


Остановите войну!
for scientists:


default search action
Cong Wang 0001
王聰
Person information

- unicode name: 王聰
- affiliation: City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation (until 2012): Illinois Institute of Technology, Chicago, IL, USA
Other persons with the same name
- Cong Wang — disambiguation page
- Cong Wang 0002 — Simon Fraser University, Burnaby, Canada
- Cong Wang 0003
— Beijing University of Posts and Telecommunications, School of Software Engineering, China
- Cong Wang 0004
— Tianjin University of Science and Technology, College of Computer Science and Information Engineering, China (and 1 more)
- Cong Wang 0005
— Harbin Institute of Technology, School of Electronics and Information Engineering, China (and 1 more)
- Cong Wang 0006
— George Mason University, USA (and 2 more)
- Cong Wang 0007
— Shandong University, School of Control Science and Engineering, Jinan, China (and 3 more)
- Cong Wang 0008
— Army Engineering University of PLA, College of Communications Engineering, Nanjing, China
- Cong Wang 0009
— Northeastern University at Qinhuangdao, School of Computer and Communication Engineering, China
- Cong Wang 0010
— École Polytechnique Fédérale de Lausanne, Switzerland
- Cong Wang 0011
— Southeast University, National Mobile Commutation Research Laboratory, Nanjing, China (and 1 more)
- Cong Wang 0012
— University of California Santa Cruz, CA, USA (and 2 more)
- Cong Wang 0013
— Northwestern Polytechnical University, School of Computer Science, Shaanxi Provincial Key Laboratory of Speech and Image Information Processing, Xi'an, China
- Cong Wang 0014
— University of North Carolina at Chapel Hill, NC, USA (and 1 more)
- Cong Wang 0015
— New Jersery Institute of Technology, Newark, NJ, USA (and 1 more)
- Cong Wang 0016 — Wright State University, Dayton, OH, USA
- Cong Wang 0017
— Tianjin University, College of Intelligence and Computing, China
- Cong Wang 0018
— Hong Kong Polytechnic University, Department of Computing, Hong Kong (and 1 more)
- Cong Wang 0019
— Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Cong Wang 0020 — Tsinghua University, School of Software, KLISS, BNRist, Beijing, China
- Cong Wang 0021
— University of Queensland, Queensland Brain Institute, Saint Lucia, QLD, Australia (and 1 more)
- Cong Wang 0022
— Macquarie University, Department of Economics, Sydney, NSW, Australia
- Cong Wang 0023
— Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Cong Wang 0024
— Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 1 more)
- Cong Wang 0025
— Singapore-MIT Alliance for Research and Technology, Singapore (and 1 more)
- Cong Wang 0026
— Tianjin University, School of Electrical and Information Engineering, China (and 1 more)
- Cong Wang 0027
— Chinese Academy of Sciences, Shenyang Institute of Automation, China (and 1 more)
- Cong Wang 0028
— Nanjing University of Aeronautics and Astronautics, Department of Biomedical Engineering, China
- Cong Wang 0029
— Capital Normal University, School of Mathematical Sciences, Beijing, China (and 1 more)
- Cong Wang 0030
— China University of Mining and Technology, School of Mechanical, Electronic and Information Engineering, Beijing, China
- Cong Wang 0031
— Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, Jiangsu Key Laboratory of Medical Optics, China (and 1 more)
- Cong Wang 0032 (aka: Cherry Cong Wang) — University of Washington, Information School, Seattle, WA, USA
- Cong Wang 0033
— Northwestern Polytechnical University, School of Artificial Intelligence, OPtics and ElectroNics, iOPEN, Xi'an, China (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j103]Huayi Duan
, Yuefeng Du
, Leqian Zheng
, Cong Wang
, Man Ho Au
, Qian Wang
:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 20(1): 708-723 (2023) - [j102]Bang Wu, Shuo Wang
, Xingliang Yuan
, Cong Wang
, Carsten Rudolph
, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [j101]Yifeng Zheng
, Shangqi Lai
, Yi Liu
, Xingliang Yuan
, Xun Yi
, Cong Wang
:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. IEEE Trans. Dependable Secur. Comput. 20(2): 988-1001 (2023) - [j100]Man Zhou
, Qian Wang
, Xiu Lin, Yi Zhao
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j99]Dan Liu, Qian Wang
, Man Zhou
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j98]Peipei Jiang
, Qian Wang
, Xiu Lin, Man Zhou
, Wenbing Ding, Cong Wang
, Chao Shen
, Qi Li
:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j97]Yu Guo, Chen Zhang, Cong Wang, Xiaohua Jia:
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain. IEEE Trans. Dependable Secur. Comput. 20(3): 2111-2126 (2023) - [j96]Zheng Zheng
, Qian Wang
, Cong Wang
, Man Zhou, Yi Zhao
, Qi Li
, Chao Shen
:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j95]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Qian Wang, Cong Wang:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2929-2944 (2023) - [j94]Viet Vo
, Xingliang Yuan
, Shi-Feng Sun
, Joseph K. Liu
, Surya Nepal
, Cong Wang
:
ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng. 35(4): 4236-4252 (2023) - [j93]Mingyue Wang
, Yinbin Miao
, Yu Guo
, Hejiao Huang
, Cong Wang
, Xiaohua Jia
:
AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems. IEEE Trans. Parallel Distributed Syst. 34(1): 92-107 (2023) - [j92]Jie Xu, Qingyuan Xie, Sen Peng, Cong Wang, Xiaohua Jia:
AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication. IEEE Trans. Parallel Distributed Syst. 34(6): 1909-1922 (2023) - [j91]Mingyue Wang
, Yu Guo
, Chen Zhang
, Cong Wang
, Hejiao Huang
, Xiaohua Jia
:
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. IEEE Trans. Serv. Comput. 16(1): 438-451 (2023) - [j90]Lei Xu
, Xingliang Yuan
, Zhengxiang Zhou, Cong Wang
, Chungen Xu
:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. IEEE Trans. Serv. Comput. 16(1): 656-669 (2023) - [c92]Jiamin Li
, Hong Xu
, Yibo Zhu
, Zherui Liu
, Chuanxiong Guo
, Cong Wang
:
Lyra: Elastic Scheduling for Deep Learning Clusters. EuroSys 2023: 835-850 - [c91]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [c90]Xueluan Gong
, Ziyao Wang
, Yanjiao Chen
, Qian Wang
, Cong Wang
, Chao Shen
:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - 2022
- [j89]Xinyu Tang, Cheng Guo
, Yizhi Ren, Cong Wang
, Kim-Kwang Raymond Choo
:
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems. IEEE Syst. J. 16(2): 1717-1728 (2022) - [j88]Yifeng Zheng
, Huayi Duan
, Cong Wang
, Ruochen Wang, Surya Nepal
:
Securely and Efficiently Outsourcing Decision Tree Inference. IEEE Trans. Dependable Secur. Comput. 19(3): 1841-1855 (2022) - [j87]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang
, Man Ho Au
, Qian Wang
:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. IEEE Trans. Dependable Secur. Comput. 19(5): 3038-3054 (2022) - [j86]Xinyu Wang
, Yuefeng Du
, Cong Wang
, Qian Wang
, Liming Fang
:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Trans. Dependable Secur. Comput. 19(5): 3055-3070 (2022) - [j85]Jia-Si Weng
, Jian Weng, Chengjun Cai
, Hongwei Huang, Cong Wang
:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. IEEE Trans. Dependable Secur. Comput. 19(5): 3149-3167 (2022) - [j84]Yu Guo
, Hongcheng Xie
, Cong Wang
, Xiaohua Jia
:
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services. IEEE Trans. Dependable Secur. Comput. 19(5): 3401-3416 (2022) - [j83]Chengjun Cai
, Lei Xu
, Anxin Zhou
, Cong Wang
:
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains. IEEE Trans. Dependable Secur. Comput. 19(6): 3640-3655 (2022) - [j82]Wanyu Lin
, Baochun Li
, Cong Wang
:
Towards Private Learning on Decentralized Graphs With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 17: 2936-2946 (2022) - [j81]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Hejiao Huang
, Cong Wang
:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. IEEE Trans. Inf. Forensics Secur. 17: 3582-3596 (2022) - [j80]Siwei Wu, Lei Wu
, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo
, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j79]Libin Liu
, Hong Xu
, Zhixiong Niu, Jingzong Li
, Wei Zhang
, Peng Wang
, Jiamin Li
, Chun Jason Xue
, Cong Wang
:
ScaleFlux: Efficient Stateful Scaling in NFV. IEEE Trans. Parallel Distributed Syst. 33(12): 4801-4817 (2022) - [j78]Chengliang Tian
, Jia Yu
, Hanlin Zhang, Haiyang Xue, Cong Wang
, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [j77]Yu Guo
, Hongcheng Xie
, Yinbin Miao
, Cong Wang
, Xiaohua Jia
:
FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain. IEEE Trans. Serv. Comput. 15(4): 2060-2073 (2022) - [c89]Chengjun Cai
, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. CCS 2022: 441-454 - [c88]Yuefeng Du
, Anxin Zhou
, Cong Wang:
Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization. ICDCS 2022: 1133-1143 - [c87]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c86]Yi Liu
, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. INFOCOM 2022: 1749-1758 - [c85]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. NeurIPS 2022 - [c84]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. SERVICES 2022: 14 - [c83]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. USENIX Security Symposium 2022: 3593-3610 - [c82]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [e4]Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i32]Wanyu Lin, Baochun Li, Cong Wang:
Towards Private Learning on Decentralized Graphs with Local Differential Privacy. CoRR abs/2201.09398 (2022) - [i31]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022) - [i30]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. CoRR abs/2203.07320 (2022) - [i29]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. CoRR abs/2209.03526 (2022) - [i28]Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, Cong Wang:
SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases. CoRR abs/2209.07064 (2022) - [i27]Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. CoRR abs/2210.11334 (2022) - [i26]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IACR Cryptol. ePrint Arch. 2022: 894 (2022) - [i25]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. IACR Cryptol. ePrint Arch. 2022: 1115 (2022) - 2021
- [j76]Chen Zhang
, Yu Guo
, Xiaohua Jia
, Cong Wang
, Hongwei Du
:
Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain. IEEE Internet Things J. 8(8): 6624-6636 (2021) - [j75]Minghui Li
, Yuejing Yan, Qian Wang
, Minxin Du, Zhan Qin, Cong Wang:
Secure Prediction of Neural Network in the Cloud. IEEE Netw. 35(1): 251-257 (2021) - [j74]Xinyan Li, Yufei Chen
, Cong Wang, Chao Shen:
When Deep Learning Meets Differential Privacy: Privacy, Security, and More. IEEE Netw. 35(6): 148-155 (2021) - [j73]Peipei Jiang
, Qian Wang
, Muqi Huang, Cong Wang
, Qi Li
, Chao Shen
, Kui Ren
:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j72]Jiangang Shu
, Kan Yang
, Xiaohua Jia
, Ximeng Liu
, Cong Wang
, Robert H. Deng
:
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 18(1): 117-130 (2021) - [j71]Chengjun Cai
, Jian Weng
, Xingliang Yuan
, Cong Wang
:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE Trans. Dependable Secur. Comput. 18(1): 131-144 (2021) - [j70]Yifeng Zheng
, Huayi Duan
, Xiaoting Tang, Cong Wang
, Jiantao Zhou
:
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising. IEEE Trans. Dependable Secur. Comput. 18(3): 1261-1275 (2021) - [j69]Shengshan Hu
, Leo Yu Zhang
, Qian Wang
, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [j68]Helei Cui
, Yajin Zhou
, Cong Wang
, Xinyu Wang
, Yuefeng Du
, Qian Wang
:
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. IEEE Trans. Dependable Secur. Comput. 18(4): 1762-1778 (2021) - [j67]Chengjun Cai
, Yifeng Zheng
, Yuefeng Du
, Zhan Qin, Cong Wang
:
Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains. IEEE Trans. Dependable Secur. Comput. 18(4): 1893-1907 (2021) - [j66]Yufei Chen
, Chao Shen
, Cong Wang
, Qixue Xiao, Kang Li
, Yu Chen:
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications. IEEE Trans. Dependable Secur. Comput. 18(5): 2017-2028 (2021) - [j65]Shengshan Hu, Chengjun Cai
, Qian Wang
, Cong Wang
, Zhibo Wang
, Dengpan Ye
:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j64]Chengjun Cai
, Yifeng Zheng
, Anxin Zhou
, Cong Wang
:
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams. IEEE Trans. Dependable Secur. Comput. 18(6): 2601-2616 (2021) - [j63]Qiyang Song
, Zhuotao Liu
, Jiahao Cao
, Kun Sun
, Qi Li
, Cong Wang
:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [j62]Lei Xu
, Huayi Duan
, Anxin Zhou
, Xingliang Yuan
, Cong Wang
:
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 5310-5325 (2021) - [j61]Dian Chen, Haobo Yuan
, Shengshan Hu
, Qian Wang
, Cong Wang
:
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication. IEEE Trans. Parallel Distributed Syst. 32(4): 786-798 (2021) - [j60]Wanyu Lin
, Helei Cui
, Baochun Li
, Cong Wang
:
Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 32(5): 1072-1084 (2021) - [j59]Lingchen Zhao
, Qian Wang
, Cong Wang
, Qi Li
, Chao Shen
, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [j58]Helei Cui
, Xingliang Yuan
, Yifeng Zheng
, Cong Wang
:
Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection. IEEE Trans. Serv. Comput. 14(4): 998-1012 (2021) - [c81]Baolin Zheng, Peipei Jiang
, Qian Wang
, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c80]Mingyue Wang
, Yinbin Miao, Yu Guo, Cong Wang, Hejiao Huang, Xiaohua Jia:
Attribute-based Encrypted Search for Multi-owner and Multi-user Model. ICC 2021: 1-7 - [c79]Jie Xu
, Yingying Cheng
, Cong Wang, Xiaohua Jia:
Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain. ICDCS 2021: 618-628 - [c78]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c77]Jia-Si Weng, Jian Weng, Hongwei Huang, Chengjun Cai
, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. INFOCOM 2021: 1-10 - [c76]Yunjie Ge, Qian Wang
, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c75]Rui Lian
, Anxin Zhou
, Yifeng Zheng, Cong Wang:
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics. QSHINE 2021: 42-53 - [e3]Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i24]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021) - [i23]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i22]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i21]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. CoRR abs/2106.12478 (2021) - [i20]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - [i19]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
Optimizing Secure Decision Tree Inference Outsourcing. CoRR abs/2111.00397 (2021) - [i18]Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 1593 (2021) - 2020
- [j57]Xingliang Yuan
, Chengjun Cai
, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - [j56]Yu Guo
, Mingyue Wang
, Cong Wang
, Xingliang Yuan
, Xiaohua Jia
:
Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes. IEEE Internet Things J. 7(6): 5359-5370 (2020) - [j55]Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu:
Toward Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Netw. 34(1): 108-115 (2020) - [j54]Kui Ren
, Qian Wang
, Cong Wang
, Zhan Qin, Xiaodong Lin
:
The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proc. IEEE 108(2): 357-372 (2020) - [j53]Yifeng Zheng
, Huayi Duan
, Xingliang Yuan
, Cong Wang
:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. IEEE Trans. Dependable Secur. Comput. 17(1): 121-133 (2020) - [j52]Yue Zhang
, Jia Yu
, Rong Hao
, Cong Wang
, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. IEEE Trans. Dependable Secur. Comput. 17(3): 608-619 (2020) - [j51]Leo Yu Zhang
, Yifeng Zheng
, Jian Weng
, Cong Wang
, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 17(6): 1218-1231 (2020) - [j50]Pu Zhao
, Jia Yu
, Hanlin Zhang, Zhan Qin, Cong Wang
:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. IEEE Trans. Inf. Forensics Secur. 15: 315-328 (2020) - [j49]Xu Yuan
, Xingliang Yuan
, Yihe Zhang, Baochun Li
, Cong Wang
:
Enabling Encrypted Boolean Queries in Geographically Distributed Databases. IEEE Trans. Parallel Distributed Syst. 31(3): 634-646 (2020) - [j48]Jinghua Jiang, Yifeng Zheng
, Zhenkui Shi, Xingliang Yuan
, Xiaolin Gui
, Cong Wang
:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. IEEE Trans. Serv. Comput. 13(3): 410-424 (2020) - [c74]Jing Yao, Yifeng Zheng, Yu Guo, Cong Wang:
SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search. SBC@AsiaCCS 2020: 14-20 - [c73]Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao, Feifei Li:
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services. ICDCS 2020: 23-33 - [c72]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang, Man Ho Au, Qian Wang
:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. ICDCS 2020: 201-211 - [c71]Yuechen Tao, Bo Li, Jingjie Jiang, Hok Chu Ng, Cong Wang, Baochun Li:
On Sharding Open Blockchains with Smart Contracts. ICDE 2020: 1357-1368 - [c70]Jing Yao, Yifeng Zheng, Cong Wang, Surya Nepal
:
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness. ICETE (2) 2020: 295-301 - [c69]Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu:
Enabling Execution Assurance of Federated Learning at Untrusted Participants. INFOCOM 2020: 1877-1886 - [c68]Chengjun Cai
, Lei Xu
, Anxin Zhou
, Ruochen Wang, Cong Wang, Qian Wang
:
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. INFOCOM 2020: 1887-1896 - [e2]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i17]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database with Padding Countermeasures. CoRR abs/2003.06103 (2020) - [i16]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020) - [i15]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i14]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. CoRR abs/2010.12400 (2020) - [i13]Jia-Si Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. CoRR abs/2011.06458 (2020) - [i12]