Cong Wang

Orcid: 0000-0003-0547-315X

Affiliations:
  • City University of Hong Kong, Department of Computer Science, Hong Kong
  • Illinois Institute of Technology, Chicago, IL, USA (until 2012)


According to our database1, Cong Wang authored at least 259 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedEDB: Building a Federated and Encrypted Data Store via Consortium Blockchains.
IEEE Trans. Knowl. Data Eng., November, 2024

Toward Quality-Aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond.
IEEE Netw., September, 2024

Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024

Machine Unlearning: Solutions and Challenges.
IEEE Trans. Emerg. Top. Comput. Intell., June, 2024

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores.
Proc. VLDB Endow., June, 2024

X-Shard: Optimistic Cross-Shard Transaction Processing for Sharding-Based Blockchains.
IEEE Trans. Parallel Distributed Syst., April, 2024

Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service.
IEEE Trans. Serv. Comput., 2024

PuffChain: A Dynamic Scaling Blockchain System With Optimal Effective Throughput.
IEEE Trans. Netw. Sci. Eng., 2024

Proof of Unlearning: Definitions and Instantiation.
IEEE Trans. Inf. Forensics Secur., 2024

eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security.
IEEE Trans. Inf. Forensics Secur., 2024

Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures.
IEEE Trans. Inf. Forensics Secur., 2024

Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers.
IEEE Trans. Inf. Forensics Secur., 2024

DWare: Cost-Efficient Decentralized Storage With Adaptive Middleware.
IEEE Trans. Inf. Forensics Secur., 2024

SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024

Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024

ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation.
IEEE Open J. Comput. Soc., 2024

GReDP: A More Robust Approach for Differential Private Training with Gradient-Preserving Noise Reduction.
CoRR, 2024

H<sub>2</sub>O<sub>2</sub>RAM: A High-Performance Hierarchical Doubly Oblivious RAM.
CoRR, 2024

BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning.
CoRR, 2024

LMEraser: Large Model Unlearning through Adaptive Prompt Tuning.
CoRR, 2024

Hijacking Attacks against Neural Networks by Analyzing Training Data.
CoRR, 2024

VizardFL: Enabling Private Participation in Federated Learning Systems.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024

Hijacking Attacks against Neural Network by Analyzing Training Data.
Proceedings of the 33rd USENIX Security Symposium, 2024

Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

<i>BadSampler: </i> Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

FedTrojan: Corrupting Federated Learning via Zero-Knowledge Federated Trojan Attacks.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

FairFed: Improving Fairness and Efficiency of Contribution Evaluation in Federated Learning via Cooperative Shapley Value.
Proceedings of the IEEE INFOCOM 2024, 2024

HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones.
IEEE Commun. Mag., December, 2023

Differential privacy in deep learning: Privacy and beyond.
Future Gener. Comput. Syst., November, 2023

PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service.
IEEE Trans. Knowl. Data Eng., October, 2023

SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases.
IEEE Trans. Knowl. Data Eng., September, 2023

Intellectual property protection of DNN models.
World Wide Web (WWW), July, 2023

AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication.
IEEE Trans. Parallel Distributed Syst., June, 2023

ShieldDB: An Encrypted Document Database With Padding Countermeasures.
IEEE Trans. Knowl. Data Eng., April, 2023

Towards Efficient Cryptographic Data Validation Service in Edge Computing.
IEEE Trans. Serv. Comput., 2023

MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain.
IEEE Trans. Serv. Comput., 2023

AESM<sup>2</sup> Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2023

Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023

MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2023

PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023

Optimizing Secure Decision Tree Inference Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023

Defeating Misclassification Attacks Against Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals.
IEEE Trans. Dependable Secur. Comput., 2023

Securing Liveness Detection for Voice Authentication via Pop Noises.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Practical Auditing of Dynamic Data in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2023

${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes.
IEEE Trans. Cloud Comput., 2023

Practical Anti-Fuzzing Techniques With Performance Optimization.
IEEE Open J. Comput. Soc., 2023

A Survey of Blockchain Consensus Protocols.
ACM Comput. Surv., 2023

Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process.
CoRR, 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023

MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Accelerating Distributed MoE Training and Inference with Lina.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Poisoning Self-supervised Learning Based Sequential Recommendations.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Boomerang: Metadata-Private Messaging under Hardware Trust.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Bayes-MIL: A New Probabilistic Perspective on Attention-based Multiple Instance Learning for Whole Slide Images.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

RangeQC: A Query Control Framework for Range Query Leakage Quantification and Mitigation.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Lyra: Elastic Scheduling for Deep Learning Clusters.
Proceedings of the Eighteenth European Conference on Computer Systems, 2023

Adaptive Gating in Mixture-of-Experts based Language Models.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Towards Lightweight TEE-Assisted MPC.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Metadata-private Messaging without Coordination.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain.
IEEE Trans. Serv. Comput., 2022

ScaleFlux: Efficient Stateful Scaling in NFV.
IEEE Trans. Parallel Distributed Syst., 2022

Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022

OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Private Learning on Decentralized Graphs With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022

Securely and Efficiently Outsourcing Decision Tree Inference.
IEEE Trans. Dependable Secur. Comput., 2022

Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS.
IEEE Trans. Dependable Secur. Comput., 2022

WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave.
IEEE Trans. Dependable Secur. Comput., 2022

Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services.
IEEE Trans. Dependable Secur. Comput., 2022

Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain.
IEEE Trans. Dependable Secur. Comput., 2022

Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2022

A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022

Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls.
IACR Cryptol. ePrint Arch., 2022

Lita: Accelerating Distributed Training of Sparsely Activated Models.
CoRR, 2022

Aryl: An Elastic Cluster Scheduler for Deep Learning.
CoRR, 2022

SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

Teacher Model Fingerprinting Attacks Against Transfer Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

No-Fuzz: Efficient Anti-fuzzing Techniques.
Proceedings of the Security and Privacy in Communication Networks, 2022

Amplifying Membership Exposure via Data Poisoning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining.
Proceedings of the IEEE INFOCOM 2022, 2022

Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.
IEEE Trans. Serv. Comput., 2021

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021

Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value Stores.
IEEE Trans. Parallel Distributed Syst., 2021

BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication.
IEEE Trans. Parallel Distributed Syst., 2021

Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising.
IEEE Trans. Dependable Secur. Comput., 2021

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Private and Scalable Cross-Media Retrieval.
IEEE Trans. Dependable Secur. Comput., 2021

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021

PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing.
IEEE Trans. Dependable Secur. Comput., 2021

Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2021

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness.
IEEE Trans. Dependable Secur. Comput., 2021

Building In-the-Cloud Network Functions: Security and Privacy Challenges.
Proc. IEEE, 2021

Secure Prediction of Neural Network in the Cloud.
IEEE Netw., 2021

When Deep Learning Meets Differential Privacy: Privacy, Security, and More.
IEEE Netw., 2021

Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain.
IEEE Internet Things J., 2021

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns.
CoRR, 2021

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

CARTL: Cooperative Adversarially-Robust Transfer Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Attribute-based Encrypted Search for Multi-owner and Multi-user Model.
Proceedings of the ICC 2021, 2021

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
A Practical System for Privacy-Aware Targeted Mobile Advertising Services.
IEEE Trans. Serv. Comput., 2020

Enabling Encrypted Boolean Queries in Geographically Distributed Databases.
IEEE Trans. Parallel Distributed Syst., 2020

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2020

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

The Security of Autonomous Driving: Threats, Defenses, and Future Directions.
Proc. IEEE, 2020

Toward Comprehensive Network Verification: Practices, Challenges and Beyond.
IEEE Netw., 2020

Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes.
IEEE Internet Things J., 2020

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020

EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020

A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020

Enabling Execution Assurance of Federated Learning at Untrusted Participants.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

On Sharding Open Blockchains with Smart Contracts.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Enabling Encrypted Rich Queries in Distributed Key-Value Stores.
IEEE Trans. Parallel Distributed Syst., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Toward Secure and Scalable Computation in Internet of Things Data Applications.
IEEE Internet Things J., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019

Defending Against Misclassification Attacks in Transfer Learning.
CoRR, 2019

Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures.
IEEE Commun. Mag., 2019

A Privacy-Preserving System for Targeted Coupon Service.
IEEE Access, 2019

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

pRide: private ride request for online ride hailing service with secure hardware enclave.
Proceedings of the International Symposium on Quality of Service, 2019

Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

SPEED: Accelerating Enclave Applications Via Secure Deduplication.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Towards Secure and Efficient Outsourcing of Machine Learning Classification.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distributed Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distributed Syst., 2018

Assuring String Pattern Matching in Outsourced Middleboxes.
IEEE/ACM Trans. Netw., 2018

Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Inf. Forensics Secur., 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Secur. Comput., 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Netw., 2018

Improved known-plaintext attack to permutation-only multimedia ciphers.
Inf. Sci., 2018

Practical Secure Computation Outsourcing: A Survey.
ACM Comput. Surv., 2018

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern.
IEEE Access, 2018

Tutorial: Building Secure and Trustworthy Blockchain Applications.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Mitigating Traffic-Based Side Channel Attacks in Bandwidth-Efficient Cloud Storage.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium, 2018

Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Toward Secure Image Denoising: A Machine Learning Based Realization.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

A Bandwidth-Efficient Middleware for Encrypted Deduplication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Privacy-Preserving Truth Discovery in Mobile Crowdsensing: Challenges, Solutions, and Opportunities.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multim., 2017

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing.
IEEE Trans. Mob. Comput., 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing.
IEEE Trans. Knowl. Data Eng., 2017

Privacy-Preserving Image Denoising From External Cloud Databases.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Similarity Joins Over Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Bandwidth-efficient Storage Services for Mitigating Side Channel Attack.
CoRR, 2017

LightBox: SGX-assisted Secure Network Functions at Near-native Speed.
CoRR, 2017

Multi-Client Searchable Encryption over Distributed Key-Value Stores.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Hardening Distributed and Encrypted Keyword Search via Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Towards trustworthy and private keyword search in encrypted decentralized storage.
Proceedings of the IEEE International Conference on Communications, 2017

Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

EncKV: An Encrypted Key-value Store with Rich Queries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.
IEEE Trans. Mob. Comput., 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching.
IEEE J. Sel. Areas Commun., 2016

Towards privacy-preserving user targeting.
J. Commun. Inf. Networks, 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy-preserving deep packet inspection in outsourced middleboxes.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards verifiable outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Bringing execution assurances of pattern matching in outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Privacy-Preserving Ridesharing Recommendation in Geosocial Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Building an Encrypted, Distributed, and Searchable Key-value Store.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Inf. Forensics Secur., 2015

Generalized pattern matching string search on encrypted data in cloud systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards secure and practical targeted mobile advertising.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

An overview of object detection and tracking.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards a scalable, private, and searchable key-value store.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2014

Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Inf. Forensics Secur., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.
IEEE Trans. Emerg. Top. Comput., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013

OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Serv. Comput., 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2012

Toward secure and effective data utilization in public cloud.
IEEE Netw., 2012

Security Challenges for the Public Cloud.
IEEE Internet Comput., 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A Practical System for Privacy-Preserving Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
Mob. Networks Appl., 2011

Secure and practical outsourcing of linear programming in cloud computing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Towards Secure and Effective Utilization over Encrypted Cloud Data.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Toward publicly auditable secure cloud data storage services.
IEEE Netw., 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Ensuring Data Storage Security in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptol. ePrint Arch., 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009


  Loading...