Follow
Boyang Wang
Title
Cited by
Cited by
Year
Oruta: Privacy-preserving public auditing for shared data in the cloud
B Wang, B Li, H Li
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 295-302, 2012
7612012
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE Transactions on Services Computing, 1-1, 2014
6352014
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE INFOCOM, 2904-2912, 2013
635*2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
X Liu, Y Zhang, B Wang, J Yan
IEEE Transactions on Parallel and Distributed Systems (TPDS) 6 (24), 1182-1191, 2013
4942013
Knox: privacy-preserving auditing for shared data with large groups in the cloud
B Wang, B Li, H Li
International Conference on Applied Cryptography and Network Security, 507-525, 2012
2862012
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2432013
Certificateless Public Auditing for Data Integrity in the Cloud
B Wang, B Li, H Li
IEEE CNS, 276--284, 2013
1542013
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
B Wang, Y Hou, M Li, H Wang, H Li
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1352014
Geometric Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang
IEEE Transactions on Information Forensics and Security, 2016
1262016
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
B Wang, H Li, M Li
IEEE ICC, 539--543, 2013
1232013
Computing encrypted cloud data efficiently under multiple keys
B Wang, M Li, SSM Chow, H Li
2013 IEEE Conference on Communications and Network Security (CNS), 504-513, 2013
1062013
Circular Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang, H Li
IEEE Conference on Communications and Network Security (CNS), 2015, 2015
832015
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data
B Wang, Y Hou, M Li
IEEE International Conference on Computer Communications, 2016
772016
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun
2019 IEEE Conference on Communications and Network Security (CNS), 232-240, 2019
682019
A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys
B Wang, M Li, S Chow, H Li
2nd IEEE Conference on Communications and Network Security, 2014
662014
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
B Wang, M Li, L Xiong
IEEE Transactions on Dependable and Secure Computing, 2017
652017
Comments on a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2015
602015
On the security of a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2014
60*2014
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
arXiv preprint arXiv:2005.09800, 2020
522020
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks
BEN NIU, Y Chen, Z Wang, B Wang, H Li
IEEE Transactions on Mobile Computing, 2020
502020
The system can't perform the operation now. Try again later.
Articles 1–20