Cong Wang

According to our database1, Cong Wang authored at least 131 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication.
IEEE Trans. Parallel Distributed Syst., 2021

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness.
IEEE Trans. Dependable Secur. Comput., 2021

2020
A Practical System for Privacy-Aware Targeted Mobile Advertising Services.
IEEE Trans. Serv. Comput., 2020

Enabling Encrypted Boolean Queries in Geographically Distributed Databases.
IEEE Trans. Parallel Distributed Syst., 2020

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery.
IEEE Trans. Dependable Secur. Comput., 2020

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

The Security of Autonomous Driving: Threats, Defenses, and Future Directions.
Proc. IEEE, 2020

Toward Comprehensive Network Verification: Practices, Challenges and Beyond.
IEEE Netw., 2020

Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes.
IEEE Internet Things J., 2020

FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism.
CoRR, 2020

Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS.
CoRR, 2020

ShieldDB: An Encrypted Document Database with Padding Countermeasures.
CoRR, 2020

A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020

EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Enabling Encrypted Rich Queries in Distributed Key-Value Stores.
IEEE Trans. Parallel Distributed Syst., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Toward Secure and Scalable Computation in Internet of Things Data Applications.
IEEE Internet Things J., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet Things J., 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019

Defending Against Misclassification Attacks in Transfer Learning.
CoRR, 2019

Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures.
IEEE Commun. Mag., 2019

A Privacy-Preserving System for Targeted Coupon Service.
IEEE Access, 2019

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

pRide: private ride request for online ride hailing service with secure hardware enclave.
Proceedings of the International Symposium on Quality of Service, 2019

Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

SPEED: Accelerating Enclave Applications Via Secure Deduplication.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Towards Secure and Efficient Outsourcing of Machine Learning Classification.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distributed Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distributed Syst., 2018

Assuring String Pattern Matching in Outsourced Middleboxes.
IEEE/ACM Trans. Netw., 2018

Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Inf. Forensics Secur., 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Secur. Comput., 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Netw., 2018

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern.
IEEE Access, 2018

Tutorial: Building Secure and Trustworthy Blockchain Applications.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

A Bandwidth-Efficient Middleware for Encrypted Deduplication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multim., 2017

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing.
IEEE Trans. Mob. Comput., 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing.
IEEE Trans. Knowl. Data Eng., 2017

Privacy-Preserving Image Denoising From External Cloud Databases.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Similarity Joins Over Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

LightBox: SGX-assisted Secure Network Functions at Near-native Speed.
CoRR, 2017

Multi-Client Searchable Encryption over Distributed Key-Value Stores.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Hardening Distributed and Encrypted Keyword Search via Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Towards trustworthy and private keyword search in encrypted decentralized storage.
Proceedings of the IEEE International Conference on Communications, 2017

Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

EncKV: An Encrypted Key-value Store with Rich Queries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.
IEEE Trans. Mob. Comput., 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching.
IEEE J. Sel. Areas Commun., 2016

Towards privacy-preserving user targeting.
J. Commun. Inf. Networks, 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy-preserving deep packet inspection in outsourced middleboxes.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards verifiable outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Bringing execution assurances of pattern matching in outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Privacy-Preserving Ridesharing Recommendation in Geosocial Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Building an Encrypted, Distributed, and Searchable Key-value Store.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Inf. Forensics Secur., 2015

Towards Secure and Practical Targeted Mobile Advertising.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Generalized pattern matching string search on encrypted data in cloud systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards a scalable, private, and searchable key-value store.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2014

Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Inf. Forensics Secur., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.
IEEE Trans. Emerg. Top. Comput., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Serv. Comput., 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2012

Toward secure and effective data utilization in public cloud.
IEEE Netw., 2012

Security Challenges for the Public Cloud.
IEEE Internet Comput., 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A Practical System for Privacy-Preserving Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
Mob. Networks Appl., 2011

Secure and practical outsourcing of linear programming in cloud computing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Towards Secure and Effective Utilization over Encrypted Cloud Data.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Toward publicly auditable secure cloud data storage services.
IEEE Netw., 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Ensuring Data Storage Security in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptol. ePrint Arch., 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009


  Loading...