Bing Wang

Orcid: 0000-0002-1954-8821

Affiliations:
  • Virginia Polytechnic Institute and State University, Department of Computer Science, Falls Church, VA, USA


According to our database1, Bing Wang authored at least 12 papers between 2013 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017

Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017

Privacy-preserving pattern matching over encrypted genetic data in cloud computing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Search over Encrypted Data in Cloud Computing.
PhD thesis, 2016

2015
DDoS attack protection in the era of cloud computing and Software-Defined Networking.
Comput. Networks, 2015

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Privacy-Preserving Link Prediction in Decentralized Online Social Networks.
Proceedings of the Computer Security - ESORICS 2015, 2015

Modeling the side-channel attacks in data deduplication with game theory.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013


  Loading...