关注
Wenhai Sun
标题
引用次数
年份
A Practical Privacy-preserving Face Authentication Scheme with Revocability and Reusability
J Lei, Q Pei, X Liu, W Sun
18th International Conference on Algorithms and Architectures for Parallel …, 2018
62018
A Secure Remote Monitoring Framework Supporting Efficient Fine-grained Access Control and Data Processing in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
14th International Conference on Security and Privacy in Communication …, 2018
102018
A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers
X Yuan, X Tong, Q Fang, W Sun, W Lou
2018 IEEE 20th International Conference on High Performance Computing and …, 2018
2018
Advtraffic: Obfuscating encrypted traffic with adversarial examples
H Liu, J Dani, H Yu, W Sun, B Wang
2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS), 1-10, 2022
22022
Basic Proof-of-Stake consensus mechanisms
Y Xiao, W Sun
Proof-of-Stake for Blockchain Networks: Fundamentals, Challenges and …, 2024
2024
BFTRAND: Low-latency Random Number Provider for BFT Smart Contracts
J Liao, B Gong, W Sun, F Zhang, Z Ning, MH Au, W Shi
The 54th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2024
2024
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
W Sun, X Liu, W Lou, YT Hou, H Li
2015 IEEE Conference on Computer Communications (IEEE INFOCOM'15), 2110 - 2118, 2015
1782015
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns
SMM Islam, Y Zheng, Y Pan, M Millan, W Chang, M Li, O Borić-Lubecke, ...
IEEE Internet of Things Journal 10 (16), 14197-14211, 2023
22023
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data
Y Chen, Q Zheng, D Liu, Z Yan, W Sun, N Zhang, W Lou, YT Hou
arXiv preprint arXiv:1912.08454, 2019
2019
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation
X Li, N Li, W Sun, NZ Gong, H Li
USENIX Security Symposium, 2023
152023
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
ACM WiSec 2020, 2020
532020
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun
IEEE Conference on Communications and Network Security (IEEE CNS 2019), 2019
712019
Insider-resistant context-based pairing for multimodality sleep apnea test
Y Zheng, SMM Islam, Y Pan, M Millan, S Aggelopoulos, B Lu, A Yang, ...
2021 IEEE Global Communications Conference (GLOBECOM), 1-6, 2021
12021
Mitigating query-flooding parameter duplication attack on regression models with high-dimensional Gaussian mechanism
X Li, H Li, H Yan, Z Cheng, W Sun, H Zhu
arXiv preprint arXiv:2002.02061, 2020
12020
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack
H Yan, X Li, H Li, J Li, W Sun, F Li
IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021
402021
MultiEvasion: Evasion Attacks Against Multiple Malware Detectors
H Liu, W Sun, N Niu, B Wang
2022 IEEE Conference on Communications and Network Security (CNS), 10-18, 2022
12022
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks
X Li, Z Li, N Li, W Sun
arXiv preprint arXiv:2403.19510, 2024
2024
One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage
X Liu, W Sun, W Lou, Q Pei, Y Zhang
2017 IEEE International Conference on Computer Communications (IEEE INFOCOM'17), 2017
592017
Privacy-preserving keyword search over encrypted data in cloud computing
W Sun, W Lou, YT Hou, H Li
Secure cloud computing, 189-212, 2014
432014
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
The 8th ACM SIGSAC Symposium on Information, Computer and Communications …, 2013
4992013
系统目前无法执行此操作,请稍后再试。
文章 1–20