According to our database1, Cheng Hong authored at least 16 papers between 2011 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
IACR Cryptology ePrint Archive, 2018
The joint effect of association-based corporate posting strategy and eWOM comment valence on social media.
Internet Research, 2017
"Liking" and being "liked": How are personality traits and demographics associated with giving and receiving "likes" on Facebook?
Computers in Human Behavior, 2017
An Efficient Wireless Fronthaul (EWF) Method for LTE Signal Transmission.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Triple line-voltage cascaded VIENNA converter applied as the medium-voltage rectifier.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Fast Multi-dimensional Range Queries on Encrypted Cloud Databases.
Proceedings of the Database Systems for Advanced Applications, 2017
Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
A 15GHz Full Duplex System for Microwave Backhauling.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptology ePrint Archive, 2014
A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014
Holographic Projection Using Converging Spherical Wave Illumination.
Proceedings of the Seventh International Conference on Image and Graphics, 2013
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011