Centre for Decentralized for Trust Computing

Selected Research Publications

  • Kan Yang, Kuan Zhang, Xiaohua Jia, M. Anwar Hasan, Xuemin (Sherman) Shen, “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms”, Information Sciences, vol. 387, pp. 116-131, 2017.
  • Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia, “EncKV: An Encrypted Key-value Store with Rich Queries”, in the ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2017.
  • Yuchuan Luo, Shaojing Fu, Dongsheng Wang, Ming Xu, Xiaohua Jia, “Efficient and generalized geometric range search on encrypted spatial data in the cloud”, in the 25th IEEE/ACM International Symposium on Quality of Service (IWQoS), 2017.
  • Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, Robert H. Deng, “Anonymous Privacy-Preserving Task Matching in Crowdsourcing”, IEEE Internet of Things Journal (IoTJ), vol. 5, no. 4, pp. 3068-3078, 2018.
  • Ruitao Xie, Xiaohua Jia, “Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems”, IEEE Transitions on Cloud Computing (TCC), vol. 6, no. 1, pp. 87-98, 2018.
  • Xiaotie Deng, Jianping Wang, and Juntao Wang, “How to Design a Common Telecom Infrastructure by Competitors Individually Rational and Collectively Optimal”, IEEE Journal of Selected Areas on Communications (JSAC), vol. 35, no. 3, pp.736-750, 2017.
  • Bingyi Liu, Dongyao Jia, Jianping Wang, Kejie Lu, and Libing Wu, “Cloud-Assisted Safety Message Dissemination in VANET-Cellular Heterogeneous Wireless Network”, IEEE System Journal, vol. 11, no.1, pp.128-139, 2017.
  • Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Feng Shan, Junzhou Luo, “Energy efficient Transmission with Data Sharing in Participatory Sensing Systems”, IEEE Journal of Selected Areas on Communications (JSAC), vol.34, no.12, pp. 4048-4062, 2016.
  • Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-Jose Montpetit, Shucheng Liu, “Enabling Secure and Efficient Video Delivery Through Encrpted In-network Caching”, IEEE Journal of Selected Areas on Communications (JSAC), vol. 34, no. 8, pp. 2077-2090, 2016.
  • Wen Qi, Yichen Xu, Waifu Ding, Yonghang Jiang, Jianping Wang, and Kejie Lu, “Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones”, in the 23rd IEEE International Conference on Network Protocols (ICNP), San Francisco, CA, USA, 2015.
  • Rui Zhang, Xiaojun Su, Jianping Wang, Cong Wang, Wenyin Liu, and Rynson Lau, "On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol.26, no.8, pp. 2327-2339, 2015.
  • Chengjun Cai, Xingliang Yuan, Cong Wang, “Towards Trustworthy and Private Keyword Search in Encrypted Decentralized Storage”, in IEEE International Conference on Communications 2017 (ICC), Paris, France, 2017.
  • Chengjun Cai, Xingliang Yuan, and Cong Wang, “Hardening Distributed and Encrypted Keyword Search via Blockchain”, in the 1st IEEE Symposium on Privacy-Aware Computing (PAC), Washington, USA, 2017.
  • Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren, “Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization”, in the 37th International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 2018.
  • Chengjun Cai, Yifeng Zheng, and Cong Wang, “Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization”, in the 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2018.
  • Chengjun Cai, Jian Weng, Xingliang Yuan, and Cong Wang, “Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness”, IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2018.
  • Jing Yao, Yifeng Zheng, Cong Wang, and Xiaolin Gui, “Enabling Search Over Encrypted Cloud Data with Concealed Search Pattern”, IEEE Access, accepted, 2018.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, and Sarana Nutanong, “Privacy-preserving Similarity Joins Over Encrypted Data”, IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 11, pp. 2763-2775, 2017.