Wei Wang

Orcid: 0000-0003-4457-6709

Affiliations:
  • Huazhong University of Science and Technology, School of Computer Science and Technology, Cyber-Physical-Social Systems Lab, Wuhan, China
  • Peking University, Shenzhen Graduate School, Shenzhen Key Lab of Cloud Computing Technology & Application, Shenzhen, China (former)
  • Huazhong University of Science and Technology, Wuhan, China (PhD 2011)


According to our database1, Wei Wang authored at least 40 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Dynamic Searchable Symmetric Encryption With Strong Security and Robustness.
IEEE Trans. Inf. Forensics Secur., 2024

Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
Proceedings of the 33rd USENIX Security Symposium, 2024

d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Proceedings of the 33rd USENIX Security Symposium, 2024

An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
Keyword Search Shareable Encryption for Fast and Secure Data Replication.
IEEE Trans. Inf. Forensics Secur., 2023

High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023

You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
ROSE: Robust Searchable Encryption With Forward and Backward Security.
IEEE Trans. Inf. Forensics Secur., 2022

LaF: Lattice-Based and Communication-Efficient Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022

A Real-Time Scalable Video Distribution Strategy Based on Dynamic Coalition and D2D Broadcast.
Proceedings of the IEEE Global Communications Conference, 2022

DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT.
IEEE Trans. Ind. Informatics, 2021

SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment.
Future Gener. Comput. Syst., 2021

Bestie: Very Practical Searchable Encryption with Forward and Backward Security.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics, 2020

2019
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment.
IEEE Trans. Big Data, 2019

Security, Privacy, and Trust for Cyberphysical-Social Systems.
Secur. Commun. Networks, 2019

2018
A Hybrid CPU-GPU Multifrontal Optimizing Method in Sparse Cholesky Factorization.
J. Signal Process. Syst., 2018

Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE Trans. Serv. Comput., 2018

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018

A Distributed HOSVD Method With Its Incremental Computation for Big Data in Cyber-Physical-Social Systems.
IEEE Trans. Comput. Soc. Syst., 2018

Secure Data Collection, Storage and Access in Cloud-Assisted IoT.
IEEE Cloud Comput., 2018

2017
Securely Reinforcing Synchronization for Embedded Online Contests.
ACM Trans. Embed. Comput. Syst., 2017

Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch., 2017

Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT.
IEEE Access, 2017

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016

Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Gener. Comput. Syst., 2016

Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015

A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Gener. Comput. Syst., 2015

One-Pass Anonymous Key Distribution in Batch for Secure Real-Time Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

GPU-based multifrontal optimizing method in sparse Cholesky factorization.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
A Secure Synchronized Reading system over time-critical online contests.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013

2007
Data management services and transfer scheme in ChinaGrid.
Int. J. Web Grid Serv., 2007

Data Management Services in ChinaGrid for Data Mining Applications.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007


  Loading...