Wei Wu

Orcid: 0000-0003-1424-1414

Affiliations:
  • National University of Defense Technology, School of Electronic Science, Changsha, China


According to our database1, Wei Wu authored at least 12 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database.
Peer Peer Netw. Appl., November, 2024

2023
Privacy Preserving Outsourced K-means Clustering Using Kd-tree.
Proceedings of the Provable and Practical Security, 2023

2021
Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database.
World Wide Web, 2021

Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.
IEEE Trans. Knowl. Data Eng., 2021

2020
Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT.
IEEE Internet Things J., 2020

Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance.
Concurr. Comput. Pract. Exp., 2020

Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment.
Comput. Secur., 2020

2019
Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments.
World Wide Web, 2019

2018
PPolyNets: Achieving High Prediction Accuracy and Efficiency With Parametric Polynomial Activations.
IEEE Access, 2018

Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database.
IEEE Access, 2018

2016
Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016


  Loading...