Search filters

List of works by Cong Wang

${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones

A Survey of Blockchain Consensus Protocols

scientific article published in 2023

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing

article

AESM<sup>2</sup> Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems

scientific article published in 2023

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

scholarly article published March 2010

Achieving usable and privacy-assured similarity search over outsourced cloud data

AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication

scientific article published in 2023

Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts

scientific article published on 26 October 2024

Attribute based data sharing with attribute revocation

BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication

scientific article published in 2021

Efficient fine-grained data access control in wireless sensor networks

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Enabling Encrypted Boolean Queries in Geographically Distributed Databases

scientific article published in 2020

Enabling Encrypted Rich Queries in Distributed Key-Value Stores

scientific article published in 2019

Enabling IP Protection for Outsourced Integrated Circuit Design

Enabling Privacy-Preserving Image-Centric Social Discovery

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

scholarly article by Qian Wang et al published May 2011 in IEEE Transactions on Parallel and Distributed Systems

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing

scholarly article by Qian Wang et al published 2009 in Lecture Notes in Computer Science

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness

scientific article published in 2021

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern

scientific article published in 2018

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing

article

Enhancing Attribute-Based Encryption with Attribute Hierarchy

Enhancing attribute-based encryption with attribute hierarchy

Ensuring data storage security in Cloud Computing

scholarly article published July 2009

FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain

scientific article published in 2022

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

scholarly article published March 2010

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations

Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption

scientific article published in 2021

Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption

scientific article published on 21 November 2023

Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing

scientific article published in 2018

Lyra: Elastic Scheduling for Deep Learning Clusters

scientific article published on 05 May 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples

scientific article published on 26 April 2023

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus

scientific article published in 2022

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication

article by Bingsheng Zhang et al published 2013 in Lecture Notes in Computer Science

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud

Privacy-Preserving Image Denoising From External Cloud Databases

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

scholarly article published March 2010

Privacy-Preserving Public Auditing for Secure Cloud Storage

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing

scholarly article published June 2011

Privacy-Preserving Similarity Joins Over Encrypted Data

scientific article published in 2017

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Privacy-preserving outsourcing of image global feature detection

Proof-Carrying Cloud Computation: The Case of Convex Optimization

Proof-carrying cloud computation: The case of convex optimization

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing

scientific article published in 2021

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption

scientific article published in 2021

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

scholarly article by Bingsheng Zhang et al published 1 February 2016 in IEEE Transactions on Mobile Computing

SBVLC: Secure barcode-based visible light communication for smartphones

SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases

scientific article published in 2022

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

scholarly article by Cong Wang et al published 1 January 2016 in IEEE Transactions on Computers

Secure Ranked Keyword Search over Encrypted Cloud Data

Secure and practical outsourcing of linear programming in cloud computing

scholarly article published April 2011

Security Challenges for the Public Cloud

Toward Secure and Dependable Storage Services in Cloud Computing

scholarly article by Cong Wang et al published April 2012 in IEEE transactions on services computing

Toward Secure and Scalable Computation in Internet of Things Data Applications

scientific article published in 2019

Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains

scientific article published in 2022

Toward publicly auditable secure cloud data storage services

Toward secure and effective data utilization in public cloud

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing

scholarly article published 2014

Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection

scientific article published in 2021

Towards Secure and Effective Utilization over Encrypted Cloud Data

WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave

scientific article published in 2022

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center

scientific article published in 2020