Jingwei Li

According to our database1, Jingwei Li authored at least 59 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Deformation Response of Seismogenic Faults to the Wenchuan MS 8.0 Earthquake: A Case Study for the Southern Segment of the Longmenshan Fault Zone.
Remote Sensing, 2018

BigDataBench: A Dwarf-based Big Data and AI Benchmark Suite.
CoRR, 2018

BOPS, Not FLOPS! A New Metric, Measuring Tool, and Roofline Performance Model For Datacenter Computing.
CoRR, 2018

A Hybrid Approach for Predicting Aging-Related Failures of Software Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

2017
The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System.
TOS, 2017

MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Sec. Comput., 2017

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Computing, 2017

Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching.
Multimedia Tools Appl., 2017

Optimized thermal sensor allocation for field-programmable gate array temperature measurements based on self-heating test.
Microelectronics Journal, 2017

Copy-move forgery detection based on hybrid features.
Eng. Appl. of AI, 2017

PAS: policy-based assistance in sensor networks.
Computing, 2017

A Recommendation-Based Parameter Tuning Approach for Hadoop.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Information Leakage in Encrypted Deduplication via Frequency Analysis.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Image semantic segmentation optimization by Conditional Random Field integrated with object clique potential.
Proceedings of the 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2017

An end-to-end generative adversarial network for crowd counting under complicated scenes.
Proceedings of the 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2017

2016
Distributed Control for Charging Multiple Electric Vehicles with Overload Limitation.
IEEE Trans. Parallel Distrib. Syst., 2016

Secure Auditing and Deduplicating Data in Cloud.
IEEE Trans. Computers, 2016

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
IEEE Internet Computing, 2016

Distributed Control for Charging Multiple Electric Vehicles with Overload Limitation.
CoRR, 2016

The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System.
CoRR, 2016

An Improved BLP Model with More Flexibility.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

Rekeying for Encrypted Deduplication Storage.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Efficient Network Path Verification for Policy-routedQueries.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

A Comprehensive Literature Review on Big Data in Healthcare.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multimedia Tools Appl., 2015

New access control systems based on outsourced attribute-based encryption.
Journal of Computer Security, 2015

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
IACR Cryptology ePrint Archive, 2015

SecLoc: Securing Location-Sensitive Storage in the Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

LDA Based Event Extraction: Detecting Influenza Epidemics Using Microblog.
Proceedings of the Data Science - Second International Conference, 2015

SMART: Design and Evaluation of a Collaborative Museum Visiting Application.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2015

Evolution from Shark to Spark SQL: Preliminary Analysis and Qualitative Evaluation.
Proceedings of the Big Data Benchmarks, Performance Optimization, and Emerging Hardware, 2015

2014
Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distrib. Syst., 2014

{MobiShare}+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
IJDWM, 2014

Privacy-preserving data utilization in hybrid clouds.
Future Generation Comp. Syst., 2014

Characterizing and Subsetting Big Data Workloads.
CoRR, 2014

ExpertBayes: Automatically refining manually built Bayesian networks.
CoRR, 2014

Enabling efficient and secure data sharing in cloud computing.
Concurrency and Computation: Practice and Experience, 2014

Policy Driven Node Selection in MapReduce.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Securing Resource Discovery in Content Hosting Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Characterizing and subsetting big data workloads.
Proceedings of the 2014 IEEE International Symposium on Workload Characterization, 2014

2013
Cycle-walking revisited: consistency, security, and efficiency.
Security and Communication Networks, 2013

Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Format-Preserving Encryption for Character Data.
JNW, 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptology ePrint Archive, 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Local density adaptive similarity measurement for spectral clustering.
Pattern Recognition Letters, 2011

A Data Management Tool for Virtual Screening on Grid.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

2010
Optimizing Segment Caching for Mobile Peer-to-Peer Interactive Streaming.
Proceedings of IEEE International Conference on Communications, 2010

A Novel Approach to Improving the Efficiency of Storing and Accessing Small Files on Hadoop: A Case Study by PowerPoint Files.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Study on Control Strategy of Clutch Engagement Based on Fuzzy Control during Vehicle Starting.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009


  Loading...