Seuraa
Wenhai Sun
Wenhai Sun
Vahvistettu sähköpostiosoite verkkotunnuksessa purdue.edu - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
The 8th ACM SIGSAC Symposium on Information, Computer and Communications …, 2013
5172013
Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud
W Sun, S Yu, W Lou, T Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187 - 1198, 2014
3432014
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 25 (11), 3025-3035, 2014
3242014
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
W Sun, S Yu, W Lou, YT Hou, H Li
2014 IEEE Conference on Computer Communications (IEEE INFOCOM'14), 226-234, 2014
2902014
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
W Sun, X Liu, W Lou, YT Hou, H Li
2015 IEEE Conference on Computer Communications (IEEE INFOCOM'15), 2110 - 2118, 2015
1852015
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun
IEEE Conference on Communications and Network Security (IEEE CNS 2019), 2019
782019
One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage
X Liu, W Sun, W Lou, Q Pei, Y Zhang
2017 IEEE International Conference on Computer Communications (IEEE INFOCOM'17), 2017
652017
Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
Y Chen, W Sun, Q Zheng, W Lou, YT Hou
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 2018
642018
Secure and privacy-preserving data storage service in public cloud
H Li, W Sun, F Li, B Wang
Journal of Computer Research and Development 51 (7), 1397-1409, 2014
642014
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
ACM WiSec 2020, 2020
602020
Privacy-preserving keyword search over encrypted data in cloud computing
W Sun, W Lou, YT Hou, H Li
Secure cloud computing, 189-212, 2014
452014
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack
H Yan, X Li, H Li, J Li, W Sun, F Li
IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021
442021
REARGUARD: Secure keyword search using trusted hardware
W Sun, R Zhang, W Lou, YT Hou
2018 IEEE Conference on Computer Communications (IEEE INFOCOM'18), 2018
402018
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W Sun, N Zhang, W Lou, YT Hou
2017 IEEE Conference on Computer Communications (IEEE INFOCOM'17), 2017
312017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li
IEEE Transactions on Services Computing 10 (5), 826 - 838, 2016
232016
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation
X Li, N Li, W Sun, NZ Gong, H Li
USENIX Security Symposium, 2023
202023
Protecting regression models with personalized local differential privacy
X Li, H Yan, Z Cheng, W Sun, H Li
IEEE Transactions on Dependable and Secure Computing 20 (2), 960-974, 2022
202022
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials
J Lei, Q Pei, Y Wang, W Sun, X Liu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3101-3112, 2021
152021
Towards Overcoming the Undercutting Problem
T Gong, M Minaei, W Sun, A Kate
Financial Cryptography and Data Security 2022 (FC'22), 2020
15*2020
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
W Sun, N Zhang, W Lou, YT Hou
IEEE Conference on Communications and Network Security (IEEE CNS 2018), 2018
152018
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20