Jingwei Li

Orcid: 0000-0001-8457-0454

Affiliations:
  • University of Electronic Science and Technology of China, Center for Cyber Security, Sichuan, China
  • Chinese University of Hong Kong, Department of Computer Science and Engineering, Hong Kong (2015 - 2016)
  • Nankai University, College of Computer and Control Engineering, China (PhD 2014)


According to our database1, Jingwei Li authored at least 50 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing.
IEEE Trans. Computers, August, 2023

Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients.
Proceedings of the IEEE INFOCOM 2023, 2023

FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage.
Proceedings of the IEEE INFOCOM 2023, 2023

ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

2022
Tunable Encrypted Deduplication with Attack-resilient Key Management.
ACM Trans. Storage, 2022

Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication.
IEEE Trans. Computers, 2022

Dynamic incentive mechanism design for regulation-aware systems.
Int. J. Intell. Syst., 2022

Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution.
Proceedings of the IEEE INFOCOM 2022, 2022

Improving Online Restore Performance of Backup Storage via Historical File Access Pattern.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Accelerating Encrypted Deduplication via SGX.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

2020
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses.
ACM Trans. Storage, 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

Balancing storage efficiency and data confidentiality with tunable encrypted deduplication.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

2019
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019

Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection.
Proceedings of the 35th Symposium on Mass Storage Systems and Technologies, 2019

2017
The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System.
ACM Trans. Storage, 2017

MMB<sup>cloud</sup>-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Comput., 2017

PAS: policy-based assistance in sensor networks.
Computing, 2017

Information Leakage in Encrypted Deduplication via Frequency Analysis.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Secure Auditing and Deduplicating Data in Cloud.
IEEE Trans. Computers, 2016

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
IEEE Internet Comput., 2016

Rekeying for Encrypted Deduplication Storage.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Efficient Network Path Verification for Policy-routedQueries.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multim. Tools Appl., 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
IACR Cryptol. ePrint Arch., 2015

SecLoc: Securing Location-Sensitive Storage in the Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distributed Syst., 2014

MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
Int. J. Data Warehous. Min., 2014

Privacy-preserving data utilization in hybrid clouds.
Future Gener. Comput. Syst., 2014

Enabling efficient and secure data sharing in cloud computing.
Concurr. Comput. Pract. Exp., 2014

Policy Driven Node Selection in MapReduce.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Securing Resource Discovery in Content Hosting Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Cycle-walking revisited: consistency, security, and efficiency.
Secur. Commun. Networks, 2013

Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Format-Preserving Encryption for Character Data.
J. Networks, 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012


  Loading...