Hong Rong

Orcid: 0000-0002-5631-8128

According to our database1, Hong Rong authored at least 16 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment.
Comput. Secur., 2020

2019
Fine-grained data access control with attribute-hiding policy for cloud-based IoT.
Comput. Networks, 2019

2018
Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database.
IEEE Access, 2018

Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment.
Proceedings of the Green, Pervasive, and Cloud Computing - 13th International Conference, 2018

2017
Privacy-Preserving <i>k</i>-Means Clustering under Multiowner Setting in Distributed Cloud Environments.
Secur. Commun. Networks, 2017

Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys.
J. Inf. Sci. Eng., 2017

Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework.
Proceedings of the Security and Privacy in Communication Networks, 2017

OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Reliable and confidential cloud storage with efficient data forwarding functionality.
IET Commun., 2016

Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments.
IEEE Access, 2016

Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Efficient and secure data forwarding for erasure-code-based cloud storage.
Proceedings of the IEEE International Conference on Communication, 2015

WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2013
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...