Seguir
Wenhai Sun
Título
Citado por
Citado por
Año
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
The 8th ACM SIGSAC Symposium on Information, Computer and Communications …, 2013
4742013
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 25 (11), 3025-3035, 2014
2972014
Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud
W Sun, S Yu, W Lou, T Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187 - 1198, 2014
2732014
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
W Sun, S Yu, W Lou, YT Hou, H Li
2014 IEEE Conference on Computer Communications (IEEE INFOCOM'14), 226-234, 2014
2602014
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
W Sun, X Liu, W Lou, YT Hou, H Li
2015 IEEE Conference on Computer Communications (IEEE INFOCOM'15), 2110 - 2118, 2015
1502015
Secure and privacy-preserving data storage service in public cloud
H Li, WH Sun, F Li, B Wang
Journal of Computer Research and Development 51 (7), 1397-1409, 2014
592014
One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage
X Liu, W Sun, W Lou, Q Pei, Y Zhang
2017 IEEE International Conference on Computer Communications (IEEE INFOCOM'17), 2017
462017
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun
IEEE Conference on Communications and Network Security (IEEE CNS 2019), 2019
412019
Privacy-preserving keyword search over encrypted data in cloud computing
W Sun, W Lou, YT Hou, H Li
Secure cloud computing, 189-212, 2014
412014
Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
Y Chen, W Sun, Q Zheng, W Lou, YT Hou
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 2018
402018
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
ACM WiSec 2020, 2020
362020
REARGUARD: Secure keyword search using trusted hardware
W Sun, R Zhang, W Lou, YT Hou
2018 IEEE Conference on Computer Communications (IEEE INFOCOM'18), 2018
332018
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W Sun, N Zhang, W Lou, YT Hou
2017 IEEE Conference on Computer Communications (IEEE INFOCOM'17), 2017
242017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li
IEEE Transactions on Services Computing 10 (5), 826 - 838, 2016
192016
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack
H Yan, X Li, H Li, J Li, W Sun, F Li
IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021
182021
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
W Sun, N Zhang, W Lou, YT Hou
IEEE Conference on Communications and Network Security (IEEE CNS 2018), 2018
142018
Towards Overcoming the Undercutting Problem
T Gong, M Minaei, W Sun, A Kate
Financial Cryptography and Data Security 2022 (FC'22), 2020
9*2020
A Secure Remote Monitoring Framework Supporting Efficient Fine-grained Access Control and Data Processing in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
14th International Conference on Security and Privacy in Communication …, 2018
92018
ROSTER: Radio Context Attestation in Cognitive Radio Network
N Zhang, W Sun, W Lou, YT Hou, W Trappe
IEEE Conference on Communications and Network Security (IEEE CNS 2018), 2018
72018
Speedster: An Efficient Multi-party State Channel via Enclaves
J Liao, F Zhang, W Sun, W Shi
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
22022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20