Boyang Wang

Orcid: 0000-0001-8973-2328

Affiliations:
  • University of Cincinnati, Department of Electrical Engineering and Computer Science, OH, USA
  • University of Arizona, Department of electrical and computer engineering, Tucson, AZ, USA (PhD 2017)
  • Utah State University, Department of Computer Science, UT, USA (2012-2013)
  • University of Toronto, Department of Electrical and Computer Engineering, Canada (2010-2012)
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China


According to our database1, Boyang Wang authored at least 50 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Mitigating Data Poisoning Attacks to Local Differential Privacy.
CoRR, June, 2025

2024
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
FastReach: A system for privacy-preserving reachability queries over location data.
Comput. Secur., December, 2023

Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022

QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data.
IEEE Trans. Cloud Comput., 2022

AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

MultiEvasion: Evasion Attacks Against Multiple Malware Detectors.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2020

Fingerprinting encrypted voice traffic on smart speakers with deep learning.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting.
Proceedings of the Security and Privacy in Communication Networks, 2020

Data inference from encrypted databases: a multi-dimensional order-preserving matching approach.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Sparser: Secure Nearest Neighbor Search with Space-filling Curves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

EcoBoost: Efficient Bootstrapping for Confidential Transactions.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data.
IEEE Trans. Dependable Secur. Comput., 2019

A Behavior-Aware Profiling of Smart Contracts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

Lightweight Verification for Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

2017
Secure Geometric Search on Encrypted Spatial Data.
PhD thesis, 2017

2016
Geometric Range Search on Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2016

Practical and secure nearest neighbor search on encrypted large-scale data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
IEEE Trans. Serv. Comput., 2015

Circular range search on encrypted spatial data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud.
IEEE Trans. Cloud Comput., 2014

Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Secur. Commun. Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

Public auditing for shared data with efficient user revocation in the cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

Gmatch: Secure and privacy-preserving group matching in social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2012

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012


  Loading...