Wenting Shen

Orcid: 0000-0003-1467-9619

According to our database1, Wenting Shen authored at least 31 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Privacy-preserving and verifiable convolution neural network inference and training in cloud computing.
Future Gener. Comput. Syst., 2025

Certificate-based multi-copy cloud storage auditing supporting data dynamics.
Comput. Secur., 2025

2024
PPFLV: privacy-preserving federated learning with verifiability.
Clust. Comput., December, 2024

Secure cloud storage auditing with deduplication and efficient data transfer.
Clust. Comput., April, 2024

Keyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics.
IEEE Trans. Serv. Comput., 2024

Privacy-Preserving Time-Based Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024

ESVFL: Efficient and secure verifiable federated learning with privacy-preserving.
Inf. Fusion, 2024

Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR.
Comput. Secur., 2024

Certificateless cloud storage auditing supporting data ownership transfer.
Comput. Secur., 2024

2023
Branch Aggregation Attention Network for Robotic Surgical Instrument Segmentation.
IEEE Trans. Medical Imaging, November, 2023

Privacy-preserving healthcare monitoring for IoT devices under edge computing.
Comput. Secur., November, 2023

Privacy-preserving certificateless public auditing supporting different auditing frequencies.
Comput. Secur., May, 2023

Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data.
IEEE Internet Things J., 2023

Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

uGrapher: High-Performance Graph Operator Computation via Unified Abstraction for Graph Neural Networks.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Structure Enhanced Graph Neural Networks for Link Prediction.
CoRR, 2022

2021
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

Graph Sampling with Fast Random Walker on HBM-enabled FPGA Accelerators.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021

2020
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection.
IEEE Access, 2020

2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.
Secur. Commun. Networks, 2019

2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016

A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015


  Loading...