(Selected Publications)

2017

Efficient Verifiable Databases with Insertion/Deletion Operations From Delegating Polynomial Functions
Meixia Miao, Jianfeng Ma, Xinyi Huang, and Qian Wang
IEEE Transactions on Information Forensics and Security 2017
(Accepted to appear)
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data
Zhangjie Fu, Xinle Wu, Qian Wang, and Kui Ren
IEEE Transactions on Information Forensics and Security 2017
(Accepted to appear)
Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks
Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen, and Qian Wang
Ad Hoc Networks 2017
(Accepted to appear)
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications
Pan Zhou, Qian Wang, Wei Wang, Yuchong Hu, and Dapeng Wu
IEEE Transactions on Information Forensics and Security 2017
(Accepted to appear)
Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources
Wei Song, Bing Wang, Qian Wang, Chengliang Shi, Wenjing Lou, and Zhiyong Peng
IEEE Transactions on Information Forensics and Security 2017
(Accepted to appear)
Stable Matching for Spectrum Market with Guaranteed Minimum Requirement
Yanjiao Chen, Yuxuang Xiong, Qian Wang, Xiaoyuan Yin, and Baochun Li
ACM MobiHoc 2017
(Accepted to appear)
Robust Gait Recognition by Integrating Inertial and RGBD Sensors
Qin Zou, Lihao Ni, Qian Wang, Qingquan Li, and Song Wang
IEEE Transactions on Cybernetics 2017
(Published online)
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
Si Chen, Siyu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen, and Kui Ren
IEEE ICDCS 2017
(Accepted to appear)
(Won the Best Student Paper Award)

Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey
Jingjun Wang, Shengshan Hu, Qian Wang, and Yutao Ma
IEEE Network 2017
(Accepted to appear)
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen
FC 2017
(Accepted to appear)

2016

Learning Privately: Privacy-Preserving Canonical Correlation Analysis for Cross-Media Retrieval
Qian Wang, Shengshan Hu, Minxin Du, Jingjun Wang, and Kui Ren
INFOCOM 2017
(Accepted to appear)
Exploiting Social Influence for Context-Aware Event Recommendation in Event-based Social Networks
Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang, and Feng Xia
INFOCOM 2017
(Accepted to appear)
Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks
Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, and Qian Wang
ELSEVIER Computer Networks 2016
Local Pattern Collocations Using Regional Co-occurrence Factorization
Qin Zou, Lihao Ni, Qian Wang, Qingquan Li, and Song Wang
IEEE Transactions on Multimedia 2016
THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply
Qian Wang, Qihang Sun, and Kui Ren
IEEE Transactions on Mobile Computing 2016
Baseline is Fragile: On the Effectiveness of Stack Pivot Defense
Fei Yan, Fan Huang, Lei Zhao, Huirong Peng, and Qian Wang
ICPADS 2016
Private and Truthful Aggregative Game for Large-Scale Spectrum Sharing
Pan Zhou, Wenqi Wei, Kaigui Bian, Dapeng Oliver Wu, Yuchong Hu, and Qian Wang
IEEE Journal on Selected Areas in Communications 2016
SecWeb: Privacy-preserving Web Browsing Monitoring with w-Event Differential Privacy
Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, and Kui Ren
SecureComm 2016
(Accepted to appear)
Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy
Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren
IEEE Transactions on Dependable and Secure Computing 2016
Searchable Encryption over Feature-Rich Data
Qian Wang, Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, and Qin Zou
IEEE Transactions on Dependable and Secure Computing 2016
Popular Articles of IEEE TDSC (Top 50 most frequently downloaded articles, Oct. to Nov. 2016)
Securing Fast Learning! Ridge Regression over Encrypted Big Data
Shengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, and Qin Zou
TrustCom 2016
(Won the Best Paper Award)
Messages Behind the Sound: Real-Time Hidden Acoustic Signal Capture with Smartphones
Qian Wang, Kui Ren, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, and Lu Su
MobiCom 2016
A Privacy-Preserved Full-text Retrieval Algorithm over Encrypted Data for Cloud Storage Applications
Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou, and Yihui Cui
Journal of Parallel and Distributed Computing 2016
Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
Shengshan Hu, Qian Wang, Jingjun Wang, Zhan Qin, and Kui Ren
IEEE Transactions on Image Processing 2016
Tell me the Truth: Practically Public Authentication for Outsourced Databases with Multi-User Modication
Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, and Wenjing Lou
Information Sciences 2016
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor
Qian Wang, Shengshan Hu, Jingjun Wang, and Kui Ren
ICDCS 2016
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud
Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, and Kui Ren
AsiaCCS 2016

2015

Geodesic-Based Pavement Shadow Removal Revisited
Qin Zou, Zhongwen Hu, Long Chen, Qian Wang, and Qingquan Li
ICASSP 2016
Catch Me in the Dark: Effective Privacy-preserving Outsourcing of Feature Extractions over Image Data
Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, and Minxin Du
INFOCOM 2016
RescueDP: Real-time Spatio-temporal Crowdsourced Data Publishing with Differential Privacy
Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren
INFOCOM 2016
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
Zhengwei Ren, Lina Wang, Qian Wang, and Mingdi Xu
IEEE Transactions on Services Computing 2015
Deep Learning Based Feature Selection for Remote Sensing Scene Classification
Qin Zou, Lihao Ni, Tong Zhang, and Qian Wang
IEEE Geoscience and Remote Sensing Letters 2015
Popular Articles of IEEE GRSL (Top 2 most frequently downloaded articles, as of Nov. 2016)
Most Cited Articles of IEEE GRSL (Top 19 most frequently cited articles, as of Nov. 2016)
Jamming-Resistant Multi-Radio Multi-Channel Opportunistic Spectrum Access in Cognitive Radio Networks
Qian Wang, Kui Ren, Peng Ning, and Shengshan Hu
IEEE Transactions on Vehicular Technology 2015
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice
Qian Wang, Kui Ren, Guancheng Li, Chengbo Xia, Zhibo Wang, and Qin Zou
CCS 2015
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, and Zhibo Wang
RainBar: Robust Application-Driven Visual Communication Using Color Barcodes
Qian Wang, Man Zhou, Kui Ren, Tao Lei, Jikun Li, and Zhibo Wang
ICDCS 2015
Friendbook: A Semantic-based Friend Recommendation System for Social Networks
Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, and Zhi Wang
IEEE Transactions on Mobile Computing 2015
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Zhihua Xia, Xin Wang, Xinming Sun, and Qian Wang
IEEE Transactions on Parallel and Distributed Systems 2015
(ESI Hot Paper, Highly Cited Paper)

Popular Articles of IEEE TPDS (Top 4 most frequently downloaded articles, as of Nov. 2016)
Most Cited Articles of IEEE TPDS (Top 12 most frequently cited articles, as of Nov. 2016)
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs
Honglong Chen, Wei Lou, Zhibo Wang, and Qian Wang
IEEE Transactions on Vehicular Technology 2015

2014

Efficient privacy-preserved data query over ciphertext in cloud computing
Wei Song, Zhiyong Peng, Qian Wang, Fangquan Cheng, Xiaoxin Wu, and Yihui Cui
Security and Communication Networks 2014
Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply
Qihang Sun, Qian Wang, and Kui Ren
ICNP 2014
Achieving k-barrier Coverage in Hybrid Directional Sensor Networks
Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, and Zhi Wang
IEEE Transactions on Mobile Computing 2014
Fault Tolerant Barrier Coverage for Wireless Sensor Networks
Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, and Zhi Wang
INFOCOM 2014
Securing Emerging Short Range Wireless Communications: The State of the Art
Kui Ren, Qian Wang, and Di Ma
IEEE Wireless Communications 2014
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets
Huajie Shao, Lei Rao, Zhi Wang, Xue Liu, Zhibo Wang, and Kui Ren
IEEE Transactions on Parallel and Distributed Systems 2014
Energy Efficient Opportunistic Cooperative Transmission with Different Ratio Combinings: from A New Perspective
Qian Wang, Meiqi He, Wei Song, and Yun Rui
Science China Information Sciences 2014
Highly Efficient Indexing for Privacy-Preserving Multi-Keyword Query over Encrypted Cloud Data
Fangquan Cheng, Qian Wang, Qianwen Zhang, and Zhiyong Peng
WAIM 2014
(Won the Best Paper Award)

2013

Opportunistic Spectrum Access: from Stochastic Channels to Non-Stochastic Channels
Kui Ren, and Qian Wang
IEEE Wireless Communications 2013
iQueue-MAC: A Traffic Adaptive duty-cycled MAC Protocol With Dynamic Slot Allocation
Shuguo Zhuo, Zhi Wang, Yeqiong Song, Zhibo Wang, and Luis Almeida
SECON 2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Cong Wang, Kui Ren, Jia Wang, and Qian Wang
IEEE Transactions on Parallel and Distributed Systems 2013
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou
IEEE Transactions on Computers 2013
(ESI Highly Cited Paper)

Popular Articles of IEEE TC (Top 1 most frequently downloaded articles, as of Nov. 2016)
Most Cited Articles of IEEE TC (Top 4 most frequently cited articles, as of Nov. 2016)
Proof-carrying Cloud Computation: The Case of Convex Optimization
Zhen Xu, Cong Wang, Qian Wang, Kui Ren, and Lingyu Wang
INFOCOM MINI 2013
Optimal Budget Deployment Strategy against Power Grid Interdiction
Xuan Liu, Kui Ren, Yanling Yuan, Zuyi Li, and Qian Wang
INFOCOM 2013

2012

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels
Qian Wang, Kaihe Xu, and Kui Ren
IEEE Journal on Selected Areas in Communications 2012
Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication
Qian Wang, Ping Xu, Kui Ren, and Xiang-Yang Li
IEEE Journal on Selected Areas in Communications 2012
Joint UFH and Power Control for Effective Wireless Anti-Jamming Communication
Kaihe Xu, Qian Wang, and Kui Ren
INFOCOM 2012
When Cloud Meets eBay: Towards Effective Pricing for Cloud Computing
Qian Wang, Kui Ren, and Xiaoqiao Meng
INFOCOM 2012
Toward Secure and Dependable Storage Services in Cloud Computing
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou
IEEE Transactions on Service Computing 2012
Locating Malicious Nodes for Data Aggregation in Wireless Networks
Xiaohua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan, Kui Ren, and Yuanfang Chen
INFOCOM MINI 2012
Toward Secure and Effective Data Utilization in Public Cloud
Kui Ren, Cong Wang, and Qian Wang
IEEE Network 2012
Security Challenges for the Public Cloud
Kui Ren, Cong Wang, and Qian Wang
IEEE Internet Computing 2012

2011

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li
IEEE Transactions on Parallel and Distributed Systems 2011
(ESI Highly Cited Paper)

Popular Articles of IEEE TPDS (Top 25 most frequently downloaded articles, as of Nov. 2016)
Most Cited Articles of IEEE TPDS (Top 3 most frequently cited articles, as of Nov. 2016)
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Qian Wang, Kui Ren, Shucheng Yu, and Wenjing Lou
ACM Transactions on Sensor Networks 2011
Anti-Jamming Communication in Cognitive Radio Networks with Unknown Channel Statistics
Qian Wang, Kui Ren, and Peng Ning
ICNP 2011
(Won the Best Paper Award)
Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks
Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim
INFOCOM 2011
Delay-Bounded Adaptive UFH-based Anti-Jamming Wireless Communication
Qian Wang, Ping Xu, Kui Ren, and Xiang-Yang Li
INFOCOM 2011
Secret Key Generation Exploiting Channel Characteristics in Wireless Communications
Kui Ren, Hai Su, and Qian Wang
IEEE Wireless Communications 2011

2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou
INFOCOM 2010
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou
INFOCOM MINI 2010

2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou
ESORICS 2009
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Qian Wang, Kui Ren, Wenjing Lou, and Yanchao Zhang
INFOCOM 2009
Ensuring Data Storage Security in Cloud Computing
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou
IWQoS 2009