2022

Journal and Magazine Articles

  • Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, and Kui Ren, "Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum", ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 31, no. 3, pp. 1-33, 2022.
  • Jing Yao, Xiangyi Meng, Yifeng Zheng, and Cong Wang, "Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes", IEEE Transactions on Cloud Computing (TCC), in press, 2022.
  • Xinyu Tang, Cheng Guo, Yizhi Ren, Cong Wang, and Kim-Kwang Raymond Choo, "A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems", IEEE Systems Journal, in press, 2022.
  • Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, and Qi Li, "Securing Liveness Detection for Voice Authentication via Pop Noises", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2022.
  • Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang, "SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2022.
  • Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang, "PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2022.
  • Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, and Cong Wang, "Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2022.
  • Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, and Xiangwen Yang, "Defeating Misclassification Attacks Against Transfer Learning", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2022.
  • Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au, and Qian Wang, "Towards Practical Auditing of Dynamic Data in Decentralized Storage", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2022.
  • Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, and Kui Ren, "Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus", IEEE Transactions on Services Computing (TSC), vol. 15, no. 1, pp. 241-253, 2022.

Conference and Workshop Papers

  • Yuefeng Du, Anxin Zhou, and Cong Wang, "Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization" , In IEEE International Conference on Distributed Computing Systems (ICDCS), Bologna, Italy, July 10 - 13, 2022.
  • Yufei Chen, Chao Shen, Cong Wang, and Yang Zhang, "Teacher Model Fingerprinting Attacks Against Transfer Learning", In USENIX Security Symposium (USENIX Security'22), Boston, MA, USA, August 10–12, 2022.
  • Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, and Qian Wang, "Vizard: A Metadata-hiding Data Analytics System with End-to-End Policy Controls", In ACM Conference on Computer and Communications Security (CCS'22), Los Angeles, USA, November 7-12, 2022.
  • Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, and Bo Li, "The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining", In IEEE Conference on Computer Communications (INFOCOM'22), May 2-5, 2022 (virtual conference).
  • Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, and Kui Ren, "SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX", In USENIX Security Symposium (USENIX Security'22), Boston, MA, USA, August 10–12, 2022.

2021

Journal and Magazine Articles

  • Peipei Jian, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, and Kui Ren, "Building In-the-Cloud Network Functions: Security and Privacy Challenges", Proceedings of the IEEE (PIEEE), vol. 109, no. 12, pp. 1888-1919, 2021.
  • Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, and Cong Wang, "Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption", IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 5310-5325, 2021.
  • Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, and Cong Wang, "ShieldDB: An Encrypted Document Database with Padding Countermeasures", IEEE Transactions on Knowledge and Data Engineering (TKDE), in press, 2021.
  • Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, and Dengpan Ye, "Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 6, pp. 2569-2581, 2021.
  • Chengjun Cai, Yifeng Zheng, Anxin Zhou, and Cong Wang, "Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 6, pp. 2601-2616, 2021.
  • Chengjun Cai, Lei Xu, Anxin Zhou, and Cong Wang, "Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2021.
  • Xinyan Li, Yufei Chen, Cong Wang, and Chao Shen, "When Deep Learning Meets Differential Privacy: Privacy, Security, and More", IEEE Network, vol. 35, no. 6, pp. 148-155, 2021.
  • Mingyue Wang, Yu Guo, Chen Zhang, Cong Wang, Hejiao Huang, and Xiaohua Jia, "MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain", IEEE Transactions on Services Computing (TSC), in press, 2021.
  • Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, and Chungen Xu, "Towards Efficient Cryptographic Data Validation Service in Edge Computing", IEEE Transactions on Services Computing (TSC), in press, 2021.
  • Yu Guo, Hongcheng Xie, Cong Wang, and Xiaohua Jia, "Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2021.
  • Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, and Bo Feng, "VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 32, no. 10, pp. 2524-2540, 2021.
  • Chen Zhang, Yu Guo, Xiaohua Jia, Cong Wang, and Hongwei Du, "Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain", IEEE Internet of Things Journal (IoT-J), vol. 8, no. 8, pp. 6624-6636, 2021.
  • Chengjun Cai, Jian Weng, Xingliang Yuan, and Cong Wang, "Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 1, pp. 131-144, 2021.
  • Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, and Robert H. Deng, "Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 1, pp. 117-130, 2021.
  • Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, and Cong Wang, "Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2021.
  • Minghui Li, Yuejing Yan, Qian Wang, Minxin Du, Zhan Qin, and Cong Wang, "Secure Prediction of Neural Network in the Cloud", IEEE Network, vol. 35, no. 1, pp. 251-257, 2021.
  • Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, and Liming Fang, "WebEnclave: Protect Web Secrets from browser extensions with Software Enclave", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2021.
  • Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, and Qian Wang, "Enabling Secure and Efficient Decentralized Storage Auditing with Blockchain", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2021.
  • Yifeng Zheng, Huayi Duan, Xiaoting Tang, Cong Wang, and Jiantao Zhou, "Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no.3, pp. 1261-1275, 2021.
  • Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, and Cong Wang, "SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption", IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 1795-1809, 2021.
  • Dian Chen, Haobo Yuan, Shengshan Hu, Qian Wang, and Cong Wang, "BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 32, no. 4, pp. 786-798, 2021.
  • Wanyu Lin, Helei Cui, Baochun Li, and Cong Wang, "Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value Stores", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 32, no. 5, pp. 1072-1084, 2021.

Conference and Workshop Papers

  • Rui Lian, Anxin Zhou, Yifeng Zheng, and Cong Wang, "Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics", In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine'21), November 29-30, 2021 (virtual conference).
  • Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, and Cong Wang, "Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation", In ACM International Conference on Multimedia (MM'21), October 20-24, 2021 (virtual conference).
  • Mingyue Wang, Yinbin Miao, Yu Guo, Cong Wang, Hejiao Huang, and Xiaohua Jia, "Attribute-based encrypted search for multi-owner and multi-user model", In IEEE International Conference on Communications (ICC'21), June 14-23, 2021 (virtual conference).
  • Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, and Shenyi Zhang, "Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information", In ACM Conference on Computer and Communications Security (CCS'21), November 15-19, 2021 (virtual conference).
  • Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, and Qi Li, "CARTL: Cooperative Adversarially-Robust Transfer Learning", In International Conference on Machine Learning (ICML'21), July 18-24, 2021 (virtual conference).
  • Jie Xu, Yingying Cheng, Cong Wang, and Xiaohua Jia, "Occam: A Secure and Adaptive Scaling Protocol for Permissionless Blockchain", In IEEE International Conference on Distributed Computing Systems (ICDCS'21), July 7-10, 2021 (virtual conference).
  • Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, and Cong Wang, "FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism", In International Conference on Computer Communications (INFOCOM'21), May 10-13, 2021 (virtual conference).

2020

Journal and Magazine Articles

  • Yu Guo, Mingyue Wang, Cong Wang, Xingliang Yuan, and Xiaohua Jia, "Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes", IEEE Internet of Things Journal (IoT-J), vol. 7, no. 6, pp. 5359-5370, 2020.
  • Xiaoli Zhang, Cong Wang, Qi Li, and Jianping Wu, "Toward Comprehensive Network Verification: Practices, Challenges and beyond", IEEE Network, vol. 34, no. 1, pp. 108-115, 2020.
  • Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, and Cong Wang, "A Practical System for Privacy-Aware Targeted Mobile Advertising Services", IEEE Transactions on Services Computing (TSC), vol. 13, no. 3, pp. 410-424, 2020.
  • Yifeng Zheng, Huayi Duan, Xingliang Yuan, and Cong Wang, "Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 17, no. 1, pp. 121-133, 2020.
  • Yue Zhang, Jia Yu, Rong Hao, Cong Wang, and Kui Ren, "Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 17, no. 3, pp. 608-619, 2020.
  • Yu Guo, Hongcheng Xie, Yinbin Miao, CongWang, and Xiaohua Jia, "FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain", IEEE Transactions on Services Computing (TSC), in press, 2020.
  • Yifeng Zheng, Huayi Duan, Cong Wang, and Surya Nepal, "Securely and Efficiently Outsourcing Decision Tree Inference", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2020.
  • Yufei Chen, Chao Shen, Cong Wang, Qixue Xiao, Kang Li, and Yu Chen, "Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2020.
  • Leo Yu Zhang*, Yifeng Zheng*, Jian Weng, Cong Wang, Zihao Shan, and Kui Ren, "You Can Access But You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 17, no. 6, pp.1218-1231, 2020, (* equal contributions).
  • Xu Yuan, Xingliang Yuan, Yihe Zhang, Baochun Li, and Cong Wang, "Enabling Encrypted Boolean Queries in Geographically Distributed Databases", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 31, no. 3, pp. 634-646, 2020.
  • Kui Ren, Qian Wang, Cong Wang, Zhan Qin, and Xiaodong Lin, "The Security of Autonomous Driving: Threats, Defenses, and Future Directions", Proceedings of the IEEE (PIEEE), vol. 108, no. 2, pp. 357-372, 2020.

Conference and Workshop Papers

  • Jing Yao, Yifeng Zheng, Yu Guo, and Cong Wang, "SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search", In International Conference on Security and Cryptography (SBC'20), October 6, 2020 (virtual conference).
  • Jing Yao, Yifeng Zheng, Cong Wang, and Surya Nepal, "Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness", In IEEE International Conference on Distributed Computing Systems (SECRYPT'20), July 8-10, 2020 (virtual conference).
  • Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao and Feifei Li, "HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services", In IEEE International Conference on Distributed Computing Systems (ICDCS'20), Singapore, 29 November - 1 December, 2020 (virtual conference). (Best Paper Award)
  • Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, and Qian Wang, "Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage", In IEEE International Conference on Distributed Computing Systems (ICDCS'20), Singapore, 29 November - 1 December, 2020 (virtual conference).
  • Chengjun Cai, Lei Xu, Anxin Zhou, Ruochen Wang, Cong Wang, and Qian Wang, "EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves", In International Conference on Computer Communications (INFOCOM'20), Beijing, China, July 6-9, 2020 (virtual conference).
  • Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, and Cong Wang, "Enabling Execution Assurance of Federated Learning at Untrusted Participants", In International Conference on Computer Communications (INFOCOM'20), Beijing, China, July 6-9, 2020 (virtual conference).
  • Yuechen Tao, Bo Li, Jingjie Jiang, Hok Chu Ng, Cong Wang, and Baochun Li, "On Sharding Open Blockchains with Smart Contracts", In IEEE International Conference on Data Engineering (ICDE'20), Dallas, Texas, USA, April 20-24, 2020 (virtual conference).

2019

Journal and Magazine Articles

  • Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, and Cong Wang, "How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs", IEEE Transactions on Information Forensics and Security (TIFS), vol. 15, pp. 315-328, 2019.
  • Shuangke Wu, Yanjiao Chen, Qian Wang, Minghui Li, Cong Wang, and Xiangyang Luo, "CReam: A Smart Contract Enabled Collusion-Resistant e-Auction", IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 7, pp. 1687-1701, 2019.
  • Qian Wang, Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, and Xiangyang Luo, "PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation", IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 2, pp. 374-386, 2019.
  • Chengjun Cai, Yifeng Zheng, Yuefeng Du, Zhan Qin, and Cong Wang, "Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2019.
  • Helei Cui, Yajin Zhou, Cong Wang, Xinyu Wang, Yuefeng Du, and Qian Wang, "PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2019.
  • Shengshan Hu, Zhan Qin, Leo Yu Zhang, Qian Wang, and Cong Wang, "Towards Private and Scalable Cross-Media Retrieval", IEEE Transactions on Dependable and Secure Computing (TDSC), in press, 2019.
  • Yu Guo, Xingliang Yuan, Xinyu Wang, Cong Wang, Baochun Li, and Xiaohua Jia, "Enabling Encrypted Rich Queries in Distributed Key-value Stores", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 30, no. 6, pp. 1283-1297, June 2019.
  • Huayi Duan, Yifeng Zheng, Cong Wang, and Xingliang Yuan, "Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things", IEEE Internet of Things Journal (IoT-J), vol. 6, no. 2, pp. 2637-2650, 2019.

Conference and Workshop Papers

  • Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, and Kui Ren, "LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed", In Conference on Computer and Communications Security (CCS'19), London, UK, November 11-15, 2019.
  • Yifeng Zheng, Huayi Duan, and Cong Wang, "Towards Secure and Efficient Outsourcing of Machine Learning Classification", In European Symposium on Research in Computer Security (ESORICS'19), Luxembourg, September 23-27, 2019.
  • Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, and Chungen Xu, "Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation", In ACM Asia Conference on Computer and Communications Security (AsiaCCS'19), Auckland, New Zealand, July 7-12, 2019.
  • Helei Cui, Huayi Duan, Zhan Qin, Cong Wang, and Yajin Zhou, "SPEED: Accelerating Enclave Applications via Secure Deduplication", In IEEE International Conference on Distributed Computing Systems(ICDCS'19), Dallas, USA, July 7-10, 2019.
  • Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, and Jianping Wu, "Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes", In International Conference on Computer Communications (INFOCOM'19), Paris, France, 29 April - 2 May, 2019.
  • Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang, and Chungen Xu, "Hardening Database Padding for Searchable Encryption", In International Conference on Computer Communications (INFOCOM'19), Paris, France, 29 April - 2 May, 2019.
  • Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuang, and Cong Wang, "ServeDB: Secure, Verifiable, and Efficient MultiDimensional Range Queries on Outsourced Database", In IEEE International Conference on Data Engineering (ICDE'19), Macau, China, April 8-12, 2019.
  • Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxin Zhou, Cong Wang, and Man Ho Au, "Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization", In IEEE International Conference on Pervasive Computing and Communications (PerCom'19), Kyoto, Japan, March 11-15, 2019.

2018

Journal and Magazine Articles

  • Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang, "Toward Secure and Scalable Computation in Internet of Things Data Applications", IEEE Internet of Things Journal (IoT-J), accepted, 2018.
  • Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection", IEEE Transactions on Services Computing (TSC), accepted, 2018.
  • Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang, and Jing Qin, "Secure Hashing-Based Verifiable Pattern Matching", IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 11, pp. 2677-2690, 2018.
  • Jing Yao, Yifeng Zheng, Cong Wang, and Xiaolin Gui, "Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern", IEEE Access, vol. 6, pp. 11112-11122, 2018.
  • Xingliang Yuan, Jian Weng, Cong Wang, and Kui Ren, "Secure Integrated Circuit Design via Hybrid Cloud", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 29, no. 8, pp. 1851-1864, 2018.
  • Xingliang Yuan, Huayi Duan, and Cong Wang, "Assuring String Pattern Matching in Outsourced Middleboxes", IEEE/ACM Transactions on Networking (TON), vol. 26, no. 3, pp. 1362-1375, 2018.
  • Yifeng Zheng, Huayi Duan, and Cong Wang, "Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing", IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 10, pp. 2475-2489, 2018.
  • Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren, "Enabling Generic, Verifiable, and Secure Data Search in Cloud Services", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 29, no. 8, 2018.
  • Cong Wang, Yifeng Zheng, Jinghua Jiang, and Kui Ren, "Toward Privacy-preserving Personalized Recommendation Services", Engineering, vol. 4, no. 1, pp. 21-28, 2018.
  • Zihao Shan, Kui Ren, Marina Blanton, and Cong Wang, "Practical Secure Computation Outsourcing: A Survey", ACM Computing Surveys, vol. 51, no. 31, June 2018.
  • Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, and Guanrong Chen, "Improved Known-plaintext Attack on Permutation-only Multimedia Ciphers", Information Sciences, vol. 430-431, pp. 228-239, March 2018.
  • Cong Wang, Xingliang Yuan, Yong Cui, and Kui Ren, "Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond", IEEE Network Magazine, vol. 32, pp. 166-171, January 2018.

Conference and Workshop Papers

  • Chengjun Cai, Yifeng Zheng, and Cong Wang, "Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization", In IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018.
  • Yu Guo, Cong Wang, Xingliang Yuan, and Xiaohua Jia, "Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes", In IEEE/ACM International Symposium on Quality of Service (IWQoS), Banff, Alberta, Canada, June 4-6, 2018.
  • Yu Guo, Cong Wang, and Xiaohua Jia, "Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes", In International Workshop on Security in Cloud Computing (SCC), Songdo, Incheon, Korea, June 4, 2018.
  • Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, and Yuanyuan Sun, "Mitigating Traffic-based Side Channel Attacks in Bandwidth-efficient Cloud Storage", In IEEE International Parallel and DIstributed Processing Symposium (IPDPS), Vancouver, British Columbia, Canada, May 21-25, 2018.
  • Yifeng Zheng, Cong Wang, and Jiantao Zhou, "Toward Secure Image Denoising: A Machine Learning Based Realization", In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, Alberta, Canada, April 15-20, 2018.
  • Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, and Kui Ren, "Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization", In International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 15-19 April 2018.
  • Xiaoting Tang, Cong Wang, Xingliang Yuan, and Qian Wang, "Non-interactive Privacy-preserving Truth Discovery in Crowd Sensing Applications", In International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 15-19 April 2018.

2017

Journal and Magazine Articles

  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, and Sarana Nutanong, "Privacy-preserving Similarity Joins Over Encrypted Data", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 11, pp. 2763-2775, November 2017.
  • Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, and Cong Wang, "Privacy-preserving Smart Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 8, pp. 1874-1884, August 2017.
  • Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, and Xingliang Yuan, "A Generic Method for Accelerating LSH-Based Similarity Join Processing", IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 29, no. 4, pp. 712-726, April 2017.
  • Yifeng Zheng, Helei Cui, Cong Wang, and Jiantao Zhou, "Privacy-Preserving Image Denoising from External Cloud Databases", IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 6, pp. 1285-1298, June 2017.
  • Helei Cui, Xingliang Yuan, and Cong Wang, "Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing", IEEE Transactions on Mobile Computing (TMC), vol. 16, no. 5, pp 1315-1329, May 2017.
  • Jinghua Jiang, Xiaolin Gui, Yifeng Zheng, Xuejun Zhang, Xingliang Yuan, and Cong Wang, "A Framework of Secure Delivery Service for Targeted Coupons with Encrypted Search", Hsi-An Chiao Tung Ta Hsueh/Journal of Xi’an Jiaotong University, vol. 51, no. 2, pp. 13-19, February 2017.
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui, "Toward Encrypted Cloud Media Center With Secure Deduplication", IEEE Transactions on Multimedia, vol. 19, no. 2, pp. 251-265, February 2017.

Conference and Workshop Papers

  • Helei Cui, Xingliang Yuan, Cong Wang, and Yu Hua, "A Secure Deduplication Middleware for Cloud Storage" (poster), In ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, October 28-31, 2017.
  • Xu Yuan, Xingliang Yuan, Baochun Li, and Cong Wang, "Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores", In IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, October 9-11, 2017.
  • Pengfei Zuo, Yu Hua, Cong Wang, Wen Xia, Shunde Cao, Yukun Zhou, and Yuanyuan Sun, "Mitigating Traffic-based Side Channel Attacks in Bandwidth-efficient Cloud Storage" (poster), In ACM Symposium on Cloud Computing (SOCC), Santa Clara, California, September 25-27, 2017.
  • Chengjun Cai, Xingliang Yuan, and Cong Wang, "Hardening Distributed and Encrypted Keyword Search via Blockchain", In Symposium on Privacy-Aware Computing (PAC), Washington DC, USA, August 1-3, 2017.
  • Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, and Aziz Mohaisen, "You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones", In IEEE International Conference on Distributed Computing Systems (ICDCS), Atlanta, USA, 5 June - 8 June, 2017.
  • Xiaoning Liu, Xingliang Yuan, and Cong Wang, "EncSIM: An Encrypted Similarity Search Service for Distributed High-dimensional Datasets", In The 25th IEEE/ACM International Symposium on Quality of Service (IWQoS), Vilanova, Spain, 14 June - 16 June 2017.
  • Wanyu Lin, Xu Yuan, Baochun Li, and Cong Wang, "Multi-Client Searchable Encryption over Distributed Key-Value Stores", In IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China, 29 May - 31 May 2017.
  • Chengjun Cai, Xingliang Yuan, and Cong Wang, "Towards Trustworthy and Private Keyword Search in Encrypted Decentralized Storage", In International Conference on Communications, Communication and Information Systems Security Symposium (ICC-CISS), Paris, France, 21 May - 25 May 2017.
  • Chenyun Yu, Sarana Nutanong, Hangyu Li, Cong Wang, and Xingliang Yuan, "A generic method for accelerating LSH-based similarity join processing", In International Conference on Data Engineering (ICDE), San Diego, California, April 19-22, 2017.
  • Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, and Xiaohua Jia, "EncKV: An Encrypted Key-value Store with Rich Queries", In ACM Asia Conference on Computer and Communications Security (ASIACCS), Abu Dhabi, UAE, 2 April - 6 April 2017.

2016

Journal and Magazine Articles

  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren, "Towards Privacy-preserving and Practical Image-centric Social Discovery", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 15, no. 5, pp. 868-882, 2018.
  • Xingliang Yuan, Xinyu Wang, Jinfan Wang, Yilei Chu, Cong Wang, Jianping Wang, Marie-Jose Montpetit, and Shucheng Liu, " Enabling Secure and Efficient Video Delivery through Encrypted In-network Caching", IEEE Journal on Selected Areas in Communications (J-SAC), vol. 34, no. 8, pp. 2077-2090, 1 August 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, and Kui Ren, "Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing", IEEE Transactions on Multimedia, vol. 18, no. 10, pp. 2002-2014, October 2016.
  • Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Jing Yao, Cong Wang, and Xiaolin Gui, "Towards Privacy-Preserving User Targeting", Journal of Communications and Information Networks (JCIN), Vol. 1, No. 4, pp 22-32, December 2016.
  • Jinghua Jiang, Yifeng Zheng, Xingliang Yuan, Zhenkui Shi, Xiaolin Gui, Cong Wang, and Jing Yao, "Towards Secure and Accurate Targeted Mobile Coupon Delivery", IEEE Access, vol. 4, pp. 8116-8126, November 2016.
  • Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, and Cong Wang, "SecSIFT: Secure image SIFT feature extraction in cloud computing", ACM Transactions on Multimedia Computing, Communications and Applications (TOMM), vol. 12, no. 4, November 2016.
  • Jia Yu, Kui Ren, and Cong Wang, "Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates", IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, no. 6, pp. 1362-1375, June 2016.
  • Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang, "SBVLC: Secure Barcodebased Visible Light Communication for Smartphones", IEEE Transactions on Mobile Computing (TMC), vol. 15, no. 2, pp. 432-446, February 2016.
  • Cong Wang, Kui Ren, and Jia Wang, "Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming", IEEE Transactions on Computers (TC), vol. 65, no. 1, pp 216-229, January 2016.

Conference and Workshop Papers

  • Helei Cui, Xingliang Yuan, Yifeng Zheng and Cong Wang, "Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage", In The 35th International Conference on Computer Communications (INFOCOM), USA, 10-15 April 2016.
  • Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang, "Authentication and transaction verification using QR codes with a mobile device", In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS), Zhangjiajie, China, 16-18 November, 2016.
  • Xingliang Yuan, Huayi Duan, and Cong Wang, "Bringing execution assurances of pattern matching in outsourced middleboxes", In IEEE International Conference on Network Protocols (ICNP), Singapore, November 8 - 11, 2016.
  • Xingliang Yuan, Huayi Duan, and Cong Wang, "Towards verifiable outsourced middleboxes" (poster), In IEEE International Conference on Network Protocols (ICNP), Singapore, November 8 - 11, 2016.
  • Chengcheng Dai, Xingliang Yuan, and Cong Wang, "Privacy-preserving ridesharing recommendation in geosocial networks", In International Conference on Computational Social Networks (CSoNet), Ho Chi Minh City, Viet Nam, 02-04 August 2016.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin, "Building an Encrypted, Distributed, and Searchable Key-value Store", In ACM Asia Conference on Computer and Communications Security (ASIACCS), Xi’an, PRC, 30 May - 3 June 2016.
  • Helei Cui, Xingliang Yuan, Yifeng Zheng, and Cong Wang, "Enabling Secure and Effective NearDuplicate Detection over Encrypted In-Network Storage", In The 35th International Conference on Computer Communications (INFOCOM), USA, 10-15 April 2016.
  • Xingliang Yuan, Xinyu Wang, Jianxiong Lin, and Cong Wang, "Privacy-preserving Deep Packet Inspection in Outsourced Middleboxes", In The 35th International Conference on Computer Communications (INFOCOM), San Francisco, USA, 10-15 April 2016.

2015

Journal and Magazine Articles

  • Rui Zhang, Xiaojun Su, Jianping Wang, Cong Wang, Wenyin Liu, and Rynson W.H. Lau, "On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 26, no. 8, pp., 2327-2339, August 2015.
  • Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan, "Enabling Cloud Storage Auditing With KeyExposure Resistance", IEEE Transactions on Information Forensics and Security (TIFS), vol. 10, no. 6, pp., 1167-1179, April 2015.

Conference and Workshop Papers

  • Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, and Cong Wang, "Towards Secure and Practical Targeted Mobile Advertising", In International Conference on Mobile Adhoc and Sensor Networks (MSN), Shenzhen, Guangdong, PRC, 16-18 December 2015.
  • Xingliang Yuan, Helei Cui, Xinyu Wang, and Cong Wang, "Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records", In European Symposium on Research in Computer Security (ESORICS), Vienna, Austria, Sep 21-25, 2015.
  • Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu and Ming Xu, "Generalized Pattern Matching String Search on Encrypted Data in Cloud Systems", In IEEE Conference on Computer Communications (INFOCOM), Hong Kong, April 26 - May 1, 2015.
  • Helei Cui, Xingliang Yuan, Cong Wang, "Harnessing Encrypted Data in Cloud for Secure and Efficient Image Sharing from Mobile Devices", In IEEE Conference on Computer Communications (INFOCOM), Hong Kong, April 26-May 1, 2015.
  • Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang, "Secure Cloud Storage Hits Distributed String Equality Checking: More Efficient, Conceptually Simpler, and Provably Secure", In IEEE Conference on Computer Communications (INFOCOM), Hong Kong, April 26 - May 1, 2015.
  • Xingliang Yuan, Cong Wang, Kui Ren, "Enabling IP Protection for Outsourced Integrated Circuit Design", In ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, April 15 - 17, 2015.
  • Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui, "Enabling Encrypted Cloud Media Center with Secure Deduplication", In ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, April 15 - 17, 2015.

2014

Journal and Magazine Articles

  • Zhen Xu, Cong Wang, Kui Ren, Linyu Wang, and Bingsheng Zhang, "Proof-carrying Cloud Computation: the Case of Convex Optimization", IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp. 1790-1803, Nnovember 2014.
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 1, pp. 222-233, 2014.
  • Bingsheng Zhang, Qin Zhan, Si Chen, Muyuan Li, Kui Ren, Cong Wang, and Di Ma, "PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones", IEEE Internet of Things Journal, vol. 1, no. 1, pp. 33-45, 2014.

Conference and Workshop Papers

  • Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, and Cong Wang, "Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing", In ACM Multimedia (MM), Orlando, Florida, USA, November, 2014.
  • Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Squicciarini, and Kui Ren, "Enabling Privacy-preserving Image-centric Social Discovery", In International Conference on Distributed Computing Systems (ICDCS), Madrid, Spain, July, 1 - 3, 2014.
  • Cong Wang, Bingsheng Zhang, Kui Ren, Janet M. Roveda, Chang Wen Chen, and Zhen Xu, "A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive Sensing", In IEEE Conference on Computer Communications (INFOCOM), Toronto, Canada, April 27-May 2, 2014.
  • Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang, "SBVLC: Secure Barcode-based Visible Light Communication for Smartphones", In IEEE Conference on Computer Communications (INFOCOM), Toronto, Canada, April 27 - May 2, 2014.
  • Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang, and Xinwen Fu, "Privacy-preserving outsourcing of Image Global Feature Detection", In IEEE Global Communications Conference (GLOBECOM), Austin, TX, USA, December 8-12, 2014.

2013

Journal and Magazine Articles

  • Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M. Roveda, "Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud", IEEE Transactions on Emerging Topics in Computing (TETC), vol. 1, no. 1, pp. 166-177, July 2013.
  • Cong Wang, Kui Ren, Jia Wang, and Qian Wang, "Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations", IEEE Transactions on Parallel and Distributed System (TPDS), vol. 24, no. 6, pp. 1172-1181, 2013.
  • Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE Transactions on Computers (TC), vol. 62, no. 2, pp. 362-375, 2013.

Conference and Workshop Papers

  • Zhen Xu, Cong Wang, Qian Wang, Kui Ren, and Lingyu Wang, "Proof-carrying Cloud Computation: the Case of Convex Optimization", In IEEE Conference on Computer Communications, mini-conference (INFOCOM), Turin, Italy, April 15-18, 2013.
  • Bingsheng Zhang, Helger Lipmaa, Cong Wang, and Kui Ren, "Practical Fully Simulatable Oblivious Transfer with Sublinear Communication", In International Conference on Financial Cryptography and Data Security (FC), Okinawa, Japan, April 1 - 5, 2013.
  • Cong Wang, Zhen Xu, Kui Ren, and Janet Wang, "OIRS: Outsourced Image Recovery Service from Compressive Sensing with Privacy Assurance", In Annual Network & Distributed System Security Symposium (NDSS), San Diego, USA, February, 2013.

2012

Journal and Magazine Articles

  • Richard Chow, Manas Pathak, Cong Wang, "A Practical System for Privacy-Preserving Collaborative Filtering", In IEEE International Conference on Data Mining (ICDM), Brussels, Belgium, December 10th, 2012.
  • Kurt Partridge, Manas A. Pathak, Ersin Uzun, and Cong Wang, "PiCoDa: privacy-preserving smart coupon delivery architecture", In Workshop on Hot Topics in Privacy-Preserving Technologies (HotPETS), Vigo, Spain, July, 11-13, 2012.
  • Cong Wang, Kui Ren, Shucheng Yu, and Karthik Mahendra Raje Urs, "Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data", In IEEE Conference on Computer Communications (INFOCOM), Orlando, USA, March, 25-30, 2012.

Conference and Workshop Papers

  • Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou, "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 8, pp. 1467-1479, 2012.
  • Kui Ren, Cong Wang, and Qian Wang, "Toward secure and effective data utilization in public cloud", IEEE Network Magazine, vol. 26, no. 6, pp. 69-74, November/December 2012.
  • Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing (TSC), vol. 5, no. 2, pp. 220-232, April-June 2012.
  • Kui Ren, Cong Wang, and Qian Wang, "Security Challenges in Public Cloud", IEEE Internet Computing Magazine, vol. 16, no. 1, pp. 69-73, Jan/Feb 2012.

2011

Journal and Magazine Articles

  • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 22, no. 5, pp. 847-859, May, 2011.

Conference and Workshop Papers

  • Cong Wang, Kui Ren, Jia wang, and Karthik Mahendra Raje Urs, "Harnessing the Cloud for Securely Solving Large Systems of Linear Equations", In International Conference on Distributed Computing Systems (ICDCS), Minneapolis, USA, June, 20-24, 2011.
  • Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, and Wenjing Lou, "Privacy-perserving Query over Encrypted Graph-Structured Data in Cloud Computing", In International Conference on Distributed Computing Systems (ICDCS), Minneapolis, USA, June 20-24, 2011.
  • Cong Wang, Qian Wang, and Kui Ren, "Towards Secure and Effective Utilization over Encrypted Cloud Data", In International Conference on Distributed Computing Systems, Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), Minneapolis, USA, 2011.
  • Cong Wang, Kui Ren, and Jia Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing", In IEEE Conference on Computer Communications (INFOCOM), Shanghai, China, April 10 - 15, 2011.
  • Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data", In IEEE Conference on Computer Communications (INFOCOM), Shanghai, China, April 10-15, 2011.

2010

Journal and Magazine Articles

  • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, "Toward Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July-August 2010.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-based Encryption with Attribute Hierarchy", ACM Mobile Networks and Applications (MONET), vol. 16, pp. 553-561, 2010.

Conference and Workshop Papers

  • Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data", In International Conference on Distributed Computing Systems (ICDCS), Genoa, Italy, June 21-25, 2010.
  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing", In IEEE Conference on Computer Communications (INFOCOM), San Diego, USA, 2010.
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Finegrained Data Dccess Control in Cloud Computing", In IEEE Conference on Computer Communications (INFOCOM), San Diego, USA, March 15-19, 2010.
  • Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing", In IEEE Conference on Computer Communications, mini-conference (INFOCOM), San Diego, USA, March 15 - 19, 2010.
  • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Attribute Based Data Sharing with Attribute Revocation", In ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, April 13-16, 2010.

2009

Conference and Workshop Papers

  • Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", In IEEE International Workshop on Quality of Service (IWQoS), Charleston, South Carolina, USA, July 13 - 15, 2009.
  • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", In European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 21-23, 2009.
  • Qian Wang, Kui Ren, Cong Wangg, and Wenjing Lou, "Efficient Fine-grained Data Access Control in Wireless Sensor Networks", In International Conference for Military Communications (MILCOM), Boston, USA, October 18-21, 2009.
  • Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-based Encryption with Attribute Hierarchy", In International Conference on Communications and Networking in China (ChinaCom), Xi’an, China, August 26-28, 2009.