Wei Jiang

Orcid: 0009-0009-2397-8849

Affiliations:
  • Oracle Labs, Belmont, CA, USA
  • University of Missouri, Department of Electrical Engineering and Computer Science, Columbia, MO, USA
  • Missouri University of Science and Technology, Department of Computer Science, Rolla, MO, USA
  • Purdue University, West Lafayette, IN, USA (PhD 2008)


According to our database1, Wei Jiang authored at least 71 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments.
IEEE Trans. Dependable Secur. Comput., 2025

Oblivious and distributed firewall policies for securing firewalls from malicious attacks.
Comput. Secur., 2025

2024
Provable Privacy Guarantee for Individual Identities and Locations in Large-Scale Contact Tracing.
CoRR, 2024

2023
Preserving Location Privacy in the Modern Era of Pervasive Environments.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning.
Proceedings of the 18th International Symposium on Spatial and Temporal Data, 2023

FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

2022
NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Lucene-P$^2$2: A Distributed Platform for Privacy-Preserving Text-Based Search.
IEEE Trans. Dependable Secur. Comput., 2021

Identifying outlier opinions in an online intelligent argumentation system.
Concurr. Comput. Pract. Exp., 2021

2020
Privacy-Preserving Friend Recommendation in an Integrated Social Environment.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

Hiding in the Clouds and Building a Stealth Communication Network.
CoRR, 2019

2018
Highly efficient randomized authentication in VANETs.
Pervasive Mob. Comput., 2018

UFace: Your universal password that no one can see.
Comput. Secur., 2018

Privacy-preserving power usage and supply control in smart grid.
Comput. Secur., 2018

Work-in-Progress: RWS - A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
UFace: Your Universal Password That No One Can See.
IACR Cryptol. ePrint Arch., 2017

PAS: policy-based assistance in sensor networks.
Computing, 2017

Poster: A Location-Privacy Approach for Continuous Queries.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

No one can track you: Randomized authentication in Vehicular Ad-hoc Networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

2016
Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient.
IEEE Trans. Dependable Secur. Comput., 2016

2015
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data.
IEEE Trans. Knowl. Data Eng., 2015

Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks.
Trans. Data Priv., 2015

Interest-driven private friend recommendation.
Knowl. Inf. Syst., 2015

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Traffic Information Publication with Privacy Preservation.
ACM Trans. Intell. Syst. Technol., 2014

Secure and threshold-based power usage control in smart grid environments.
Int. J. Parallel Emergent Distributed Syst., 2014

Randomized and Efficient Authentication in Mobile Environments.
IACR Cryptol. ePrint Arch., 2014

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases.
CoRR, 2014

Similarity of Private Keyword Search over Encrypted Document Collection.
Adv. Comput., 2014

Secure k-nearest neighbor query over encrypted data in outsourced environments.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Outsourceable two-party privacy-preserving biometric authentication.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Incentive Compatible Privacy-Preserving Data Analysis.
IEEE Trans. Knowl. Data Eng., 2013

A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Argument placement recommendation and relevancy assessment in an intelligent argumentation system.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

An efficient and probabilistic secure bit-decomposition.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
t-Plausibility: Generalizing Words to Desensitize Text.
Trans. Data Priv., 2012

Privacy-Preserving Power Usage Control in the Smart Grid.
Proceedings of the Critical Infrastructure Protection VI, 2012

Identification of faction groups and leaders in Web-based intelligent argumentation system for collaborative decision support.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Structural and Message Based Private Friend Recommendation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Privacy-Preserving Updates to Anonymous and Confidential Databases.
IEEE Trans. Dependable Secur. Comput., 2011

A Secure and Distributed Framework to Identify and Share Needed Information.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

N-Gram Based Secure Similar Document Detection.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Efficient privacy-preserving similar document detection.
VLDB J., 2010

Privacy-Preserving Location Publishing under Road-Network Constraints.
Proceedings of the Database Systems for Advanced Applications, 2010

2009
Formal anonymity models for efficient privacy-preserving joins.
Data Knowl. Eng., 2009

t-Plausibility: Semantic Preserving Text Sanitization.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Survey of Quantification of Privacy Preserving Data Mining Algorithms.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Incentive-driven and privacy-preserving collaborative computing
PhD thesis, 2008

A Cryptographic Approach to Securely Share and Query Genomic Sequences.
IEEE Trans. Inf. Technol. Biomed., 2008

PinKDD'08: privacy, security, and trust in KDD post workshop report.
SIGKDD Explor., 2008

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008

Transforming semi-honest protocols to ensure accountability.
Data Knowl. Eng., 2008

A Privacy-Preserving Framework for Integrating Person-Specific Databases.
Proceedings of the Privacy in Statistical Databases, 2008

Privately Updating Suppression and Generalization based k-Anonymous Databases.
Proceedings of the 24th International Conference on Data Engineering, 2008

Similar Document Detection with Limited Information Disclosure.
Proceedings of the 24th International Conference on Data Engineering, 2008

Is Privacy Still an Issue for Data Mining?
Proceedings of the Next Generation of Data Mining., 2008

2007
Protecting source privacy in federated search.
Proceedings of the SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2007

AC-Framework for Privacy-Preserving Collaboration.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

Secure Content Validation.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Identifying Rare Classes with Sparse Training Data.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

2006
A secure distributed framework for achieving <i>k</i>-anonymity.
VLDB J., 2006

Transforming Semi-Honest Protocols to Ensure Accountability.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Secure Distributed k-Anonymous Pattern Mining.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Knowledge Discovery from Transportation Network Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

Privacy-Preserving Distributed k-Anonymity.
Proceedings of the Data and Applications Security XIX, 2005


  Loading...