关注
Boyang Wang
Boyang Wang
在 uc.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Oruta: Privacy-preserving public auditing for shared data in the cloud
B Wang, B Li, H Li
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 295-302, 2012
7572012
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE Transactions on Services Computing, 1-1, 2014
6302014
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE INFOCOM, 2904-2912, 2013
630*2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
X Liu, Y Zhang, B Wang, J Yan
IEEE Transactions on Parallel and Distributed Systems (TPDS) 6 (24), 1182-1191, 2013
4852013
Knox: privacy-preserving auditing for shared data with large groups in the cloud
B Wang, B Li, H Li
International Conference on Applied Cryptography and Network Security, 507-525, 2012
2842012
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2422013
Certificateless Public Auditing for Data Integrity in the Cloud
B Wang, B Li, H Li
IEEE CNS, 276--284, 2013
1542013
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
B Wang, Y Hou, M Li, H Wang, H Li
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1362014
Geometric Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang
IEEE Transactions on Information Forensics and Security, 2016
1252016
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
B Wang, H Li, M Li
IEEE ICC, 539--543, 2013
1212013
Computing encrypted cloud data efficiently under multiple keys
B Wang, M Li, SSM Chow, H Li
2013 IEEE Conference on Communications and Network Security (CNS), 504-513, 2013
1052013
Circular Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang, H Li
IEEE Conference on Communications and Network Security (CNS), 2015, 2015
822015
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data
B Wang, Y Hou, M Li
IEEE International Conference on Computer Communications, 2016
762016
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun
2019 IEEE Conference on Communications and Network Security (CNS), 232-240, 2019
712019
A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys
B Wang, M Li, S Chow, H Li
2nd IEEE Conference on Communications and Network Security, 2014
642014
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
B Wang, M Li, L Xiong
IEEE Transactions on Dependable and Secure Computing, 2017
632017
Comments on a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2015
602015
On the security of a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2014
60*2014
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
arXiv preprint arXiv:2005.09800, 2020
532020
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks
BEN NIU, Y Chen, Z Wang, B Wang, H Li
IEEE Transactions on Mobile Computing, 2020
522020
系统目前无法执行此操作,请稍后再试。
文章 1–20