Cong Wang
Orcid: 0000-0003-0547-315XAffiliations:
- City University of Hong Kong, Department of Computer Science, Hong Kong
- Illinois Institute of Technology, Chicago, IL, USA (until 2012)
According to our database1,
Cong Wang
authored at least 259 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Knowl. Data Eng., November, 2024
Toward Quality-Aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond.
IEEE Netw., September, 2024
Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024
IEEE Trans. Emerg. Top. Comput. Intell., June, 2024
Proc. VLDB Endow., June, 2024
X-Shard: Optimistic Cross-Shard Transaction Processing for Sharding-Based Blockchains.
IEEE Trans. Parallel Distributed Syst., April, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures.
IEEE Trans. Inf. Forensics Secur., 2024
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Open J. Comput. Soc., 2024
GReDP: A More Robust Approach for Differential Private Training with Gradient-Preserving Noise Reduction.
CoRR, 2024
CoRR, 2024
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning.
CoRR, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
<i>BadSampler: </i> Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
FedTrojan: Corrupting Federated Learning via Zero-Knowledge Federated Trojan Attacks.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
FairFed: Improving Fairness and Efficiency of Contribution Evaluation in Federated Learning via Cooperative Shapley Value.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IEEE Commun. Mag., December, 2023
Future Gener. Comput. Syst., November, 2023
IEEE Trans. Knowl. Data Eng., October, 2023
IEEE Trans. Knowl. Data Eng., September, 2023
IEEE Trans. Parallel Distributed Syst., June, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
AESM<sup>2</sup> Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2023
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Open J. Comput. Soc., 2023
Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process.
CoRR, 2023
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
Bayes-MIL: A New Probabilistic Perspective on Attention-based Multiple Instance Learning for Whole Slide Images.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
RangeQC: A Query Control Framework for Range Query Leakage Quantification and Mitigation.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the Eighteenth European Conference on Computer Systems, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Parallel Distributed Syst., 2022
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2022
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022
IACR Cryptol. ePrint Arch., 2022
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2021
IEEE Trans. Serv. Comput., 2021
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021
Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value Stores.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Parallel Distributed Syst., 2021
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proc. IEEE, 2021
IEEE Netw., 2021
Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain.
IEEE Internet Things J., 2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the ICC 2021, 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020
Proc. IEEE, 2020
IEEE Netw., 2020
IEEE Internet Things J., 2020
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020
A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
IEEE Trans. Inf. Forensics Secur., 2019
<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Internet Things J., 2019
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019
Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019
IEEE Commun. Mag., 2019
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
pRide: private ride request for online ride hailing service with secure hardware enclave.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE/ACM Trans. Netw., 2018
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Netw., 2018
Inf. Sci., 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Privacy-Preserving Truth Discovery in Mobile Crowdsensing: Challenges, Solutions, and Opportunities.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018
2017
IEEE Trans. Multim., 2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Knowl. Data Eng., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016
IEEE Trans. Mob. Comput., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016
IEEE J. Sel. Areas Commun., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the Computational Social Networks - 5th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the IEEE International Conference on Information and Automation, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Internet Things J., 2014
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Emerg. Top. Comput., 2013
IEEE Trans. Computers, 2013
IACR Cryptol. ePrint Arch., 2013
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
IEEE Trans. Serv. Comput., 2012
IEEE Trans. Parallel Distributed Syst., 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011
Mob. Networks Appl., 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009