Secure -NN Query on Encrypted Cloud Data with Multiple Keys K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong IEEE Transactions on Big Data 7 (4), 689-702, 2017 | 82 | 2017 |
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation Y Shen, T Zhang, Y Wang, H Wang, X Jiang IEEE Communications Magazine 55 (9), 86-93, 2017 | 81 | 2017 |
Viaf: Verification-based integrity assurance framework for mapreduce Y Wang, J Wei 2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011 | 76 | 2011 |
Special issue on security and privacy in network computing H Wang, Y Wang, T Taleb, X Jiang World Wide Web 23, 951-957, 2020 | 74 | 2020 |
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications Y Wang, Y Shen, H Wang, J Cao, X Jiang IEEE Transactions on Big Data 4 (3), 418-431, 2016 | 56 | 2016 |
Result integrity check for MapReduce computation on hybrid clouds Y Wang, J Wei, M Srivatsa 2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013 | 30 | 2013 |
IntegrityMR: Integrity assurance framework for big data analytics and management applications Y Wang, J Wei, M Srivatsa, Y Duan, W Du 2013 IEEE International Conference on Big Data, 33-40, 2013 | 29 | 2013 |
CryptSQLite: SQLite with high data security Y Wang, Y Shen, C Su, J Ma, L Liu, X Dong IEEE Transactions on Computers 69 (5), 666-678, 2019 | 25 | 2019 |
Strongly secure and efficient range queries in cloud databases under multiple keys K Cheng, Y Shen, Y Wang, L Wang, J Ma, X Jiang, C Su IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2494-2502, 2019 | 22 | 2019 |
Toward protecting control flow confidentiality in cloud-based computation Y Wang, J Wei Computers & Security 52, 106-127, 2015 | 16 | 2015 |
Trustworthy service composition with secure data transmission in sensor networks T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong World Wide Web 21, 185-200, 2018 | 15 | 2018 |
A lightweight auction framework for spectrum allocation with strong security guarantees K Cheng, L Wang, Y Shen, Y Liu, Y Wang, L Zheng IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1708-1717, 2020 | 14 | 2020 |
Cfhider: Control flow obfuscation with intel sgx Y Wang, Y Shen, C Su, K Cheng, Y Yang, AN Faree, Y Liu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 541-549, 2019 | 13 | 2019 |
CryptSQLite: Protecting data confidentiality of SQLite with intel SGX Y Wang, L Liu, C Su, J Ma, L Wang, Y Yang, Y Shen, G Li, T Zhang, ... 2017 International Conference on Networking and Network Applications (NaNA …, 2017 | 11 | 2017 |
Toward integrity assurance of outsourced computing—a game theoretic perspective Y Wang, J Wei, S Ren, Y Shen Future Generation Computer Systems 55, 87-100, 2016 | 11 | 2016 |
Exploiting Content Delivery Networks for covert channel communications Y Wang, Y Shen, X Jiao, T Zhang, X Si, A Salem, J Liu Computer Communications 99, 84-92, 2017 | 9 | 2017 |
Cross cloud MapReduce: A result integrity check framework on hybrid clouds Y Wang, J Wei, M Srivatsa Int. J. Cloud Comput 1 (1), 26-39, 2013 | 9 | 2013 |
Exploring cloud service brokering from an interface perspective Y Duan, NC Narendra, W Du, Y Wang, N Zhou 2014 IEEE international conference on web services, 329-336, 2014 | 8 | 2014 |
Practical verifiable computation–A MapReduce case study Y Wang, Y Shen, X Jiang IEEE Transactions on Information Forensics and Security 13 (6), 1376-1391, 2017 | 7 | 2017 |
Securing MapReduce result integrity via verification-based integrity assurance framework Y Wang, J Wei, Y Duan Int. J. Grid Distrib. Comput 7 (6), 53-70, 2014 | 6 | 2014 |