Cong Wang

According to our database1, Cong Wang authored at least 96 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Enabling Encrypted Rich Queries in Distributed Key-Value Stores.
IEEE Trans. Parallel Distrib. Syst., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Information Forensics and Security, 2019

PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Information Forensics and Security, 2019

Toward Secure and Scalable Computation in Internet of Things Data Applications.
IEEE Internet of Things Journal, 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet of Things Journal, 2019

Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.
IEEE Internet of Things Journal, 2019

A Privacy-Preserving System for Targeted Coupon Service.
IEEE Access, 2019

2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distrib. Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distrib. Syst., 2018

Assuring String Pattern Matching in Outsourced Middleboxes.
IEEE/ACM Trans. Netw., 2018

Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Information Forensics and Security, 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Information Forensics and Security, 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Sec. Comput., 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Network, 2018

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern.
IEEE Access, 2018

Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
Toward Encrypted Cloud Media Center With Secure Deduplication.
IEEE Trans. Multimedia, 2017

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing.
IEEE Trans. Mob. Comput., 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing.
IEEE Trans. Knowl. Data Eng., 2017

Privacy-Preserving Image Denoising From External Cloud Databases.
IEEE Trans. Information Forensics and Security, 2017

Privacy-Preserving Similarity Joins Over Encrypted Data.
IEEE Trans. Information Forensics and Security, 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Information Forensics and Security, 2017

Multi-Client Searchable Encryption over Distributed Key-Value Stores.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Hardening Distributed and Encrypted Keyword Search via Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

EncSIM: An encrypted similarity search service for distributed high-dimensional datasets.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Generic Method for Accelerating LSH-Based Similarity Join Processing (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Towards trustworthy and private keyword search in encrypted decentralized storage.
Proceedings of the IEEE International Conference on Communications, 2017

Secure multi-client data access with boolean queries in distributed key-value stores.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

EncKV: An Encrypted Key-value Store with Rich Queries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.
TOMCCAP, 2016

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multimedia, 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Information Forensics and Security, 2016

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching.
IEEE Journal on Selected Areas in Communications, 2016

Towards privacy-preserving user targeting.
J. Comm. Inform. Networks, 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery.
IEEE Access, 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy-preserving deep packet inspection in outsourced middleboxes.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards verifiable outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Bringing execution assurances of pattern matching in outsourced middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Privacy-Preserving Ridesharing Recommendation in Geosocial Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Building an Encrypted, Distributed, and Searchable Key-value Store.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud.
IEEE Trans. Parallel Distrib. Syst., 2015

Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Information Forensics and Security, 2015

Towards Secure and Practical Targeted Mobile Advertising.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Generalized pattern matching string search on encrypted data in cloud systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards secure and practical targeted mobile advertising.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards a scalable, private, and searchable key-value store.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication.
Proceedings of the 10th ACM Symposium on Information, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Information Forensics and Security, 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet of Things Journal, 2014

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

SBVLC: Secure barcode-based visible light communication for smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distrib. Syst., 2013

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.
IEEE Trans. Emerging Topics Comput., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptology ePrint Archive, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Services Computing, 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distrib. Syst., 2012

Toward secure and effective data utilization in public cloud.
IEEE Network, 2012

Security Challenges for the Public Cloud.
IEEE Internet Computing, 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A Practical System for Privacy-Preserving Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
MONET, 2011

Secure and practical outsourcing of linear programming in cloud computing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving multi-keyword ranked search over encrypted cloud data.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Towards Secure and Effective Utilization over Encrypted Cloud Data.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Toward publicly auditable secure cloud data storage services.
IEEE Network, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptology ePrint Archive, 2009

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IACR Cryptology ePrint Archive, 2009

Enhancing Attribute-based Encryption with Attribute Hierarchy.
IACR Cryptology ePrint Archive, 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptology ePrint Archive, 2009

Ensuring data storage security in Cloud Computing.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009


  Loading...