Qiang Wang

Orcid: 0000-0003-4044-7088

Affiliations:
  • Northeastern University, Software College, Shenyang, China


According to our database1, Qiang Wang authored at least 31 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR.
Comput. Stand. Interfaces, 2025

2024
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE.
J. Syst. Archit., 2024

Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems.
Comput. Commun., 2024

Efficient private information retrievals for IoT data based on bucket tree.
Comput. Electr. Eng., 2024

Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

2023
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system.
J. Syst. Archit., October, 2023

Flexible revocation and verifiability for outsourced Private Set Intersection computation.
J. Inf. Secur. Appl., March, 2023

Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

E2VQ: Enabling Expressive, Efficient, and Verifiable Queries over Blockchain Databases.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Privacy-Preserving Publicly Verifiable Databases.
IEEE Trans. Dependable Secur. Comput., 2022

Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets.
IEEE Trans. Cloud Comput., 2022

RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing.
Sensors, 2022

Efficient Aggregate Queries on Location Data with Confidentiality.
Sensors, 2022

Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT.
J. Inf. Secur. Appl., 2022

VSES-MB: Verifiable Searchable Encryption Scheme in Metaverse by Blockchain.
Proceedings of the IEEE Smartworld, 2022

2021
Secure Lightweight Stream Data Outsourcing for Internet of Things.
IEEE Internet Things J., 2021

Efficient verifiable databases with additional insertion and deletion operations in cloud computing.
Future Gener. Comput. Syst., 2021

2020
Chameleon accumulator and its applications.
J. Inf. Secur. Appl., 2020

Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020

Graph encryption for all-path queries.
Concurr. Comput. Pract. Exp., 2020

A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications.
Comput. J., 2020

2019
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas.
J. Netw. Comput. Appl., 2019

Secure data stream outsourcing with publicly verifiable integrity in cloud storage.
J. Inf. Secur. Appl., 2019

Privacy-Preserving Subgraph Matching Protocol for Two Parties.
Int. J. Found. Comput. Sci., 2019

Publicly verifiable function secret sharing.
Int. J. Comput. Sci. Eng., 2019

2018
Faster fog-aided private set intersectionwith integrity preserving.
Frontiers Inf. Technol. Electron. Eng., 2018

Verifiable Outsourced Computation with Full Delegation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Secure Collaborative Publicly Verifiable Computation.
IEEE Access, 2017

Identity-Based Public Multi-Replica Provable Data Possession.
IEEE Access, 2017

Private Subgraph Matching Protocol.
Proceedings of the Provable Security, 2017

2016
Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2016


  Loading...