Boyang Wang

According to our database1, Boyang Wang authored at least 70 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Motion Primitives Representation, Extraction and Connection for Automated Vehicle Motion Planning Applications.
IEEE Trans. Intell. Transp. Syst., 2020

Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2020

A Benchmark for Studying Diabetic Retinopathy: Segmentation, Grading, and Transferability.
CoRR, 2020

Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach.
CoRR, 2020

Fingerprinting encrypted voice traffic on smart speakers with deep learning.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Data inference from encrypted databases: a multi-dimensional order-preserving matching approach.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Sparser: Secure Nearest Neighbor Search with Space-filling Curves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

EcoBoost: Efficient Bootstrapping for Confidential Transactions.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Faster Region Convolutional Neural Networks Applied to Ultrasonic Images for Breast Lesion Detection and Classification.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Learning FIR Filter Coefficients from Data for Speech-Music Separation.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Embedded Mobile ROS Platform for SLAM Application with RGB-D Cameras.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Near-Ultrasonic Communications for IoT Applications using Android Smartphone.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Design Flow of Wireless Body Sensor Network for Human Activity Classification using Long Short-Term Memory (LSTM) Neural Network.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Mitigating File-Injection Attacks with Natural Language Processing.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2019
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data.
IEEE Trans. Dependable Secur. Comput., 2019

DR-GAN: Conditional Generative Adversarial Network for Fine-Grained Lesion Synthesis on Diabetic Retinopathy Images.
CoRR, 2019

Feedback-Added Pseudoinverse-Type Balanced Minimization Scheme for Kinematic Control of Redundant Robot Manipulators.
IEEE Access, 2019

A Behavior-Aware Profiling of Smart Contracts.
Proceedings of the Security and Privacy in Communication Networks, 2019

DME-Net: Diabetic Macular Edema Grading by Auxiliary Task Learning.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Evaluation of Retinal Image Quality Assessment Networks in Different Color-Spaces.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Regeneration and Joining of the Learned Motion Primitives for Automated Vehicle Motion Planning Applications.
Proceedings of the 2019 IEEE Intelligent Vehicles Symposium, 2019

Accelerate Black-Box Attack with White-Box Prior Knowledge.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning, 2019

Ultrasonic Communication Systems for Data Transmission.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

A Single-Camera 3D Microscope Scanner with Image Stitching and Stereo Matching.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

2018
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

Lightweight Verification for Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Learning and Generalizing Motion Primitives From Driving Data for Path-Tracking Applications.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Development and Evaluation of Two Learning-Based Personalized Driver Models for Pure Pursuit Path-Tracking Behaviors.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Learning to Segment and Represent Motion Primitives from Driving Data for Motion Planning Applications.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Design Flow of Neural Network Application for IoT Based Fall Detection System.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Software Defined Ultrasonic System for Communication Through Solid Structures.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Fetal Electrocardiogram Recognition Using Multilayer Perceptron Neural Network.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

2017
Secure Geometric Search on Encrypted Spatial Data.
PhD thesis, 2017

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
IACR Cryptol. ePrint Arch., 2017

Ultrasonic target echo detection using neural network.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017

2016
Geometric Range Search on Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2016

Hardware and software architectures for computationally efficient three-dimensional ultrasonic data compression.
IET Circuits Devices Syst., 2016

Practical and secure nearest neighbor search on encrypted large-scale data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Ultrasonic Signal Acquisition and Processing platform based on Zynq SoC.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
IEEE Trans. Serv. Comput., 2015

A novel algorithm for detecting center of tropical cyclone in satellite infrared images.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Acceleration of ultrasonic data compression using OpenCL on GPU.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Design and evaluation of reconfigurable ultrasonic testing system.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Circular range search on encrypted spatial data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud.
IEEE Trans. Cloud Comput., 2014

Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Secur. Commun. Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

Public auditing for shared data with efficient user revocation in the cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

Gmatch: Secure and privacy-preserving group matching in social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2012

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012


  Loading...