Cheng Hong
According to our database1,
Cheng Hong
authored at least 16 papers
between 2011 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
IACR Cryptology ePrint Archive, 2018
2017
The joint effect of association-based corporate posting strategy and eWOM comment valence on social media.
Internet Research, 2017
"Liking" and being "liked": How are personality traits and demographics associated with giving and receiving "likes" on Facebook?
Computers in Human Behavior, 2017
An Efficient Wireless Fronthaul (EWF) Method for LTE Signal Transmission.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Triple line-voltage cascaded VIENNA converter applied as the medium-voltage rectifier.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Fast Multi-dimensional Range Queries on Encrypted Cloud Databases.
Proceedings of the Database Systems for Advanced Applications, 2017
2016
Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
2015
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
A 15GHz Full Duplex System for Microwave Backhauling.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
2014
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptology ePrint Archive, 2014
A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014
2013
Holographic Projection Using Converging Spherical Wave Illumination.
Proceedings of the Seventh International Conference on Image and Graphics, 2013
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011