


default search action
Wei Jiang 0026
Person information
- affiliation: Oracle Labs, Belmont, CA, USA
- affiliation: University of Missouri, Department of Electrical Engineering and Computer Science, Columbia, MO, USA
- affiliation: Missouri University of Science and Technology, Department of Computer Science, Rolla, MO, USA
- affiliation (PhD 2008): Purdue University, West Lafayette, IN, USA
Other persons with the same name
- Wei Jiang — disambiguation page
- Wei Jiang 0001
— Eastman Kodak Company, Rochester, NY, USA (and 1 more)
- Wei Jiang 0002
— German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany (and 2 more)
- Wei Jiang 0003
— Peking University, School of Electronics Engineering and Computer Scinece, Beijing, China
- Wei Jiang 0004
— Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China
- Wei Jiang 0005
— Huazhong University of Science and Technology, School of Environmental Science and Engineering, Wuhan, China
- Wei Jiang 0006
— National University of Defense Technology, College of Mechatronics Engineering and Automation, Changsha, China
- Wei Jiang 0007
— Liaoning Normal University, School of Mathematics, Dalian, China (and 1 more)
- Wei Jiang 0008
— Wuhan University, School of Mathematics and Statistics, China (and 1 more)
- Wei Jiang 0009
— Zhejiang University, Institute of Cyber-Systems and Control, Hangzhou, China (and 1 more)
- Wei Jiang 0010
— Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Wei Jiang 0011
— Southeast University, School of Electrical Engineering, Nanjing, China
- Wei Jiang 0012
— Harbin Institute of Technology at Weihai, Department of Mathematics, China
- Wei Jiang 0013
— Anhui University, School of Mathematical Sciences, Hefei, China
- Wei Jiang 0014
— Aalto University, Finland (and 1 more)
- Wei Jiang 0015 — University of Waterloo, Ontario, Canada
- Wei Jiang 0016
— University of Electronic Science and Technology of China, School of Information and Software, Chengdu, China
- Wei Jiang 0017
— University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA
- Wei Jiang 0018
— Beijing Jiaotong University, School of Electronic and Information Engineering, State Key Laboratory of Rail Traffic Control and Safety / Beijing Engineering Research Center of EMC and GNSS Technology for Rail Transportation, China (and 1 more)
- Wei Jiang 0019
— Yale University, New Haven, CT, USA (and 1 more)
- Wei Jiang 0020
— University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Wei Jiang 0021
— University of Florida, School of Forest Resources and Conservation, Gainesville, FL, USA
- Wei Jiang 0022
— Changzhou University, School of Information Science and Engineering, China
- Wei Jiang 0023
— Nanjing University of Aeronautics and Astronautics, Department of Biomedical Engineering, China (and 1 more)
- Wei Jiang 0024
— University of Illinois Urbana-Champaign (UIUC), Urbana, IL, USA
- Wei Jiang 0025
— Yangzhou University, Department of Electrical Engineering, Chine (and 2 more)
- Wei Jiang 0027
— Alibaba Group, Hangzhou, China (and 1 more)
- Wei Jiang 0028 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- Wei Jiang 0029 — Nanjing University, National Key Laboratory for Novel Software Technology, Nanjing, China
- Wei Jiang 0030 — Chinese Academy of Sciences, Institute of Automation, National Laboratory of Pattern Recognition, Beijing, China
- Wei Jiang 0031
— Peking University, Shenzhen Graduate School, School of Electronic and Computer Engineering, Guangdong Provincial Key Laboratory of Ultra High Definition Immersive Media Technology, Shenzhen, China
- Wei Jiang 0032
— Huazhong University of Science and Technology, School of Mechanical Science and Engineering, State Key Laboratory of Digital Manufacturing Equipment and Technology, Wuhan, China
- Wei Jiang 0033
— Wuhan Textile University, School of Mechanical Engineering and Automation, Hubei Key Laboratory of Digital Textile Equipment, Wuhan, China (and 1 more)
- Wei Jiang 0034 — University of British Columbia, Computer Vision Lab, Vancouver, Canada (and 1 more)
- Wei Jiang 0035 — University of California, Department of Computer Science, Los Angeles, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Ali A. Allami
, Tyler Nicewarner
, Ken Goss, Ashish Kundu, Wei Jiang, Dan Lin
:
Oblivious and distributed firewall policies for securing firewalls from malicious attacks. Comput. Secur. 150: 104201 (2025) - [j24]Alian Yu
, Jian Kang
, Wei Jiang
, Dan Lin
:
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments. IEEE Trans. Dependable Secur. Comput. 22(1): 234-245 (2025) - 2024
- [i8]Tyler Nicewarner, Wei Jiang, Aniruddha Gokhale, Dan Lin:
Provable Privacy Guarantee for Individual Identities and Locations in Large-Scale Contact Tracing. CoRR abs/2409.12341 (2024) - 2023
- [c37]Alian Yu
, Jian Kang, Wei Jiang, Dan Lin:
FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services. PerCom Workshops 2023: 386-391 - [c36]Chaoquan Cai
, Wei Jiang
, Dan Lin
:
Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning. SSTD 2023: 110-120 - [c35]Tyler Nicewarner
, Alian Yu
, Wei Jiang, Dan Lin:
Preserving Location Privacy in the Modern Era of Pervasive Environments. TPS-ISA 2023: 44-51 - 2022
- [c34]Adam Bowers, Jize Du, Dan Lin, Wei Jiang:
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security. AsiaCCS 2022: 831-842 - [c33]Jian Kang, Alian Yu
, Wei Jiang, Dan Lin:
NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management. ICDCS 2022: 1190-1200 - 2021
- [j23]Ravi Santosh Arvapally, Xiaoqing Frank Liu
, Fiona Fui-Hoon Nah
, Wei Jiang:
Identifying outlier opinions in an online intelligent argumentation system. Concurr. Comput. Pract. Exp. 33(8) (2021) - [j22]Nitish M. Uplavikar
, Bradley A. Malin
, Wei Jiang
:
Lucene-P$^2$2: A Distributed Platform for Privacy-Preserving Text-Based Search. IEEE Trans. Dependable Secur. Comput. 18(6): 2801-2819 (2021) - 2020
- [c32]Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin, Wei Jiang:
Privacy-Preserving Friend Recommendation in an Integrated Social Environment. ICISS 2020: 117-136
2010 – 2019
- 2019
- [i7]Wei Jiang, Adam Bowers, Dan Lin:
Hiding in the Clouds and Building a Stealth Communication Network. CoRR abs/1901.10097 (2019) - [i6]Wei Jiang, Adam Bowers, Dan Lin:
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication. IACR Cryptol. ePrint Arch. 2019: 790 (2019) - 2018
- [j21]Dan Lin, Nicholas Hilbert, Christian Storer, Wei Jiang, Jianping Fan:
UFace: Your universal password that no one can see. Comput. Secur. 77: 627-641 (2018) - [j20]Hu Chun, Kui Ren, Wei Jiang:
Privacy-preserving power usage and supply control in smart grid. Comput. Secur. 77: 709-719 (2018) - [j19]Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino:
Highly efficient randomized authentication in VANETs. Pervasive Mob. Comput. 44: 31-44 (2018) - [c31]Ali Ataeemh Allami
, Mukesh K. Mohania, Wei Jiang:
Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment. CNS 2018: 1-9 - [c30]Ying Zhang
, Lingxiang Wang, Wei Jiang, Zhishan Guo
:
Work-in-Progress: RWS - A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage. RTAS 2018: 93-96 - 2017
- [j18]Jingwei Li
, Adam Bowers, Dan Lin, Peng Jiang, Wei Jiang:
PAS: policy-based assistance in sensor networks. Computing 99(10): 915-928 (2017) - [c29]Wei Jiang, Feng Li, Dan Lin, Elisa Bertino:
No one can track you: Randomized authentication in Vehicular Ad-hoc Networks. PerCom 2017: 197-206 - [c28]Douglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang:
Poster: A Location-Privacy Approach for Continuous Queries. SACMAT 2017: 115-117 - [i5]Nicholas Hilbert, Christian S. Jensen, Dan Lin, Wei Jiang:
UFace: Your Universal Password That No One Can See. IACR Cryptol. ePrint Arch. 2017: 169 (2017) - 2016
- [j17]Bharath K. Samanthula, Wei Jiang:
Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient. IEEE Trans. Dependable Secur. Comput. 13(5): 591-604 (2016) - 2015
- [j16]Bharath K. Samanthula, Wei Jiang:
Interest-driven private friend recommendation. Knowl. Inf. Syst. 42(3): 663-687 (2015) - [j15]Bharath K. Samanthula, Lei Cen, Wei Jiang, Luo Si:
Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks. Trans. Data Priv. 8(2): 141-171 (2015) - [j14]Bharath K. Samanthula, Yousef Elmehdwi, Wei Jiang:
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data. IEEE Trans. Knowl. Data Eng. 27(5): 1261-1273 (2015) - [c27]Hu Chun, Kui Ren
, Wei Jiang:
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid. DBSec 2015: 119-134 - 2014
- [j13]Yousef Elmehdwi, Wei Jiang, Ali R. Hurson
:
Similarity of Private Keyword Search over Encrypted Document Collection. Adv. Comput. 94: 71-102 (2014) - [j12]Bharath K. Samanthula, Chun Hu, Wei Jiang, Bruce M. McMillin
:
Secure and threshold-based power usage control in smart grid environments. Int. J. Parallel Emergent Distributed Syst. 29(3): 264-289 (2014) - [j11]Sashi Gurung, Dan Lin, Wei Jiang, Ali R. Hurson
, Rui Zhang
:
Traffic Information Publication with Privacy Preservation. ACM Trans. Intell. Syst. Technol. 5(3): 44:1-44:26 (2014) - [c26]Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang:
Outsourceable two-party privacy-preserving biometric authentication. AsiaCCS 2014: 401-412 - [c25]Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino:
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data. ESORICS (1) 2014: 400-418 - [c24]Yousef Elmehdwi, Bharath K. Samanthula, Wei Jiang:
Secure k-nearest neighbor query over encrypted data in outsourced environments. ICDE 2014: 664-675 - [i4]Bharath K. Samanthula, Wei Jiang, Elisa Bertino:
Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases. CoRR abs/1401.3768 (2014) - [i3]Bharath K. Samanthula, Yousef Elmehdwi, Wei Jiang:
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data. CoRR abs/1403.5001 (2014) - [i2]Wei Jiang, Dan Lin, Feng Li, Elisa Bertino:
Randomized and Efficient Authentication in Mobile Environments. IACR Cryptol. ePrint Arch. 2014: 86 (2014) - 2013
- [j10]Murat Kantarcioglu, Wei Jiang:
Incentive Compatible Privacy-Preserving Data Analysis. IEEE Trans. Knowl. Data Eng. 25(6): 1323-1335 (2013) - [c23]Bharath K. Samanthula, Wei Jiang:
Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing. IEEE CLOUD 2013: 51-58 - [c22]Bharath K. Samanthula, Hu Chun, Wei Jiang:
An efficient and probabilistic secure bit-decomposition. AsiaCCS 2013: 541-546 - [c21]Feng Li, Nian Liu, Wei Jiang, Xiao-Qing Liu:
Argument placement recommendation and relevancy assessment in an intelligent argumentation system. CTS 2013: 427-434 - [c20]Bharath K. Samanthula, Wei Jiang, Sanjay Madria:
A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks. MDM (1) 2013: 77-86 - [i1]Yousef Elmehdwi, Bharath K. Samanthula, Wei Jiang:
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments. CoRR abs/1307.4824 (2013) - 2012
- [j9]Balamurugan Anandan, Chris Clifton, Wei Jiang, Mummoorthy Murugesan, Pedro Pastrana-Camacho, Luo Si:
t-Plausibility: Generalizing Words to Desensitize Text. Trans. Data Priv. 5(3): 505-534 (2012) - [c19]Bharath K. Samanthula, Wei Jiang:
Structural and Message Based Private Friend Recommendation. ASONAM 2012: 684-690 - [c18]Ravi Santosh Arvapally, Xiaoqing (Frank) Liu, Wei Jiang:
Identification of faction groups and leaders in Web-based intelligent argumentation system for collaborative decision support. CTS 2012: 509-516 - [c17]Chun Hu, Wei Jiang, Bruce M. McMillin
:
Privacy-Preserving Power Usage Control in the Smart Grid. Critical Infrastructure Protection 2012: 127-137 - 2011
- [j8]Alberto Trombetta
, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privacy-Preserving Updates to Anonymous and Confidential Databases. IEEE Trans. Dependable Secur. Comput. 8(4): 578-587 (2011) - [c16]Mummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz:
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations. CODASPY 2011: 169-178 - [c15]Wei Jiang, Bharath K. Samanthula:
N-Gram Based Secure Similar Document Detection. DBSec 2011: 239-246 - [c14]Wei Jiang, Bharath K. Samanthula:
A Secure and Distributed Framework to Identify and Share Needed Information. SocialCom/PASSAT 2011: 1224-1230 - 2010
- [j7]Mummoorthy Murugesan, Wei Jiang, Chris Clifton, Luo Si, Jaideep Vaidya:
Efficient privacy-preserving similar document detection. VLDB J. 19(4): 457-475 (2010) - [c13]Dan Lin, Sashi Gurung, Wei Jiang, Ali R. Hurson
:
Privacy-Preserving Location Publishing under Road-Network Constraints. DASFAA (2) 2010: 17-31
2000 – 2009
- 2009
- [j6]Murat Kantarcioglu, Ali Inan
, Wei Jiang, Bradley A. Malin
:
Formal anonymity models for efficient privacy-preserving joins. Data Knowl. Eng. 68(11): 1206-1223 (2009) - [c12]Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si:
t-Plausibility: Semantic Preserving Text Sanitization. CSE (3) 2009: 68-75 - [e1]Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradley A. Malin:
Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5456, Springer 2009, ISBN 978-3-642-01717-9 [contents] - 2008
- [b1]Wei Jiang:
Incentive-driven and privacy-preserving collaborative computing. Purdue University, USA, 2008 - [j5]Wei Jiang, Chris Clifton, Murat Kantarcioglu:
Transforming semi-honest protocols to ensure accountability. Data Knowl. Eng. 65(1): 57-74 (2008) - [j4]Chris Clifton, Ananth V. Iyer, Richard Cho, Wei Jiang, Murat Kantarcioglu, Jaideep Vaidya:
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems. Manuf. Serv. Oper. Manag. 10(1): 108-125 (2008) - [j3]Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradley A. Malin:
PinKDD'08: privacy, security, and trust in KDD post workshop report. SIGKDD Explor. 10(2): 66-67 (2008) - [j2]Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley A. Malin
:
A Cryptographic Approach to Securely Share and Query Genomic Sequences. IEEE Trans. Inf. Technol. Biomed. 12(5): 606-617 (2008) - [c11]Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si:
Similar Document Detection with Limited Information Disclosure. ICDE 2008: 735-743 - [c10]Alberto Trombetta
, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privately Updating Suppression and Generalization based k-Anonymous Databases. ICDE 2008: 1370-1372 - [c9]Murat Kantarcioglu, Wei Jiang, Bradley A. Malin
:
A Privacy-Preserving Framework for Integrating Person-Specific Databases. Privacy in Statistical Databases 2008: 298-314 - [p2]Chris Clifton, Wei Jiang, Mummoorthy Murugesan, Mehmet Ercan Nergiz:
Is Privacy Still an Issue for Data Mining? Next Generation of Data Mining 2008 - [p1]Elisa Bertino, Dan Lin, Wei Jiang:
A Survey of Quantification of Privacy Preserving Data Mining Algorithms. Privacy-Preserving Data Mining 2008: 183-205 - 2007
- [c8]Mingwu Zhang, Wei Jiang, Chris Clifton, Sunil Prabhakar
:
Identifying Rare Classes with Sparse Training Data. DEXA 2007: 751-760 - [c7]Mummoorthy Murugesan, Wei Jiang:
Secure Content Validation. ICDE Workshops 2007: 157-162 - [c6]Wei Jiang, Chris Clifton:
AC-Framework for Privacy-Preserving Collaboration. SDM 2007: 47-56 - [c5]Wei Jiang, Luo Si, Jing Li:
Protecting source privacy in federated search. SIGIR 2007: 761-762 - 2006
- [j1]Wei Jiang, Chris Clifton:
A secure distributed framework for achieving k-anonymity. VLDB J. 15(4): 316-333 (2006) - [c4]Wei Jiang, Maurizio Atzori:
Secure Distributed k-Anonymous Pattern Mining. ICDM 2006: 319-329 - [c3]Wei Jiang, Chris Clifton:
Transforming Semi-Honest Protocols to Ensure Accountability. ICDM Workshops 2006: 524-529 - 2005
- [c2]Wei Jiang, Chris Clifton:
Privacy-Preserving Distributed k-Anonymity. DBSec 2005: 166-177 - [c1]Wei Jiang, Jaideep Vaidya, Zahir Balaporia, Chris Clifton, Brett Banich:
Knowledge Discovery from Transportation Network Data. ICDE 2005: 1061-1072
Coauthor Index
aka: Bharath Kumar Samanthula

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-24 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint