Wei Jiang
Orcid: 0009-0009-2397-8849Affiliations:
- Oracle Labs, Belmont, CA, USA
- University of Missouri, Department of Electrical Engineering and Computer Science, Columbia, MO, USA
- Missouri University of Science and Technology, Department of Computer Science, Rolla, MO, USA
- Purdue University, West Lafayette, IN, USA (PhD 2008)
According to our database1,
Wei Jiang
authored at least 71 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments.
IEEE Trans. Dependable Secur. Comput., 2025
Oblivious and distributed firewall policies for securing firewalls from malicious attacks.
Comput. Secur., 2025
2024
Provable Privacy Guarantee for Individual Identities and Locations in Large-Scale Contact Tracing.
CoRR, 2024
2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning.
Proceedings of the 18th International Symposium on Spatial and Temporal Data, 2023
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023
2022
NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Concurr. Comput. Pract. Exp., 2021
2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
Comput. Secur., 2018
Work-in-Progress: RWS - A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018
Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
2015
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data.
IEEE Trans. Knowl. Data Eng., 2015
Trans. Data Priv., 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
ACM Trans. Intell. Syst. Technol., 2014
Int. J. Parallel Emergent Distributed Syst., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Adv. Comput., 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Knowl. Data Eng., 2013
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013
Argument placement recommendation and relevancy assessment in an intelligent argumentation system.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Proceedings of the Critical Infrastructure Protection VI, 2012
Identification of faction groups and leaders in Web-based intelligent argumentation system for collaborative decision support.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Proceedings of the Database Systems for Advanced Applications, 2010
2009
Data Knowl. Eng., 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
IEEE Trans. Inf. Technol. Biomed., 2008
SIGKDD Explor., 2008
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the Next Generation of Data Mining., 2008
2007
Proceedings of the SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2007
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007
2006
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the Data and Applications Security XIX, 2005