关注
Wei Wang
Wei Wang
Huazhong University o Science and Technology
在 hust.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
P Xu, H Jin, Q Wu, W Wang
IEEE Transactions on computers 62 (11), 2266-2277, 2012
3312012
Conditional identity-based broadcast proxy re-encryption and its application to cloud email
P Xu, T Jiao, Q Wu, W Wang, H Jin
IEEE Transactions on Computers 65 (1), 66-79, 2015
1642015
A distributed HOSVD method with its incremental computation for big data in cyber-physical-social systems
X Wang, W Wang, LT Yang, S Liao, D Yin, MJ Deen
IEEE Transactions on Computational Social Systems 5 (2), 481-492, 2018
1282018
Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks
P Xu, S He, W Wang, W Susilo, H Jin
IEEE Transactions on Industrial Informatics 14 (8), 3712-3723, 2017
972017
Secure data collection, storage and access in cloud-assisted IoT
W Wang, P Xu, LT Yang
IEEE cloud computing 5 (4), 77-88, 2018
872018
Generating searchable public-key ciphertexts with hidden structures for fast keyword search
P Xu, Q Wu, W Wang, W Susilo, J Domingo-Ferrer, H Jin
IEEE Transactions on Information Forensics and Security 10 (9), 1993-2006, 2015
712015
Lightweighted secure searching over public-key ciphertexts for edge-cloud-assisted industrial IoT devices
W Wang, P Xu, D Liu, LT Yang, Z Yan
IEEE Transactions on Industrial Informatics 16 (6), 4221-4230, 2019
492019
A secure high-order Lanczos-based orthogonal tensor SVD for big data reduction in cloud environment
J Feng, LT Yang, G Dai, W Wang, D Zou
IEEE Transactions on Big Data 5 (3), 355-367, 2018
352018
Bestie: Very practical searchable encryption with forward and backward security
T Chen, P Xu, W Wang, Y Zheng, W Susilo, H Jin
European Symposium on Research in Computer Security, 3-23, 2021
322021
ROSE: Robust searchable encryption with forward and backward security
P Xu, W Susilo, W Wang, T Chen, Q Wu, K Liang, H Jin
IEEE transactions on information forensics and security 17, 1115-1130, 2022
312022
LaF: Lattice-based and communication-efficient federated learning
P Xu, M Hu, T Chen, W Wang, H Jin
IEEE Transactions on Information Forensics and Security 17, 2483-2496, 2022
212022
Dynamic searchable symmetric encryption with physical deletion and small leakage
P Xu, S Liang, W Wang, W Susilo, Q Wu, H Jin
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
212017
Anonymous identity-based broadcast encryption with constant decryption complexity and strong security
P Xu, J Li, W Wang, H Jin
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
202016
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts
W Wang, P Xu, H Li, LT Yang
Future Generation Computer Systems 55, 353-361, 2016
202016
Bandwidth efficient and rate-adaptive video delivery in TV white space
L Yu, C Liu, W Zhu, S Hua, W Wang
IEEE Transactions on Circuits and Systems for Video Technology 24 (9), 1605-1619, 2014
192014
Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT
P Xu, X Tang, W Wang, H Jin, LT Yang
IEEE Access 5, 24775-24784, 2017
182017
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption
X Zhang, W Wang, P Xu, LT Yang, K Liang
32nd USENIX Security Symposium (USENIX Security 23), 5953-5970, 2023
172023
Using sparse representation to detect anomalies in complex WSNs
X Li, G Xu, X Zheng, K Liang, E Panaousis, T Li, W Wang, C Shen
ACM Transactions on Intelligent Systems and Technology (TIST) 10 (6), 1-18, 2019
132019
Generally hybrid proxy re-encryption: a secure data sharing among cryptographic clouds
P Xu, J Xu, W Wang, H Jin, W Susilo, D Zou
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
112016
Cloud-assisted key distribution in batch for secure real-time mobile services
W Wang, P Xu, LT Yang, J Chen
IEEE Transactions on Services Computing 11 (5), 850-863, 2016
102016
系统目前无法执行此操作,请稍后再试。
文章 1–20