Oruta: Privacy-preserving public auditing for shared data in the cloud B Wang, B Li, H Li Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 295-302, 2012 | 757 | 2012 |
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud B Wang, B Li, H Li IEEE Transactions on Services Computing, 1-1, 2014 | 630 | 2014 |
Public Auditing for Shared Data with Efficient User Revocation in the Cloud B Wang, B Li, H Li IEEE INFOCOM, 2904-2912, 2013 | 630* | 2013 |
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud X Liu, Y Zhang, B Wang, J Yan IEEE Transactions on Parallel and Distributed Systems (TPDS) 6 (24), 1182-1191, 2013 | 485 | 2013 |
Knox: privacy-preserving auditing for shared data with large groups in the cloud B Wang, B Li, H Li International Conference on Applied Cryptography and Network Security, 507-525, 2012 | 284 | 2012 |
Storing shared data on the cloud via security-mediator B Wang, SSM Chow, M Li, H Li 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 242 | 2013 |
Certificateless Public Auditing for Data Integrity in the Cloud B Wang, B Li, H Li IEEE CNS, 276--284, 2013 | 154 | 2013 |
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index B Wang, Y Hou, M Li, H Wang, H Li Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 136 | 2014 |
Geometric Range Search on Encrypted Spatial Data B Wang, M Li, H Wang IEEE Transactions on Information Forensics and Security, 2016 | 125 | 2016 |
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics B Wang, H Li, M Li IEEE ICC, 539--543, 2013 | 121 | 2013 |
Computing encrypted cloud data efficiently under multiple keys B Wang, M Li, SSM Chow, H Li 2013 IEEE Conference on Communications and Network Security (CNS), 504-513, 2013 | 105 | 2013 |
Circular Range Search on Encrypted Spatial Data B Wang, M Li, H Wang, H Li IEEE Conference on Communications and Network Security (CNS), 2015, 2015 | 82 | 2015 |
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data B Wang, Y Hou, M Li IEEE International Conference on Computer Communications, 2016 | 76 | 2016 |
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun 2019 IEEE Conference on Communications and Network Security (CNS), 232-240, 2019 | 71 | 2019 |
A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys B Wang, M Li, S Chow, H Li 2nd IEEE Conference on Communications and Network Security, 2014 | 64 | 2014 |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data B Wang, M Li, L Xiong IEEE Transactions on Dependable and Secure Computing, 2017 | 63 | 2017 |
Comments on a public auditing mechanism for shared cloud data service Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li IEEE Transactions on Services Computing 8 (6), 998-999, 2015 | 60 | 2015 |
On the security of a public auditing mechanism for shared cloud data service Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li IEEE Transactions on Services Computing 8 (6), 998-999, 2014 | 60* | 2014 |
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang arXiv preprint arXiv:2005.09800, 2020 | 53 | 2020 |
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks BEN NIU, Y Chen, Z Wang, B Wang, H Li IEEE Transactions on Mobile Computing, 2020 | 52 | 2020 |