Follow
Bing Wang
Title
Cited by
Cited by
Year
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
B Wang, S Yu, W Lou, YT Hou
IEEE INFOCOM 2014-IEEE conference on computer communications, 2112-2120, 2014
5172014
DDoS attack protection in the era of cloud computing and software-defined networking
B Wang, Y Zheng, W Lou, YT Hou
Computer Networks 81, 308-319, 2015
5132015
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
4962013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
4962013
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee
B Wang, W Song, W Lou, YT Hou
Computer Communications (INFOCOM), 2015 IEEE Conference on, 2092 - 2100, 2015
1302015
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications
W Song, B Wang, Q Wang, Z Peng, W Lou, Y Cui
Journal of Parallel and Distributed Computing 99, 14-27, 2017
792017
Privacy-preserving pattern matching over encrypted genetic data in cloud computing
B Wang, W Song, W Lou, YT Hou
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
562017
Publicly verifiable computation of polynomials over outsourced data with multiple sources
W Song, B Wang, Q Wang, C Shi, W Lou, Z Peng
IEEE Transactions on Information Forensics and Security 12 (10), 2334-2347, 2017
402017
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification
W Song, B Wang, Q Wang, Z Peng, W Lou
Information sciences 387, 221-237, 2017
162017
Modeling the side-channel attacks in data deduplication with game theory
B Wang, W Lou, YT Hou
2015 IEEE conference on communications and network security (CNS), 200-208, 2015
132015
Privacy-preserving link prediction in decentralized online social networks
Y Zheng, B Wang, W Lou, YT Hou
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
122015
Search over encrypted data in cloud computing
B Wang
Virginia Tech, 2016
62016
A mixed structure of Streaming in WiiSE-DSN Network
B Wang, X Lai, H Zhu, M Qi
2011 International Conference on E-Business and E-Government (ICEE), 1-4, 2011
2011
一般論述/Information Science: The Territory and Relations to Computing Disciplines/Bing Wang
BWB Wang
Journal of Library and Information Science-Taipei 35 (1), 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–14