Hong Rong
Orcid: 0000-0002-5631-8128
According to our database1,
Hong Rong
authored at least 16 papers
between 2013 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment.
Comput. Secur., 2020
2019
Comput. Networks, 2019
2018
Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database.
IEEE Access, 2018
Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment.
Proceedings of the Green, Pervasive, and Cloud Computing - 13th International Conference, 2018
2017
Privacy-Preserving <i>k</i>-Means Clustering under Multiowner Setting in Distributed Cloud Environments.
Secur. Commun. Networks, 2017
Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys.
J. Inf. Sci. Eng., 2017
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
2016
Reliable and confidential cloud storage with efficient data forwarding functionality.
IET Commun., 2016
IEEE Access, 2016
Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016
Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Proceedings of the IEEE International Conference on Communication, 2015
WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
2013
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Proceedings of the Information and Communications Security - 15th International Conference, 2013