Wei Wang
Orcid: 0000-0003-4457-6709Affiliations:
- Huazhong University of Science and Technology, School of Computer Science and Technology, Cyber-Physical-Social Systems Lab, Wuhan, China
- Peking University, Shenzhen Graduate School, Shenzhen Key Lab of Cloud Computing Technology & Application, Shenzhen, China (former)
- Huazhong University of Science and Technology, Wuhan, China (PhD 2011)
According to our database1,
Wei Wang
authored at least 40 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
A Real-Time Scalable Video Distribution Strategy Based on Dynamic Coalition and D2D Broadcast.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT.
IEEE Trans. Ind. Informatics, 2021
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment.
Future Gener. Comput. Syst., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics, 2020
2019
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment.
IEEE Trans. Big Data, 2019
Secur. Commun. Networks, 2019
2018
J. Signal Process. Syst., 2018
IEEE Trans. Serv. Comput., 2018
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018
A Distributed HOSVD Method With Its Incremental Computation for Big Data in Cyber-Physical-Social Systems.
IEEE Trans. Comput. Soc. Syst., 2018
IEEE Cloud Comput., 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch., 2017
IEEE Access, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Gener. Comput. Syst., 2016
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015
A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Gener. Comput. Syst., 2015
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015
2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013
2007
Int. J. Web Grid Serv., 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007