Wenhai Sun
Orcid: 0000-0003-0458-0092
According to our database1,
Wenhai Sun
authored at least 42 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks.
CoRR, 2024
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns.
IEEE Internet Things J., August, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Proceedings of the 32nd USENIX Security Symposium, 2023
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
2022
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials.
IEEE Trans. Dependable Secur. Comput., 2022
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation.
CoRR, 2022
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022
Proceedings of the Financial Cryptography and Data Security, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test.
CoRR, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
2019
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Inf. Forensics Secur., 2019
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016
2015
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013