2019

Journal and Magazine Articles

  • Qian Wang, Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, and Xiangyang Luo, "PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation", IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 2, pp. 374-386, 2019.

2018

Journal and Magazine Articles

  • Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection", IEEE Transactions on Services Computing (TSC), accepted, 2018.
  • Yue Zhang, Jia Yu, Rong Hao, Cong Wang, and Kui Ren, "Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2018.
  • Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang, and Jing Qin, "Secure Hashing Based Verifiable Pattern Matching", IEEE Transactions on Information Forensics and Security (TIFS), accepted, 2018.
  • Jing Yao, Yifeng Zheng, Cong Wang, and Xiaolin Gui, "Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern", IEEE Access, vol. 6, pp. 11112-11122, 2018.
  • Xingliang Yuan, Jian Weng, Cong Wang, and Kui Ren, "Secure Integrated Circuit Design via Hybrid Cloud", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 29, no. 8, pp. 1851-1864, 2018.
  • Xingliang Yuan, Huayi Duan, and Cong Wang, "Assuring String Pattern Matching in Outsourced Middleboxes", IEEE/ACM Transactions on Networking (TON), vol. 26, no. 3, pp. 1362-1375, 2018.
  • Yifeng Zheng, Huayi Duan, and Cong Wang, "Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing", IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 10, pp. 2475-2489, 2018.
  • Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren, "Enabling Generic, Verifiable, and Secure Data Search in Cloud Services", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 29, no. 8, 2018.
  • Cong Wang, Yifeng Zheng, Jinghua Jiang, and Kui Ren, "Toward Privacy-preserving Personalized Recommendation Services", Engineering, vol. 4, no. 1, pp. 21-28, 2018.
  • Zihao Shan, Kui Ren, Marina Blanton, and Cong Wang, "Practical Secure Computation Outsourcing: A Survey", ACM Computing Surveys, vol. 51, no. 31, June 2018.
  • Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, and Guanrong Chen, "Improved Known-plaintext Attack on Permutation-only Multimedia Ciphers", Information Sciences, vol. 430-431, pp. 228-239, March 2018.
  • Cong Wang, Xingliang Yuan, Yong Cui, and Kui Ren, "Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond", IEEE Network Magazine, vol. 32, pp. 166-171, January 2018.

Conference and Workshop Papers

  • Chengjun Cai, Yifeng Zheng, and Cong Wang, "Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization", In IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018.
  • Yu Guo, Cong Wang, Xingliang Yuan, and Xiaohua Jia, "Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes", In IEEE/ACM International Symposium on Quality of Service (IWQoS), Banff, Alberta, Canada, June 4-6, 2018.
  • Yu Guo, Cong Wang, and Xiaohua Jia, "Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes", In International Workshop on Security in Cloud Computing (SCC), Songdo, Incheon, Korea, June 4, 2018.
  • Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, and Yuanyuan Sun, "Mitigating Traffic-based Side Channel Attacks in Bandwidth-efficient Cloud Storage", In IEEE International Parallel and DIstributed Processing Symposium (IPDPS), Vancouver, British Columbia, Canada, May 21-25, 2018.
  • Yifeng Zheng, Cong Wang, and Jiantao Zhou, "Toward Secure Image Denoising: A Machine Learning Based Realization", In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, Alberta, Canada, April 15-20, 2018.
  • Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren, "Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization", In International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 15-19 April 2018.
  • Xiaoting Tang, Cong Wang, Xingliang Yuan, and Qian Wang, "Non-interactive Privacy-preserving Truth Discovery in Crowd Sensing Applications", In International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 15-19 April 2018.

2017

Journal and Magazine Articles

  • Yifeng Zheng, Huayi Duan, Xingliang Yuan, and Cong Wang, "Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2017.
  • Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, and Cong Wang, "A Practical System for Privacy-Aware Targeted Mobile Advertising Services", IEEE Transactions on Services Computing (TSC), accepted, 2017.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, and Sarana Nutanong, "Privacy-preserving Similarity Joins Over Encrypted Data", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 11, pp. 2763-2775, November 2017.
  • Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, and Cong Wang, "Privacy-preserving Smart Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 8, pp. 1874-1884, August 2017.
  • Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, and Xingliang Yuan, "A Generic Method for Accelerating LSH-Based Similarity Join Processing", IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 29, no. 4, pp. 712-726, April 2017.
  • Yifeng Zheng, Helei Cui, Cong Wang, and Jiantao Zhou, "Privacy-Preserving Image Denoising from External Cloud Databases", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 6, pp. 1285-1298, June 2017.
  • Helei Cui, Xingliang Yuan, and Cong Wang, "Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing", IEEE Transactions on Mobile Computing (TMC), vol. 16, no. 5, pp 1315-1329, May 2017.
  • Jinghua Jiang, Xiaolin Gui, Yifeng Zheng, Xuejun Zhang, Xingliang Yuan, and Cong Wang, "A Framework of Secure Delivery Service for Targeted Coupons with Encrypted Search", Hsi-An Chiao Tung Ta Hsueh/Journal of Xi’an Jiaotong University, vol. 51, no. 2, pp. 13-19, February 2017.
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui, "Toward Encrypted Cloud Media Center With Secure Deduplication", IEEE Transactions on Multimedia, vol. 19, no. 2, pp. 251-265, February 2017.

Conference and Workshop Papers

  • Helei Cui, Xingliang Yuan, Cong Wang, and Yu Hua, "A Secure Deduplication Middleware for Cloud Storage" (poster), In ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, October 28-31, 2017.
  • Xu Yuan, Xingliang Yuan, Baochun Li, and Cong Wang, "Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores", In IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, October 9-11, 2017.
  • Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, and Yuanyuan Sun, "Mitigating Traffic-based Side Channel Attacks in Bandwidth-efficient Cloud Storage" (poster), In ACM Symposium on Cloud Computing (SOCC), Santa Clara, California, September 25-27, 2017.
  • Chengjun Cai, Xingliang Yuan, and Cong Wang, "Hardening Distributed and Encrypted Keyword Search via Blockchain", In Symposium on Privacy-Aware Computing (PAC), Washington DC, USA, August 1-3, 2017.
  • Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, and Aziz Mohaisen, "You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones", In IEEE International Conference on Distributed Computing Systems (ICDCS), Atlanta, USA, 5 June - 8 June, 2017.
  • Xiaoning Liu, Xingliang Yuan, and Cong Wang, "EncSIM: An Encrypted Similarity Search Service for Distributed High-dimensional Datasets", In The 25th IEEE/ACM International Symposium on Quality of Service (IWQoS), Vilanova, Spain, 14 June - 16 June 2017.
  • Wanyu Lin, Xu Yuan, Baochun Li, and Cong Wang, "Multi-Client Searchable Encryption over Distributed Key-Value Stores", In IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China, 29 May - 31 May 2017.
  • Chengjun Cai, Xingliang Yuan, and Cong Wang, "Towards Trustworthy and Private Keyword Search in Encrypted Decentralized Storage", In International Conference on Communications, Communication and Information Systems Security Symposium (ICC-CISS), Paris, France, 21 May - 25 May 2017.
  • Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, and Xingliang Yuan, "A generic method for accelerating LSH-based similarity join processing", In International Conference on Data Engineering (ICDE), San Diego, California, April 19-22, 2017.
  • Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, and Xiaohua Jia, "EncKV: An Encrypted Key-value Store with Rich Queries", In ACM Asia Conference on Computer and Communications Security (ASIACCS), Abu Dhabi, UAE, 2 April - 6 April 2017.

2016

Journal and Magazine Articles

  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna C. Squicciarini, and Kui Ren, "Towards Privacy-preserving and Practical Image-centric Social Discovery", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2016.
  • Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-Jose Montpetit, and Shucheng Liu, " Enabling Secure and Efficient Video Delivery through Encrypted In-network Caching", IEEE Journal on Selected Areas in Communications (J-SAC), vol. 34, no. 8, pp. 2077-2090, 1 August 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, and Kui Ren, "Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing", IEEE Transactions on Multimedia, vol. 18, no. 10, pp. 2002-2014, October 2016.
  • Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Jing Yao, Cong Wang, and Xiaolin Gui, "Towards Privacy-Preserving User Targeting", Journal of Communications and Information Networks (JCIN), Vol. 1, No. 4, pp 22-32, December 2016.
  • Jinghua Jiang, Yifeng Zheng, Xingliang Yuan, Zhenkui Shi, Xiaolin Gui, Cong Wang, and Jing Yao, "Towards Secure and Accurate Targeted Mobile Coupon Delivery", IEEE Access, vol. 4, pp. 8116-8126, November 2016.
  • Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, and Cong Wang, "SecSIFT: Secure image SIFT feature extraction in cloud computing", ACM Transactions on Multimedia Computing, Communications and Applications (TOMM), vol. 12, no. 4, November 2016.
  • Jia Yu, Kui Ren, and Cong Wang, "Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates", IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, no. 6, pp. 1362-1375, June 2016.
  • Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang, "SBVLC: Secure Barcodebased Visible Light Communication for Smartphones", IEEE Transactions on Mobile Computing (TMC), vol. 15, no. 2, pp. 432-446, February 2016.
  • Cong Wang, Kui Ren, and Jia Wang, "Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming", IEEE Transactions on Computers (TC), vol. 65, no. 1, pp 216-229, January 2016.

Conference and Workshop Papers

  • Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang, "Authentication and transaction verification using QR codes with a mobile device", In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS), Zhangjiajie, China, 16-18 November, 2016.
  • Xingliang Yuan, Huayi Duan, and Cong Wang, "Bringing execution assurances of pattern matching in outsourced middleboxes", In IEEE International Conference on Network Protocols (ICNP), Singapore, November 8 - 11, 2016.
  • Xingliang Yuan, Huayi Duan, and Cong Wang, "Towards verifiable outsourced middleboxes" (poster), In IEEE International Conference on Network Protocols (ICNP), Singapore, November 8 - 11, 2016.
  • Chengcheng Dai, Xingliang Yuan, and Cong Wang, "Privacy-preserving ridesharing recommendation in geosocial networks", In International Conference on Computational Social Networks (CSoNet), Ho Chi Minh City, Viet Nam, 02-04 August 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin, "Building an Encrypted, Distributed, and Searchable Key-value Store", In ACM Asia Conference on Computer and Communications Security (ASIACCS), Xi’an, PRC, 30 May - 3 June 2016.
  • Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Enabling Secure and Effective NearDuplicate Detection over Encrypted In-Network Storage", In The 35th International Conference on Computer Communications (INFOCOM), USA, 10-15 April 2016.
  • Xingliang Yuan, Xinyu Wang, Jianxiong Lin, and Cong Wang, "Privacy-preserving Deep Packet Inspection in Outsourced Middleboxes", In The 35th International Conference on Computer Communications (INFOCOM), San Francisco, USA, 10-15 April 2016.

2015

Journal and Magazine Articles

  • Rui Zhang, Xiaojun Su, Jianping Wang, Cong Wang, Wenyin Liu, and Rynson W.H. Lau, "On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 26, no. 8, pp., 2327-2339, August 2015.
  • Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan, "Enabling Cloud Storage Auditing With KeyExposure Resistance", IEEE Transactions on Information Forensics and Security (TIFS), vol. 10, no. 6, pp., 1167-1179, April 2015.

Conference and Workshop Papers

  • Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, and Cong Wang, "Towards Secure and Practical Targeted Mobile Advertising", In International Conference on Mobile Adhoc and Sensor Networks (MSN), Shenzhen, Guangdong, PRC, 16-18 December 2015.
  • Xingliang Yuan, Helei Cui, Xinyu Wang, and Cong Wang, "Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records", In European Symposium on Research in Computer Security (ESORICS), Vienna, Austria, Sep 21-25, 2015.
  • Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu and Ming Xu, "Generalized Pattern Matching String Search on Encrypted Data in Cloud Systems", In IEEE Conference on Computer Communications (INFOCOM), Hong Kong, April 26 - May 1, 2015.
  • Helei Cui, Xingliang Yuan, Cong Wang, "Harnessing Encrypted Data in Cloud for Secure and Efficient Image Sharing from Mobile Devices", In IEEE Conference on Computer Communications (INFOCOM), Hong Kong, April 26-May 1, 2015.
  • Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang, "Secure Cloud Storage Hits Distributed String Equality Checking: More Efficient, Conceptually Simpler, and Provably Secure", In IEEE Conference on Computer Communications (INFOCOM), Hong Kong, April 26 - May 1, 2015.
  • Xingliang Yuan, Cong Wang, Kui Ren, "Enabling IP Protection for Outsourced Integrated Circuit Design", In ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, April 15 - 17, 2015.
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui, "Enabling Encrypted Cloud Media Center with Secure Deduplication", In ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, April 15 - 17, 2015.

2014

Journal and Magazine Articles

  • Zhen Xu, Cong Wang, Kui Ren, Linyu Wang, and Bingsheng Zhang, "Proof-carrying Cloud Computation: the Case of Convex Optimization", IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp. 1790-1803, Nnovember 2014.
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 1, pp. 222-233, 2014.
  • Bingsheng Zhang, Qin Zhan, Si Chen, Muyuan Li, Kui Ren, Cong Wang, and Di Ma, "PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones", IEEE Internet of Things Journal, vol. 1, no. 1, pp. 33-45, 2014.

Conference and Workshop Papers

  • Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, and Cong Wang, "Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing", In ACM Multimedia (MM), Orlando, Florida, USA, November, 2014.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Squicciarini, and Kui Ren, "Enabling Privacy-preserving Image-centric Social Discovery", In International Conference on Distributed Computing Systems (ICDCS), Madrid, Spain, July, 1 - 3, 2014.
  • Cong Wang, Bingsheng Zhang, Kui Ren, Janet M. Roveda, Chang Wen Chen, and Zhen Xu, "A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive Sensing", In IEEE Conference on Computer Communications (INFOCOM), Toronto, Canada, April 27-May 2, 2014.
  • Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang, "SBVLC: Secure Barcode-based Visible Light Communication for Smartphones", In IEEE Conference on Computer Communications (INFOCOM), Toronto, Canada, April 27 - May 2, 2014.
  • Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang, and Xinwen Fu, "Privacy-preserving outsourcing of Image Global Feature Detection", In IEEE Global Communications Conference (GLOBECOM), Austin, TX, USA, December 8-12, 2014.

2013

Journal and Magazine Articles

  • Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M. Roveda, "Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud", IEEE Transactions on Emerging Topics in Computing (TETC), vol. 1, no. 1, pp. 166-177, July 2013.
  • Cong Wang, Kui Ren, Jia Wang, and Qian Wang, "Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 24, no. 6, pp. 1172-1181, 2013.
  • Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE Transactions on Computers (TC), vol. 62, no. 2, pp. 362-375, 2013.

Conference and Workshop Papers

  • Zhen Xu, Cong Wang, Qian Wang, Kui Ren, and Lingyu Wang, "Proof-carrying Cloud Computation: the Case of Convex Optimization", In IEEE Conference on Computer Communications, mini-conference (INFOCOM), Turin, Italy, April 15-18, 2013.
  • Bingsheng Zhang, Helger Lipmaa, Cong Wang, and Kui Ren, "Practical Fully Simulatable Oblivious Transfer with Sublinear Communication", In International Conference on Financial Cryptography and Data Security (FC), Okinawa, Japan, April 1 - 5, 2013.
  • Cong Wang, Zhen Xu, Kui Ren, and Janet Wang, "OIRS: Outsourced Image Recovery Service from Compressive Sensing with Privacy Assurance", In Annual Network & Distributed System Security Symposium (NDSS), San Diego, USA, February, 2013.

2012

Journal and Magazine Articles

  • Richard Chow, Manas Pathak, Cong Wang, "A Practical System for Privacy-Preserving Collaborative Filtering", In IEEE International Conference on Data Mining (ICDM), Brussels, Belgium, December 10th, 2012.
  • Kurt Partridge, Manas A. Pathak, Ersin Uzun, and Cong Wang, "PiCoDa: privacy-preserving smart coupon delivery architecture", In Workshop on Hot Topics in Privacy-Preserving Technologies (HotPETS), Vigo, Spain, July, 11-13, 2012.
  • Cong Wang, Kui Ren, Shucheng Yu, and Karthik Mahendra Raje Urs, "Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data", In IEEE Conference on Computer Communications (INFOCOM), Orlando, USA, March, 25-30, 2012.

Conference and Workshop Papers

  • Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou, "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 8, pp. 1467-1479, 2012.
  • Kui Ren, Cong Wang, and Qian Wang, "Toward secure and effective data utilization in public cloud", IEEE Network Magazine, vol. 26, no. 6, pp. 69-74, November/December 2012.
  • Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing (TSC), vol. 5, no. 2, pp. 220-232, April-June 2012.
  • Kui Ren, Cong Wang, and Qian Wang, "Security Challenges in Public Cloud", IEEE Internet Computing Magazine, vol. 16, no. 1, pp. 69-73, Jan/Feb 2012.

2011

Journal and Magazine Articles

  • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 22, no. 5, pp. 847-859, May, 2011.

Conference and Workshop Papers

  • Cong Wang, Kui Ren, Jia wang, and Karthik Mahendra Raje Urs, "Harnessing the Cloud for Securely Solving Large Systems of Linear Equations", In International Conference on Distributed Computing Systems (ICDCS), Minneapolis, USA, June, 20-24, 2011.
  • Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, and Wenjing Lou, "Privacy-perserving Query over Encrypted Graph-Structured Data in Cloud Computing", In International Conference on Distributed Computing Systems (ICDCS), Minneapolis, USA, June 20-24, 2011.
  • Cong Wang, Qian Wang, and Kui Ren, "Towards Secure and Effective Utilization over Encrypted Cloud Data", In International Conference on Distributed Computing Systems, Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), Minneapolis, USA, 2011.
  • Cong Wang, Kui Ren, and Jia Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing", In IEEE Conference on Computer Communications (INFOCOM), Shanghai, China, April 10 - 15, 2011.
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data", In IEEE Conference on Computer Communications (INFOCOM), Shanghai, China, April 10-15, 2011.

2010

Journal and Magazine Articles

  • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, "Toward Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July-August 2010.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-based Encryption with Attribute Hierarchy", ACM Mobile Networks and Applications (MONET), vol. 16, pp. 553-561, 2010.

Conference and Workshop Papers

  • Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data", In International Conference on Distributed Computing Systems (ICDCS), Genoa, Italy, June 21-25, 2010.
  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing", In IEEE Conference on Computer Communications (INFOCOM), San Diego, USA, 2010.
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Finegrained Data Dccess Control in Cloud Computing", In IEEE Conference on Computer Communications (INFOCOM), San Diego, USA, March 15-19, 2010.
  • Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing", In IEEE Conference on Computer Communications, mini-conference (INFOCOM), San Diego, USA, March 15 - 19, 2010.
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Attribute Based Data Sharing with Attribute Revocation", In ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, April 13-16, 2010.

2009

Conference and Workshop Papers

  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", In IEEE International Workshop on Quality of Service (IWQoS), Charleston, South Carolina, USA, July 13 - 15, 2009.
  • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", In European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 21-23, 2009.
  • Qian Wang, Kui Ren, Cong Wangg, and Wenjing Lou, "Efficient Fine-grained Data Access Control in Wireless Sensor Networks", In International Conference for Military Communications (MILCOM), Boston, USA, October 18-21, 2009.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-based Encryption with Attribute Hierarchy", In International Conference on Communications and Networking in China (ChinaCom), Xi’an, China, August 26-28, 2009.