How to bid the cloud L Zheng, C Joe-Wong, CW Tan, M Chiang, X Wang ACM SIGCOMM Computer Communication Review 45 (4), 71-84, 2015 | 222 | 2015 |
IoT for next-generation racket sports training Y Wang, M Chen, X Wang, RHM Chan, WJ Li IEEE Internet of Things Journal 5 (6), 4558-4566, 2018 | 83 | 2018 |
Privacy-preserving deep packet inspection in outsourced middleboxes X Yuan, X Wang, J Lin, C Wang IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 81 | 2016 |
Toward encrypted cloud media center with secure deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui IEEE Transactions on Multimedia 19 (2), 251-265, 2016 | 65 | 2016 |
Enabling privacy-preserving image-centric social discovery X Yuan, X Wang, C Wang, A Squicciarini, K Ren 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 61 | 2014 |
Enabling encrypted cloud media center with secure deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 56 | 2015 |
EncKV: An encrypted key-value store with rich queries X Yuan, Y Guo, X Wang, C Wang, B Li, X Jia Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 53 | 2017 |
Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing X Yuan, X Wang, C Wang, J Weng, K Ren IEEE Transactions on Multimedia 18 (10), 2002-2014, 2016 | 49 | 2016 |
Enabling privacy-assured similarity retrieval over millions of encrypted records X Yuan, H Cui, X Wang, C Wang Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 48 | 2015 |
Enabling encrypted rich queries in distributed key-value stores X Yuan, X Wang, C Wang, B Li, X Jia IEEE Transactions on Parallel and Distributed Systems 30 (6), 1283-1297, 2018 | 43 | 2018 |
Privacy-preserving similarity joins over encrypted data X Yuan, X Wang, C Wang, C Yu, S Nutanong IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017 | 39 | 2017 |
Building an encrypted, distributed, and searchable key-value store X Yuan, X Wang, C Wang, C Qian, J Lin Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 39 | 2016 |
Systems and methods for privacy-assured similarity joins over encrypted datasets C Wang, S Nutanong, X Yuan, X Wang, C Yu US Patent 10,496,638, 2019 | 29 | 2019 |
Enabling secure and efficient video delivery through encrypted in-network caching X Yuan, X Wang, J Wang, Y Chu, C Wang, J Wang, MJ Montpetit, S Liu IEEE Journal on Selected Areas in Communications 34 (8), 2077-2090, 2016 | 29 | 2016 |
Construction and mitigation of user-behavior-based covert channels on smartphones W Qi, W Ding, X Wang, Y Jiang, Y Xu, J Wang, K Lu IEEE Transactions on Mobile Computing 17 (1), 44-57, 2017 | 22 | 2017 |
Towards privacy-preserving and practical image-centric social discovery X Yuan, X Wang, C Wang, AC Squicciarini, K Ren IEEE Transactions on Dependable and Secure Computing 15 (5), 868-882, 2016 | 21 | 2016 |
Method for operating a distributed key-value store X Yuan, Y Guo, X Wang, C Wang US Patent 10,476,662, 2019 | 9 | 2019 |
Webenclave: protect web secrets from browser extensions with software enclave X Wang, Y Du, C Wang, Q Wang, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 3055-3070, 2021 | 7 | 2021 |
BlindDB: an Encrypted, Distributed, and Searchable Key-value Store X Yuan, X Wang, J Lin, C Wang, C Qian | 1 | 2016 |
Towards a scalable, private, and searchable key-value store X Yuan, X Wang, Y Chu, C Wang, C Qian 2015 IEEE Conference on Communications and Network Security (CNS), 773-774, 2015 | 1 | 2015 |