Articles with public access mandates - Wenhai SunLearn more
Not available anywhere: 4
Protecting regression models with personalized local differential privacy
X Li, H Yan, Z Cheng, W Sun, H Li
IEEE Transactions on Dependable and Secure Computing 20 (2), 960-974, 2022
Mandates: National Natural Science Foundation of China
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials
J Lei, Q Pei, Y Wang, W Sun, X Liu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3101-3112, 2021
Mandates: National Natural Science Foundation of China
A Practical Privacy-preserving Face Authentication Scheme with Revocability and Reusability
J Lei, Q Pei, X Liu, W Sun
18th International Conference on Algorithms and Architectures for Parallel …, 2018
Mandates: National Natural Science Foundation of China
A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers
X Yuan, X Tong, Q Fang, W Sun, W Lou
2018 IEEE 20th International Conference on High Performance Computing and …, 2018
Mandates: US National Science Foundation
Available somewhere: 21
Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud
W Sun, S Yu, W Lou, T Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187 - 1198, 2014
Mandates: National Natural Science Foundation of China
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 25 (11), 3025-3035, 2014
Mandates: National Natural Science Foundation of China
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
W Sun, X Liu, W Lou, YT Hou, H Li
2015 IEEE Conference on Computer Communications (IEEE INFOCOM'15), 2110 - 2118, 2015
Mandates: National Natural Science Foundation of China
One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage
X Liu, W Sun, W Lou, Q Pei, Y Zhang
2017 IEEE International Conference on Computer Communications (IEEE INFOCOM'17), 2017
Mandates: US National Science Foundation, National Natural Science Foundation of China
Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
Y Chen, W Sun, Q Zheng, W Lou, YT Hou
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 2018
Mandates: US National Science Foundation, National Natural Science Foundation of China
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
ACM WiSec 2020, 2020
Mandates: US National Science Foundation
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack
H Yan, X Li, H Li, J Li, W Sun, F Li
IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021
Mandates: National Natural Science Foundation of China
REARGUARD: Secure keyword search using trusted hardware
W Sun, R Zhang, W Lou, YT Hou
2018 IEEE Conference on Computer Communications (IEEE INFOCOM'18), 2018
Mandates: US National Science Foundation
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W Sun, N Zhang, W Lou, YT Hou
2017 IEEE Conference on Computer Communications (IEEE INFOCOM'17), 2017
Mandates: US National Science Foundation, National Natural Science Foundation of China
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li
IEEE Transactions on Services Computing 10 (5), 826 - 838, 2016
Mandates: National Natural Science Foundation of China
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation
X Li, N Li, W Sun, NZ Gong, H Li
USENIX Security Symposium, 2023
Mandates: National Natural Science Foundation of China
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
W Sun, N Zhang, W Lou, YT Hou
IEEE Conference on Communications and Network Security (IEEE CNS 2018), 2018
Mandates: US National Science Foundation
Towards Overcoming the Undercutting Problem
T Gong, M Minaei, W Sun, A Kate
Financial Cryptography and Data Security 2022 (FC'22), 2020
Mandates: US National Science Foundation
A Secure Remote Monitoring Framework Supporting Efficient Fine-grained Access Control and Data Processing in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
14th International Conference on Security and Privacy in Communication …, 2018
Mandates: US National Science Foundation, National Natural Science Foundation of China
ROSTER: Radio Context Attestation in Cognitive Radio Network
N Zhang, W Sun, W Lou, YT Hou, W Trappe
IEEE Conference on Communications and Network Security (IEEE CNS 2018), 2018
Mandates: US National Science Foundation
SPEEDSTER: An efficient multi-party state channel via enclaves
J Liao, F Zhang, W Sun, W Shi
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Mandates: US National Science Foundation, National Natural Science Foundation of China
Publication and funding information is determined automatically by a computer program