Follow
Yongzhi Wang
Title
Cited by
Cited by
Year
Secure -NN Query on Encrypted Cloud Data with Multiple Keys
K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong
IEEE Transactions on Big Data 7 (4), 689-702, 2017
822017
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
812017
Viaf: Verification-based integrity assurance framework for mapreduce
Y Wang, J Wei
2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011
762011
Special issue on security and privacy in network computing
H Wang, Y Wang, T Taleb, X Jiang
World Wide Web 23, 951-957, 2020
742020
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
562016
Result integrity check for MapReduce computation on hybrid clouds
Y Wang, J Wei, M Srivatsa
2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013
302013
IntegrityMR: Integrity assurance framework for big data analytics and management applications
Y Wang, J Wei, M Srivatsa, Y Duan, W Du
2013 IEEE International Conference on Big Data, 33-40, 2013
292013
CryptSQLite: SQLite with high data security
Y Wang, Y Shen, C Su, J Ma, L Liu, X Dong
IEEE Transactions on Computers 69 (5), 666-678, 2019
252019
Strongly secure and efficient range queries in cloud databases under multiple keys
K Cheng, Y Shen, Y Wang, L Wang, J Ma, X Jiang, C Su
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2494-2502, 2019
222019
Toward protecting control flow confidentiality in cloud-based computation
Y Wang, J Wei
Computers & Security 52, 106-127, 2015
162015
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
152018
A lightweight auction framework for spectrum allocation with strong security guarantees
K Cheng, L Wang, Y Shen, Y Liu, Y Wang, L Zheng
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1708-1717, 2020
142020
Cfhider: Control flow obfuscation with intel sgx
Y Wang, Y Shen, C Su, K Cheng, Y Yang, AN Faree, Y Liu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 541-549, 2019
132019
CryptSQLite: Protecting data confidentiality of SQLite with intel SGX
Y Wang, L Liu, C Su, J Ma, L Wang, Y Yang, Y Shen, G Li, T Zhang, ...
2017 International Conference on Networking and Network Applications (NaNA …, 2017
112017
Toward integrity assurance of outsourced computing—a game theoretic perspective
Y Wang, J Wei, S Ren, Y Shen
Future Generation Computer Systems 55, 87-100, 2016
112016
Exploiting Content Delivery Networks for covert channel communications
Y Wang, Y Shen, X Jiao, T Zhang, X Si, A Salem, J Liu
Computer Communications 99, 84-92, 2017
92017
Cross cloud MapReduce: A result integrity check framework on hybrid clouds
Y Wang, J Wei, M Srivatsa
Int. J. Cloud Comput 1 (1), 26-39, 2013
92013
Exploring cloud service brokering from an interface perspective
Y Duan, NC Narendra, W Du, Y Wang, N Zhou
2014 IEEE international conference on web services, 329-336, 2014
82014
Practical verifiable computation–A MapReduce case study
Y Wang, Y Shen, X Jiang
IEEE Transactions on Information Forensics and Security 13 (6), 1376-1391, 2017
72017
Securing MapReduce result integrity via verification-based integrity assurance framework
Y Wang, J Wei, Y Duan
Int. J. Grid Distrib. Comput 7 (6), 53-70, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20