, Hok Chu Ng, Cong Wang, Baochun Li:
On Sharding Open Blockchains with Smart Contracts. ICDE 2020: 1357-1368 - [c72]Jing Yao, Yifeng Zheng, Cong Wang, Surya Nepal:
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness. ICETE (2) 2020: 295-301 - [c71]Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu:
Enabling Execution Assurance of Federated Learning at Untrusted Participants. INFOCOM 2020: 1877-1886 - [c70]Chengjun Cai, Lei Xu, Anxin Zhou, Ruochen Wang, Cong Wang, Qian Wang:
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. INFOCOM 2020: 1887-1896 - [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i17]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database with Padding Countermeasures. CoRR abs/2003.06103 (2020) - [i16]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020) - [i15]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i14]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. CoRR abs/2010.12400 (2020) - [i13]Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. CoRR abs/2011.06458 (2020) - [i12]Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. CoRR abs/2012.10566 (2020)
2010 – 2019
- 2019
- [j47]Jing Yao, Yifeng Zheng, Yu Guo, Chengjun Cai, Anxin Zhou, Cong Wang, Xiaolin Gui:
A Privacy-Preserving System for Targeted Coupon Service. IEEE Access 7: 120817-120830 (2019) - [j46]Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang, Cong Wang:
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures. IEEE Commun. Mag. 57(10): 120-126 (2019) - [j45]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j44]Huayi Duan, Yifeng Zheng, Cong Wang, Xingliang Yuan:
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things. IEEE Internet Things J. 6(2): 2637-2650 (2019) - [j43]Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:
Toward Secure and Scalable Computation in Internet of Things Data Applications. IEEE Internet Things J. 6(2): 3753-3763 (2019) - [j42]Qian Wang, Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. IEEE Trans. Inf. Forensics Secur. 14(2): 374-386 (2019) - [j41]Shuangke Wu, Yanjiao Chen, Qian Wang, Minghui Li, Cong Wang, Xiangyang Luo:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. IEEE Trans. Inf. Forensics Secur. 14(7): 1687-1701 (2019) - [j40]Yu Guo, Xingliang Yuan, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
Enabling Encrypted Rich Queries in Distributed Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 30(6): 1283-1297 (2019) - [c69]Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu:
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. AsiaCCS 2019: 122-133 - [c68]Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. CCS 2019: 2351-2367 - [c67]Yifeng Zheng, Huayi Duan, Cong Wang:
Towards Secure and Efficient Outsourcing of Machine Learning Classification. ESORICS (1) 2019: 22-40 - [c66]Helei Cui, Huayi Duan, Zhan Qin, Cong Wang, Yajin Zhou:
SPEED: Accelerating Enclave Applications Via Secure Deduplication. ICDCS 2019: 1072-1082 - [c65]Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang:
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. ICDE 2019: 626-637 - [c64]Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. INFOCOM 2019: 1162-1170 - [c63]Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - [c62]Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang, Chungen Xu:
Hardening Database Padding for Searchable Encryption. INFOCOM 2019: 2503-2511 - [c61]Yuchuan Luo, Xiaohua Jia, Huayi Duan, Cong Wang, Ming Xu, Shaojing Fu:
pRide: private ride request for online ride hailing service with secure hardware enclave. IWQoS 2019: 27:1-27:10 - [c60]Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxin Zhou, Cong Wang, Man Ho Au:
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. PerCom 2019: 1-10 - [i11]Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph:
Defending Against Misclassification Attacks in Transfer Learning. CoRR abs/1908.11230 (2019) - [i10]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - [i9]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Minghui Li, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. CoRR abs/1909.09472 (2019) - 2018
- [j39]Jing Yao, Yifeng Zheng, Cong Wang, Xiaolin Gui:
Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern. IEEE Access 6: 11112-11122 (2018) - [j38]Zihao Shan, Kui Ren, Marina Blanton, Cong Wang:
Practical Secure Computation Outsourcing: A Survey. ACM Comput. Surv. 51(2): 31:1-31:40 (2018) - [j37]Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen:
Improved known-plaintext attack to permutation-only multimedia ciphers. Inf. Sci. 430: 228-239 (2018) - [j36]Cong Wang, Xingliang Yuan, Yong Cui, Kui Ren:
Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond. IEEE Netw. 32(1): 166-171 (2018) - [j35]Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. IEEE Trans. Dependable Secur. Comput. 15(5): 868-882 (2018) - [j34]Yifeng Zheng, Huayi Duan, Cong Wang:
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 13(10): 2475-2489 (2018) - [j33]Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang, Jing Qin:
Secure Hashing-Based Verifiable Pattern Matching. IEEE Trans. Inf. Forensics Secur. 13(11): 2677-2690 (2018) - [j32]Xingliang Yuan, Huayi Duan, Cong Wang:
Assuring String Pattern Matching in Outsourced Middleboxes. IEEE/ACM Trans. Netw. 26(3): 1362-1375 (2018) - [j31]Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j30]Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren:
Secure Integrated Circuit Design via Hybrid Cloud. IEEE Trans. Parallel Distributed Syst. 29(8): 1851-1864 (2018) - [c59]Cong Wang:
Privacy-Preserving Truth Discovery in Mobile Crowdsensing: Challenges, Solutions, and Opportunities. SCC@AsiaCCS 2018: 1 - [c58]Yu Guo, Cong Wang, Xiaohua Jia:
Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes. SCC@AsiaCCS 2018: 49-55 - [c57]Helei Cui, Cong Wang, Yu Hua, Yuefeng Du, Xingliang Yuan:
A Bandwidth-Efficient Middleware for Encrypted Deduplication. DSC 2018: 1-8 - [c56]Yifeng Zheng, Cong Wang, Jiantao Zhou:
Toward Secure Image Denoising: A Machine Learning Based Realization. ICASSP 2018: 6936-6940 - [c55]Chengjun Cai, Yifeng Zheng, Cong Wang:
Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization. ICDCS 2018: 589-599 - [c54]Helei Cui, Yajin Zhou, Cong Wang, Qi Li, Kui Ren:
Towards Privacy-Preserving Malware Detection Systems for Android. ICPADS 2018: 545-552 - [c53]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. INFOCOM 2018: 792-800 - [c52]Xiaoting Tang, Cong Wang, Xingliang Yuan, Qian Wang:
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications. INFOCOM 2018: 1988-1996 - [c51]Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, Yuanyuan Sun:
Mitigating Traffic-Based Side Channel Attacks in Bandwidth-Efficient Cloud Storage. IPDPS 2018: 1153-1162 - [c50]Yu Guo, Cong Wang, Xingliang Yuan, Xiaohua Jia:
Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes. IWQoS 2018: 1-10 - [c49]Chengjun Cai, Huayi Duan, Cong Wang:
Tutorial: Building Secure and Trustworthy Blockchain Applications. SecDev 2018: 120-121 - [e1]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - 2017
- [j29]Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou:
Privacy-Preserving Image Denoising From External Cloud Databases. IEEE Trans. Inf. Forensics Secur. 12(6): 1285-1298 (2017) - [j28]Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(8): 1874-1884 (2017) - [j27]Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, Sarana Nutanong:
Privacy-Preserving Similarity Joins Over Encrypted Data. IEEE Trans. Inf. Forensics Secur. 12(11): 2763-2775 (2017) - [j26]Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, Xingliang Yuan:
A Generic Method for Accelerating LSH-Based Similarity Join Processing. IEEE Trans. Knowl. Data Eng. 29(4): 712-726 (2017) - [j25]Helei Cui, Xingliang Yuan, Cong Wang:
Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing. IEEE Trans. Mob. Comput. 16(5): 1315-1329 (2017) - [j24]Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui:
Toward Encrypted Cloud Media Center With Secure Deduplication. IEEE Trans. Multim. 19(2): 251-265 (2017) - [c48]Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
EncKV: An Encrypted Key-value Store with Rich Queries. AsiaCCS 2017: 423-435 - [c47]Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, Yuanyuan Sun:
Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage. SoCC 2017: 638 - [c46]Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:
Secure multi-client data access with boolean queries in distributed key-value stores. CNS 2017: 1-9 - [c45]Chengjun Cai, Xingliang Yuan, Cong Wang:
Towards trustworthy and private keyword search in encrypted decentralized storage. ICC 2017: 1-7 - [c44]Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. ICDCS 2017: 183-195 - [c43]Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, Xingliang Yuan:
A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract). ICDE 2017: 29-30 - [c42]Xiaoning Liu, Xingliang Yuan, Cong Wang:
EncSIM: An encrypted similarity search service for distributed high-dimensional datasets. IWQoS 2017: 1-10 - [c41]Chengjun Cai, Xingliang Yuan, Cong Wang:
Hardening Distributed and Encrypted Keyword Search via Blockchain. PAC 2017: 119-128 - [c40]Wanyu Lin, Xu Yuan, Baochun Li, Cong Wang:
Multi-Client Searchable Encryption over Distributed Key-Value Stores. SMARTCOMP 2017: 1-7 - [i8]Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, Yuanyuan Sun:
Bandwidth-efficient Storage Services for Mitigating Side Channel Attack. CoRR abs/1703.05126 (2017) - [i7]Huayi Duan, Xingliang Yuan, Cong Wang:
LightBox: SGX-assisted Secure Network Functions at Near-native Speed. CoRR abs/1706.06261 (2017) - 2016
- [j23]Jinghua Jiang, Yifeng Zheng, Xingliang Yuan, Zhenkui Shi, Xiaolin Gui, Cong Wang, Jing Yao:
Towards Secure and Accurate Targeted Mobile Coupon Delivery. IEEE Access 4: 8116-8126 (2016) - [j22]Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Jing Yao, Cong Wang, Xiaolin Gui:
Towards privacy-preserving user targeting. J. Commun. Inf. Networks 1(4): 22-32 (2016) - [j21]Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-José Montpetit, Shucheng Liu:
Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching. IEEE J. Sel. Areas Commun. 34(8): 2077-2090 (2016) - [j20]Cong Wang, Kui Ren, Jia Wang:
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming. IEEE Trans. Computers 65(1): 216-229 (2016) - [j19]Jia Yu, Kui Ren, Cong Wang:
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates. IEEE Trans. Inf. Forensics Secur. 11(6): 1362-1375 (2016) - [j18]Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones. IEEE Trans. Mob. Comput. 15(2): 432-446 (2016) - [j17]Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, Kui Ren:
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE Trans. Multim. 18(10): 2002-2014 (2016) - [j16]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang:
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 65:1-65:24 (2016) - [c39]Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin:
Building an Encrypted, Distributed, and Searchable Key-value Store. AsiaCCS 2016: 547-558 - [c38]Chengcheng Dai, Xingliang Yuan, Cong Wang:
Privacy-Preserving Ridesharing Recommendation in Geosocial Networks. CSoNet 2016: 193-205 - [c37]Xingliang Yuan, Huayi Duan, Cong Wang:
Bringing execution assurances of pattern matching in outsourced middleboxes. ICNP 2016: 1-10 - [c36]Xingliang Yuan, Huayi Duan, Cong Wang:
Towards verifiable outsourced middleboxes. ICNP 2016: 1-2 - [c35]Helei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang:
Enabling secure and effective near-duplicate detection over encrypted in-network storage. INFOCOM 2016: 1-9 - [c34]Xingliang Yuan, Xinyu Wang, Jianxiong Lin, Cong Wang:
Privacy-preserving deep packet inspection in outsourced middleboxes. INFOCOM 2016: 1-9 - [c33]Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang:
Authentication and Transaction Verification Using QR Codes with a Mobile Device. SpaCCS 2016: 437-451 - 2015
- [j15]Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. IEEE Trans. Inf. Forensics Secur. 10(6): 1167-1179 (2015) - [j14]Rui Zhang, Xiaojun Su, Jianping Wang, Cong Wang, Wenyin Liu, Rynson W. H. Lau:
On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud. IEEE Trans. Parallel Distributed Syst. 26(8): 2327-2339 (2015) - [c32]Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui:
Enabling Encrypted Cloud Media Center with Secure Deduplication. AsiaCCS 2015: 63-72 - [c31]Xingliang Yuan, Cong Wang, Kui Ren:
Enabling IP Protection for Outsourced Integrated Circuit Design. AsiaCCS 2015: 237-247 - [c30]Xingliang Yuan, Xinyu Wang, Yilei Chu, Cong Wang, Chen Qian:
Towards a scalable, private, and searchable key-value store. CNS 2015: 773-774 - [c29]Xingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang:
Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records. ESORICS (2) 2015: 40-60 - [c28]Yi Zhao, Haobin Shi, Xuanwen Chen, Xuesi Li, Cong Wang:
An overview of object detection and tracking. ICIA 2015: 280-286 - [c27]Jinghua Jiang, Zhenkui Shi, Xingliang Yuan, Cong Wang, Xiaolin Gui:
Towards secure and practical targeted mobile advertising. INFOCOM Workshops 2015: 79-80 - [c26]Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu:
Generalized pattern matching string search on encrypted data in cloud systems. INFOCOM 2015: 2101-2109 - [c25]Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang:
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure. INFOCOM 2015: 2389-2397 - [c24]Helei Cui, Xingliang Yuan, Cong Wang:
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices. INFOCOM 2015: 2659-2667 - [c23]Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, Cong Wang:
Towards Secure and Practical Targeted Mobile Advertising. MSN 2015: 79-88 - 2014
- [j13]Bingsheng Zhang, Zhan Qin, Si Chen, Muyuan Li, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE Internet Things J. 1(1): 33-45 (2014) - [j12]Zhen Xu, Cong Wang, Kui Ren, Lingyu Wang, Bingsheng Zhang:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. IEEE Trans. Inf. Forensics Secur. 9(11): 1790-1803 (2014) - [j11]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 25(1): 222-233 (2014) - [c22]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang, Xinwen Fu:
Privacy-preserving outsourcing of image global feature detection. GLOBECOM 2014: 710-715 - [c21]Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Enabling Privacy-Preserving Image-Centric Social Discovery. ICDCS 2014: 198-207 - [c20]Cong Wang, Bingsheng Zhang, Kui Ren, Janet Meiling Wang Roveda, Chang Wen Chen, Zhen Xu:
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. INFOCOM 2014: 2130-2138 - [c19]Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure barcode-based visible light communication for smartphones. INFOCOM 2014: 2661-2669 - [c18]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang:
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing. ACM Multimedia 2014: 497-506 - 2013
- [j10]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [j9]Cong Wang, Bingsheng Zhang, Kui Ren, Janet Roveda:
Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud. IEEE Trans. Emerg. Top. Comput. 1(1): 166-177 (2013) - [j8]Cong Wang, Kui Ren, Jia Wang, Qian Wang:
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations. IEEE Trans. Parallel Distributed Syst. 24(6): 1172-1181 (2013) - [c17]Bingsheng Zhang, Helger Lipmaa, Cong Wang, Kui Ren:
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. Financial Cryptography 2013: 78-95 - [c16]Zhen Xu, Cong Wang, Qian Wang, Kui Ren, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614 - [c15]Cong Wang, Zhen Xu, Kui Ren, Janet Meiling Wang:
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. NDSS 2013 - [i6]Bingsheng Zhang, Zhan Qin, Junfei Wang, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IACR Cryptol. ePrint Arch. 2013: 581 (2013) - 2012
- [j7]Kui Ren, Cong Wang, Qian Wang:
Security Challenges for the Public Cloud. IEEE Internet Comput. 16(1): 69-73 (2012) - [j6]Kui Ren, Cong Wang, Qian Wang:
Toward secure and effective data utilization in public cloud. IEEE Netw. 26(6): 69-74 (2012) - [j5]Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Trans. Parallel Distributed Syst. 23(8): 1467-1479 (2012) - [j4]Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou:
Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput. 5(2): 220-232 (2012) - [c14]Richard Chow, Manas A. Pathak, Cong Wang:
A Practical System for Privacy-Preserving Collaborative Filtering. ICDM Workshops 2012: 547-554 - [c13]Cong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs:
Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM 2012: 451-459 - 2011
- [j3]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-Based Encryption with Attribute Hierarchy. Mob. Networks Appl. 16(5): 553-561 (2011) - [j2]Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 22(5): 847-859 (2011) - [c12]Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. ICDCS 2011: 393-402 - [c11]Cong Wang, Kui Ren, Jia Wang, Karthik Mahendra Raje Urs:
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations. ICDCS 2011: 549-558 - [c10]Cong Wang, Qian Wang, Kui Ren:
Towards Secure and Effective Utilization over Encrypted Cloud Data. ICDCS Workshops 2011: 282-286 - [c9]Cong Wang, Kui Ren, Jia Wang:
Secure and practical outsourcing of linear programming in cloud computing. INFOCOM 2011: 820-828 - [c8]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM 2011: 829-837 - 2010
- [j1]Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4): 19-24 (2010) - [c7]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Attribute based data sharing with attribute revocation. AsiaCCS 2010: 261-270 - [c6]Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou:
Secure Ranked Keyword Search over Encrypted Cloud Data. ICDCS 2010: 253-262 - [c5]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM 2010: 441-445 - [c4]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. INFOCOM 2010: 525-533 - [c3]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM 2010: 534-542
2000 – 2009
- 2009
- [c2]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - [c1]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring data storage security in Cloud Computing. IWQoS 2009: 1-9 - [i5]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring Data Storage Security in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 81 (2009) - [i4]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security. IACR Cryptol. ePrint Arch. 2009: 281 (2009) - [i3]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-based Encryption with Attribute Hierarchy. IACR Cryptol. ePrint Arch. 2009: 293 (2009) - [i2]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2009: 579 (2009) - [i1]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 593 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint