Yongzhi Wang

Orcid: 0000-0002-7117-4097

Affiliations:
  • Xidian University, School of Computer Science and Technology, Xi'an, Shaanxi, China
  • Florida International University, Miama, FL, USA (PhD 2015)
  • Henan University of Technology, Key Laboratory of Grain Information Processing and Control, China


According to our database1, Yongzhi Wang authored at least 32 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sort-then-insert: A space efficient and oblivious model aggregation algorithm for top-k sparsification in federated learning.
Future Gener. Comput. Syst., 2024

2022
Enhancing Leakage Prevention for MapReduce.
IEEE Trans. Inf. Forensics Secur., 2022

CFHider: Protecting Control Flow Confidentiality With Intel SGX.
IEEE Trans. Computers, 2022

EdGENI: Making GENI User-Friendly for General Computer Education.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA.
IEEE Trans. Veh. Technol., 2021

Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys.
IEEE Trans. Big Data, 2021

2020
Editorial: Special issue on security and privacy in network computing.
World Wide Web, 2020

CryptSQLite: SQLite With High Data Security.
IEEE Trans. Computers, 2020

A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020

A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
CFHider: Control Flow Obfuscation with Intel SGX.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

Practical Verifiable Computation-A MapReduce Case Study.
IEEE Trans. Inf. Forensics Secur., 2018

MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

Obfuscating program control flow with Intel SGX.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Exploiting Content Delivery Networks for covert channel communications.
Comput. Commun., 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Commun. Mag., 2017

Reputation Propagation for Web Service Composition: A Shapley Value Approach.
Proceedings of the International Conference on Networking and Network Applications, 2017

CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.
Proceedings of the International Conference on Networking and Network Applications, 2017

Improving Database Storage Usability with the Cloud-Based Architecture.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications.
Int. J. Networked Distributed Comput., 2016

Toward integrity assurance of outsourced computing - a game theoretic perspective.
Future Gener. Comput. Syst., 2016

POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Toward protecting control flow confidentiality in cloud-based computation.
Comput. Secur., 2015

2014
Service Value Broker Patterns: An Empirical Collection and Analysis.
Int. J. Networked Distributed Comput., 2014

Exploring Cloud Service Brokering from an Interface Perspective.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

2013
Value-Added Modelling and Analysis in Service Value Brokerage.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Constructing E-Tourism platform based on service value broker: A knowledge management perspective.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Result Integrity Check for MapReduce Computation on Hybrid Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013


  Loading...