Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li The 8th ACM SIGSAC Symposium on Information, Computer and Communications …, 2013 | 501 | 2013 |
Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud W Sun, S Yu, W Lou, T Hou, H Li IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187 - 1198, 2014 | 332 | 2014 |
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li IEEE Transactions on Parallel and Distributed Systems 25 (11), 3025-3035, 2014 | 317 | 2014 |
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li 2014 IEEE Conference on Computer Communications (IEEE INFOCOM'14), 226-234, 2014 | 282 | 2014 |
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data W Sun, X Liu, W Lou, YT Hou, H Li 2015 IEEE Conference on Computer Communications (IEEE INFOCOM'15), 2110 - 2118, 2015 | 176 | 2015 |
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun IEEE Conference on Communications and Network Security (IEEE CNS 2019), 2019 | 68 | 2019 |
Secure and privacy-preserving data storage service in public cloud H Li, W Sun, F Li, B Wang Journal of Computer Research and Development 51 (7), 1397-1409, 2014 | 61 | 2014 |
One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage X Liu, W Sun, W Lou, Q Pei, Y Zhang 2017 IEEE International Conference on Computer Communications (IEEE INFOCOM'17), 2017 | 59 | 2017 |
Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT Y Chen, W Sun, Q Zheng, W Lou, YT Hou IEEE Transactions on Information Forensics & Security (IEEE TIFS), 2018 | 55 | 2018 |
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang ACM WiSec 2020, 2020 | 52 | 2020 |
Privacy-preserving keyword search over encrypted data in cloud computing W Sun, W Lou, YT Hou, H Li Secure cloud computing, 189-212, 2014 | 43 | 2014 |
REARGUARD: Secure keyword search using trusted hardware W Sun, R Zhang, W Lou, YT Hou 2018 IEEE Conference on Computer Communications (IEEE INFOCOM'18), 2018 | 38 | 2018 |
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack H Yan, X Li, H Li, J Li, W Sun, F Li IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021 | 37* | 2021 |
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data W Sun, N Zhang, W Lou, YT Hou 2017 IEEE Conference on Computer Communications (IEEE INFOCOM'17), 2017 | 28 | 2017 |
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li IEEE Transactions on Services Computing 10 (5), 826 - 838, 2016 | 23 | 2016 |
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup W Sun, N Zhang, W Lou, YT Hou IEEE Conference on Communications and Network Security (IEEE CNS 2018), 2018 | 15 | 2018 |
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation X Li, N Li, W Sun, NZ Gong, H Li USENIX Security Symposium, 2023 | 13 | 2023 |
Protecting regression models with personalized local differential privacy X Li, H Yan, Z Cheng, W Sun, H Li IEEE Transactions on Dependable and Secure Computing 20 (2), 960-974, 2022 | 13 | 2022 |
Towards Overcoming the Undercutting Problem T Gong, M Minaei, W Sun, A Kate Financial Cryptography and Data Security 2022 (FC'22), 2020 | 12* | 2020 |
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials J Lei, Q Pei, Y Wang, W Sun, X Liu IEEE Transactions on Dependable and Secure Computing 19 (5), 3101-3112, 2021 | 11 | 2021 |