Year 2018

Conference and Workshop Papers

  • Xiaoting Tang, Cong Wang, Xingliang Yuan, and Qian Wang , "Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications" , In IEEE International Conference on Computer Communications (INFOCOM) , Honolulu, United States, 2018.
  • Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren , "Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization" , In IEEE International Conference on Computer Communications (INFOCOM) , Honolulu, United States, 2018.

Year 2017

Journal and Magazine Articles

  • Cong Wang, Xingliang Yuan, Yong Cui, and Kui Ren , "Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond" , IEEE Network Magazine , Accepted, 2017.
  • Huayi Duan, Xingliang Yuan, and Cong Wang , "LightBox: SGX-assisted Secure Network Functions at Near-native Speed" , arXiv: 1706.06261 , 2017.
  • Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, and Cong Wang , "Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data" , IEEE Transactions on Information Forensics and Security (TIFS) , vol. 12, no. 8, pp. 1874-1884, 2017.
  • Yifeng Zheng, Helei Cui, Cong Wang, and Jiantao Zhou , "Privacy-Preserving Image Denoising from External Cloud Databases" , IEEE Transactions on Information Forensics and Security (TIFS) , vol. 12, no. 6, pp. 1285-1298, 2017.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, and Sarana Nutanong , "Privacy-preserving Similarity Joins Over Encrypted Data" , IEEE Transactions on Information Forensics and Security (TIFS) , vol. 12, no. 11, pp. 2763-2775, 2017.
  • Helei Cui, Xingliang Yuan, and Cong Wang , "Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing" , IEEE Transactions on Mobile Computing (TMC) , vol. 16, no. 5, pp. 1315-1329, 2017.
  • Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, and Xingliang Yuan , "A Generic Method for Accelerating LSH-Based Similarity Join Processing" , IEEE Transactions on Knowledge and Data Engineering (TKDE) , vol. 29, no. 4, pp. 712-726, 2017.
  • Jinghua Jiang, Xiaolin Gui, Yifeng Zheng, Xuejun Zhang, Xingliang Yuan, and Cong Wang , "A Framework of Secure Delivery Service for Targeted Coupons with Encrypted Search" , Journal of Xi'an Jiaotong University , vol. 51, no. 2, pp. 13-19, 2017.
  • Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, and Cong Wang , "A Practical System for Privacy-Aware Targeted Mobile Advertising Services" , IEEE Transactions on Services Computing (TSC) , accepted, 2017.
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui , "Towards Encrypted Cloud Media Center with Secure Deduplication" , IEEE Transactions on Multimedia (TMM) , vol. 19, no. 2, pp. 251-265, 2017.

Conference and Workshop Papers

  • Xu Yuan, Xingliang Yuan, Baochun LI, and Cong Wang , "Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores" , In IEEE Conference on Communications and Network Security (CNS) , Las Vegas, United States, 2017.
  • Chengjun CAI, Xingliang Yuan, and Cong Wang , "Hardening Distributed and Encrypted Keyword Search via Blockchain" , In IEEE Symposium on Privacy-Aware Computing (PAC) , Washington DC, United States, 2017.
  • Xiaoning Liu, Xingliang Yuan, and Cong Wang , "EncSIM : An Encrypted Similarity Search Service for Distributed High-dimensional Datasets" , In IEEE/ACM International Symposium on Quality of Service (IWQoS) , Barcelona, Spain, 2017.
  • Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, and Aziz Mohaisen , "You Can Hear but You Cannot Steal : Defending Against Voice Impersonation Attacks on Smartphones" , In IEEE International Conference on Distributed Computing Systems (ICDCS) , Atlanta, United States, 2017.
  • Wanyu Lin, Xu Yuan, Baochun Li, and Cong Wang , "Multi-Client Searchable Encryption over Distributed Key-Value Stores" , In IEEE International Conference on Smart Computing (SMARTCOMP) , Hong Kong, China, 2017.
  • Chengjun Cai, Xingliang Yuan, and Cong Wang , "Towards trustworthy and private keyword search in encrypted decentralized storage" , In IEEE International Conference on Communications (ICC) , Paris, France, 2017.
  • Xingliang Yuan, Yu guo, Xinyu Wang, Cong Wang, Baochun Li, and Xiaohua Jia, "EncKV: An Encrypted Key-value Store with Rich Queries" , In ACM Asia Conference on Computer and Communications Security (AsiaCCS) , Abu Dhabi, UAE, 2017.

Year 2016

Journal and Magazine Articles

  • Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Jing Yao, Cong Wang, and Xiaolin Gui , "Towards Privacy-Preserving User Targeting" , Journal of Communications and Information Networks , vol. 1, no. 4, pp. 22-32, 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, and Kui Ren , "Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing" , IEEE Transactions on Multimedia (TMM) , vol. 18, no. 10, pp. 2002-2014, 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Squicciarini, and Kui Ren , "Towards Privacy-preserving and Practical Image-centric Social Discovery" , IEEE Transactions on Dependable and Secure Computing (TDSC) , accepted, 2016.
  • Zhan Qin, Jingbo Yan, Kui Ren, Wen Chen, and Cong Wang , "SecSIFT : Secure image SIFT feature extraction in cloud computing" , ACM Transactions on Multimedia Computing, Communications and Applications (TOMM) , vol. 12, no. 4s, 2016.
  • Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-Jose Montpetit, and Shucheng Liu , "Enabling secure and efficient video delivery through encrypted in-network caching" , IEEE Journal on Selected Areas in Communications (JSAC) , vol. 34, no. 8, pp. 2077-2090, 2016.
  • Jia Yu, Kui Ren, and Cong Wang , "Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates" , IEEE Transactions on Information Forensics and Security (TIFS) , vol. 11, no. 6, pp. 1362-1375, 2016.
  • Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang , "SBVLC : Secure Barcode-Based Visible Light Communication for Smartphones" , IEEE Transactions on Mobile Computing (TMC) , vol. 15, no. 2, pp. 432-446, 2016.
  • Cong Wang, Kui Ren, and Jia Wang , "Secure Optimization Computation Outsourcing in Cloud Computing : A Case Study of Linear Programming" , IEEE Transactions on Computers (TC) , vol. 65, no. 1, pp. 216-229, 2016.
  • Jinghua Jiang, Yifeng Zheng, Xingliang Yuan, Zhenkui Shi, Xiaolin Gui, Cong Wang, and Jing Yao , "Towards Secure and Accurate Targeted Mobile Coupon Delivery" , IEEE Access , vol. 4, pp. 8116-8126, 2016.

Conference and Workshop Papers

  • Xingliang Yuan, Huayi Duan, and Cong Wang , "Bringing execution assurances of pattern matching in outsourced middleboxes" , In IEEE International Conference on Network Protocols (ICNP) , Singapore, 2016.
  • Xingliang Yuan, Huayi Duan, and Cong Wang , "Towards verifiable outsourced middleboxes (poster)" , In IEEE International Conference on Network Protocols (ICNP) , Singapore, 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin , "Building an Encrypted, Distributed, and Searchable Key-value Store" , In ACM Asia Conference on Computer and Communications Security (AsiaCCS) , Xi'an, China, 2016.
  • Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang ,"Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage" , In IEEE International Conference on Computer Communications (INFOCOM) , San Francisco, United States, 2016.
  • Xingliang Yuan, Xinyu Wang, Jianxiong Lin, and Cong Wang , "Privacy-preserving Deep Packet Inspection in Outsourced Middleboxes" , In IEEE International Conference on Computer Communications (INFOCOM) , San Francisco, United States, 2016.
  • Yang-Wai Chow, Willy Susilo, Guomin Yang, Ho Au, and Cong Wang , "Authentication and transaction verification using QR codes with a mobile device" , In International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS) , Zhangjiajie, China, 2016.
  • Dai Chengcheng, Xingliang Yuan, and Cong Wang , "Privacy-preserving ridesharing recommendation in geosocial networks" , In International Conference on Computational Social Networks (CSoNet) , Ho Chi Minh City, Viet Nam, 2016.

Year 2015

Journal and Magazine Articles

  • Rui Zhang, Xiaojun Su, Jianping Wang, Cong Wang, Wenyin Liu, and Rynson W.H. Lau , "On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud" , IEEE Transactions on Parallel and Distributed Systems (TPDS) , vol. 26, no. 8, pp. 2327-2339, 2015.
  • Jia Yu, Kui Ren, Cong Wang, and Vijay Varadharajan , "Enabling Cloud Storage Auditing With Key-Exposure Resistance" , IEEE Transactions on Information Forensics and Security (TIFS) , vol. 10, no. 6, pp. 1167-1179, 2015.

Conference and Workshop Papers

  • Xingliang Yuan, Xinyu Wang, Yilei Chu, Cong Wang, and Chen Qian , "Towards a scalable, private, and searchable key-value store (poster)" , In IEEE Conference on Communications and NetworkSecurity (CNS) , Florence, Italy, 2015.
  • Xingliang Yuan, Helei Cui, Xinyu Wang, and Cong Wang , "Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records" , In European Symposium on Research in Computer Security (ESORICS) , Vienna, Austria, 2015.
  • Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, and Ming Xu , "Generalized Pattern Matching String Search on Encrypted Data in Cloud Systems" , In IEEE International Conference on Computer Communications (INFOCOM) , Hong Kong, China, 2015.
  • Helei Cui, Xingliang Yuan, and Cong Wang , "Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices" , In IEEE International Conference on Computer Communications (INFOCOM) , Hong Kong, China, 2015.
  • Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, and Shengyu Zhang , "Secure cloud storage hits distributed string equality checking : More efficient, conceptually simpler, and provably secure" , In IEEE International Conference on Computer Communications (INFOCOM) , Hong Kong, China, 2015.
  • Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, and Cong Wang , "Towards Secure and Practical Targeted Mobile Advertising" , In IEEE International Conference on Mobile Ad- hoc and Sensor Networks(MSN) , Shenzhen, China, 2015. ( Best Paper Award, 1 out of 37 accepted papers.)
  • Jinghua Jiang, Zhenkui Shi, Xingliang Yuan, Cong Wang, and Xiaolin Gui , "Towards Secure and Practical Targeted Mobile Advertising(student poster)" , In IEEE International Conference on Computer Communications (INFOCOM) , Hong Kong, China, 2015.
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui , "Enabling Encrypted Cloud Media Center with Secure Deduplication" , In ACM Symposium on Information, Computer and Communications Security (AsiaCCS) , Singapore, 2015.
  • Xingliang Yuan, Cong Wang, and Kui Ren , "Enabling IP protection for outsourced integrated circuit design" , In ACM Symposium on Information, Computer and Communications Security (AsiaCCS) , Singapore, 2015.
  • Zhan Qin, Jingbo Yan, Kui Ren, Wen Chen, Cong Wang, and Xinwen Fu , "Privacy-preserving outsourcing of image global feature detection" , In IEEE Global Communications Conference (GLOBECOM) , Austin, Texas, USA, 2014.

Year 2014

Journal and Magazine Articles

  • Zhen Xu, Cong Wang, Kui Ren, Linyu Wang, and Bingsheng Zhang , "Proof-carrying Cloud Computation: the Case of Convex Optimization" , IEEE Transactions on Information Forensics and Security (TIFS) , vol. 9, no. 11, pp. 1790-1803, 2014.
  • Bingsheng Zhang, Qin Zhan, Si Chen, Muyuan Li, Kui Ren, Cong Wang, and Di Ma , "PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones" , IEEE Internet of Things Journal (IoT-J) , vol. 1, no. 1, pp. 33-45, 2014.
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou , "Privacy-Preserving Multi-KeywordRanked Search over Encrypted Cloud Data" , IEEE Transactions on Parallel and Distributed System (TPDS) , vol. 25, no. 1, pp. 222-233, 2014.

Conference and Workshop Papers

  • Zhan Qin, Jinbo Yan, Kui Ren, Chang Wen Chen, and Cong Wang , "Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing" , In ACM Multimedia (MM) , Orlando, Florida, 2014.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Squicciarini, and Kui Ren , "Enabling Privacy-preserving Image-centric Social Discovery" , In International Conference on Distributed Computing Systems (ICDCS) , Madrid, Spain, 2014.
  • Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang , "SBVLC: SecureBarcode-based Visible Light Communication for Smartphones" , In IEEEConference on Computer Communications (INFOCOM) , Toronto, Canada, 2014
  • Cong Wang, Bingsheng Zhang, Kui Ren, Janet M. Roveda, Chang Wen Chen, and Zhen Xu , "A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive Sensing" , In IEEE Conference on Computer Communications (INFOCOM) , Toronto, Canada, 2014.

Year 2013

Journal and Magazine Articles

  • Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M. Roveda , "Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud" , IEEE Transactions on Emerging Topicsin Computing (TETC) , vol. 1, no. 1, pp. 166-177, 2013.
  • Cong Wang, Kui Ren, Jia Wang, and Qian Wang , "Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations" , IEEE Transactions on Paralleland Distributed System (TPDS) , vol. 24, no. 6, pp. 1172-1181, 2013.
  • Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou , "Privacy-PreservingPublic Auditing for Secure Cloud Storage" , IEEE Transactions on Computers (TC) , vol. 62, no. 2, pp. 362-375, 2013.

Conference and Workshop Papers

  • Zhen Xu, Cong Wang, Qian Wang, Kui Ren, and Linyu Wang , "Fuzzy Keyword Search over Encrypted Data in Cloud Computing" , In IEEE Conference on ComputerCommunications (INFOCOM) , Turin, Italy, 2013.
  • Bingsheng Zhang, Helger Lipmaa, Cong Wang, and Kui Ren , "OIRS: Outsourced ImageRecovery Service from Compressive Sensing with Privacy Assurance" , In International Conference on Financial Cryptography and Data Security (FC) , Okinawa, Japan, April 2013.
  • Cong Wang, Zhen Xu, Kui Ren, Janet W. Roveda , "OIRS: Outsourced Image Recovery Service from Compressive Sensing with Privacy Assurance" , In AnnualNetwork Distributed System Security Symposium (NDSS) , San Diego, CA United States, 2013.

Year 2012

Journal and Magazine Articles

  • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li , "Toward secure and effective data utilization in public cloud" , IEEE Network Magazine , vol. 26, no. 6, pp. 69-74, 2012.
  • Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou , "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data" , IEEE Transactions on Parallel and Distributed Systems (TPDS) , vol. 23, no. 8, pp. 1467-1479, 2012.
  • Cong Wang, Qian Wang, Kui Ren and Wenjing Lou , "Towards Secure and Dependable Storage Services in Cloud Computing" , IEEE Transactions on Service Computing(TSC) , vol. 5, no. 2, pp. 220-232, 2012.
  • Kui Ren, Cong Wang, and Qian Wang , "Security Challenges for the Public Cloud" , IEEE Internet Computing , vol. 16, no. 1, pp. 69-73, 2012.

Conference and Workshop Papers

  • Richard Chow, Manas A. Pathak, and Cong Wang , "A Practical System for Privacy-PreservingCollaborative Filtering" , In IEEE International Conference on Data Mining(ICDM) , Brussels, Belgium, 2012.
  • Kurt Partridge, Manas A. Pathak, Ersin Uzun, and Cong Wang , "PiCoDa: privacy-preservingsmart coupon delivery architecture" , In The 5th Workshop on Hot Topics in Privacy-PreservingTechnologies (HotPETS) , Vigo, Spain, 2012.
  • Cong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs , "Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data" , In IEEE Conference on Computer Communications (INFOCOM) , Orlando, Florida, 2012.

Year 2011

Journal and Magazine Articles

  • Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li , "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing" , IEEE Transactions on Parallel and Distributed Systems (TPDS) , vol. 22, no. 5, pp. 847-859, 2011.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren , "Enhancing Attribute-based Encryption with Attribute Hierarchy" , ACM Mobile Networks and Applications (MONET) , vol. 16, pp. 553-561, 2011.

Conference and Workshop Papers

  • Cong Wang, Qian Wang, and Kui Ren , "Towards Secure and Effective Utilization overEncrypted Cloud Data" , In International Workshop on Security and Privacy in Cloud Computing (SPCC) , Minneapolis, MN, 2011.
  • Cong Wang, Kui Ren, Jia Wang, and Karthik Mahendra Raje Urs , "Harnessing the Cloudfor Securely Solving Large Systems of Linear Equations" , In International Conference on Distributed Computing Systems (ICDCS) , Minneapolis, MN, 2011.
  • Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, and Wenjing Lou , "Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing" , In International Conference on Distributed Computing Systems (ICDCS) , Minneapolis, MN, 2011.
  • Cong Wang, Kui Ren, and Jia Wang , "Secure and Practical Outsourcing of Linear Programming in Cloud Computing" , In the 30th IEEE Conference on Computer Communications(INFOCOM) , Shanghai, China, 2011.
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou , "Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data" , In IEEE Conference on Computer Communications (INFOCOM) , Shanghai, China, 2011.

Year 2010

Journal and Magazine Articles

  • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li , "Towards Publicly Auditable Secure Cloud Data Storage Services" , IEEE Network Magazine , vol. 24, no. 4, pp. 19-24, 2010.

Conference and Workshop Papers

  • Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou , "Secure Ranked Keyword Search over Encrypted Cloud Data" , In International Conference on Distributed Computing Systems (ICDCS) , Genoa, Italy, 2010.
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou , "Attribute Based Data Sharing with Attribute Revocation" , In the 5th ACM Symposium on Information, Computerand Communications Security (ASIACCS) , Beijing, China, 2010.
  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou , "Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing" , In IEEE Conference onComputer Communications (INFOCOM) , San Diego, CA, 2010.
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou , "Achieving Secure, Scalable, and Fine-grained Data Dccess Control in Cloud Computing" , In IEEE Conference on Computer Communications (INFOCOM) , San Diego, CA, 2010.
  • Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou , "Fuzzy KeywordSearch over Encrypted Data in Cloud Computing" , In IEEE Conference onComputer Communications (INFOCOM) , San Diego, CA, 2010.

Year 2009

Conference and Workshop Papers

  • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou , "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," , In European Symposium on Research in Computer Security (ESORICS) , Saint Malo, France, 2009.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren , "Enhancing Attribute-based Encryptionwith Attribute Hierarchy" , In International Conference on Communicationsand Networking in China (ChinaCom) , Xi'an, China, 2009.
  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou , "Ensuring Data Storage Security in Cloud Computing" , In IEEE International Workshop on Quality of Service(IWQoS) , Charleston, South Carolina, 2009.
  • Qian Wang, Kui Ren, Cong Wang, and Wenjing Lou , "Efficient Fine-grained DataAccess Control in Wireless Sensor Networks" , In International Conference for Military Communications (MILCOM) , Boston, MA, 2009.