2022 面向机器学习模型安全的测试与修复
张笑宇, 沈超, 蔺琛皓, 李前, 王骞 , 李琦, 管晓宏
电子学报 (Acta Electronica Sinica) 2022
Verifying the Quality of Outsourced Training on Clouds
Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang , Chao Shen, and Qi Li
A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs
Ningping Mou, Baolin Zheng, Qian Wang , Yunjie Ge, and Binqing Guo
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions
Xueluan Gong, Yanjiao Chen, Qian Wang , Meng Wang, and Shuyang Li
IEEE Communications Magazine 2022
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls
Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, and Qian Wang
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems
Yike Zhan, Baolin Zheng, Qian Wang , Ningping Mou, Binqing Guo, Qi Li, Chao Shen, and Cong Wang
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm with Hierarchical Structure
Xiaozhen Lu, Liang Xiao, Guohang Niu, Xiangyang Ji, and Qian Wang
IEEE Transactions on Information Forensics and Security 2022
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks
Xueluan Gong, Yanjiao Chen, Jianshuo Dong, and Qian Wang
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, and Qian Wang
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang , Chao Shen, Zhi Wang, and Qi Li
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams
Xiaoyi Pang, Zhibo Wang, Defang Liu, John C. S. Lui, Qian Wang , and Ju Ren
IEEE/ACM Transactions on Networking 2022
Dynamic Network Function Enforcement via Joint Flow and Function Scheduling
Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang , Mingwei Xu, and Jianping Wu
IEEE Transactions on Information Forensics and Security 2022
GraphShield: Dynamic Large Graphs for Secure Queries with Forward Privacy
Minxin Du, Shuangke Wu, Qian Wang , Dian Chen, Peipei Jiang, and Aziz Mohaisen
IEEE Transactions on Knowledge and Data Engineering 2022
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions
Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, and Qian Wang
IEEE Transactions on Dependable and Secure Computing 2022
Hear Sign Language: A Real-time End-to-End Sign Language Recognition System
Zhibo Wang, Tengda Zhao, Jinxin Ma, Hongkai Chen, Kaixin Liu, Huajie Shao, Qian Wang , and Ju Ren
IEEE Transactions on Mobile Computing 2022
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers
Xueluan Gong, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, and Qian Wang
2021 Rethinking Adversarial Examples Exploiting Frequency-Based Analysis
Sicong Han, Chenhao Lin, Chao Shen, and Qian Wang
ICICS 2021
(Won the Best Paper Award)
Building In-the-Cloud Network Functions: Security and Privacy Challenges
Peipei Jiang, Qian Wang , Muqi Huang, Cong Wang, Qi Li, Chao Shen, and Kui Ren
Proceedings of the IEEE 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng, Peipei Jiang, Qian Wang , Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, and Shenyi Zhang
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation
Yunjie Ge, Qian Wang , Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, and Cong Wang
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning
Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang , Chao Shen, and Qi Li
IEEE Transactions on Dependable and Secure Computing 2021
CARTL: Cooperative Adversarially-Robust Transfer Learning
Dian Chen, Hongxin Hu, Qian Wang , Yinli Li, Cong Wang, Chao Shen, and Qi Li
ICML 2021 (Long Oral Presentation)
Defense-Resistant Backdoor Attacks against Deep Neural Networks in Outsourced Cloud Environment
Xueluan Gong, Yanjiao Chen, Qian Wang , Huayang Huang, Lingshuo Meng, Chao Shen, and Qian Zhang
IEEE Journal on Selected Areas in Communications 2021
微信恶意账号检测研究
杨征, 殷其雷, 李浩然, 苗园莉, 元东, 王骞 , 沈超, 李琦
计算机研究与发展 (Journal of Computer Research and Development) 2021
INVERSENET: Augmenting Model Extraction Attacks with Training Data Inversion
Xueluan Gong, Yanjiao Chen, Wenbin Yang, Guanghao Mei, and Qian Wang
Recent Advances in Adversarial Training for Adversarial Robustness
Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, and Qian Wang
Joint Knowledge Pruning and Recurrent Graph Convolution for News Recommendation
Yu Tian, Yuhao Yang, Xudong Ren, Pengfei Wang, Fangzhao Wu, Qian Wang , and Chenliang Li
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service
Lingchen Zhao, Qian Wang , Cong Wang, Qi Li, Chao Shen, and Bo Feng
IEEE Transactions on Parallel and Distributed Systems 2021
区块链网络安全保障:攻击与防御
江沛佩, 王骞 , 陈艳姣, 李琦, 沈超
通信学报 (Journal on Communications) 2021
针对深度学习模型的对抗性攻击与防御
李明慧, 江沛佩, 王骞 , 沈超, 李琦
计算机研究与发展 (Journal of Computer Research and Development) 2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on An Untrusted Cloud Server
Wei Song, Mengfei Tang, Qiben Yan, Yuan Shen, Yang Cao, Qian Wang , and Zhiyong Peng
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication
Dian Chen, Haobo Yuan, Shengshan Hu, Qian Wang , and Cong Wang
IEEE Transactions on Parallel and Distributed Systems 2021
Stealing Your Android Patterns via Acoustic Signals
Man Zhou, Qian Wang , Jingxiao Yang, Qi Li, Peipei Jiang, Yanjiao Chen, and Zhibo Wang
IEEE Transactions on Mobile Computing 2021
Towards Query-efficient Adversarial Attacks against Automatic Speech Recognition Systems
Qian Wang , Baolin Zheng, Qi Li, Chao Shen, and Zhongjie Ba
IEEE Transactions on Information Forensics and Security 2021
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach
Zhibo Wang, Mengkai Song, Siyan Zheng, Zhifei Zhang, Yang Song, and Qian Wang
IEEE Transactions on Dependable and Secure Computing 2021
Towards Private and Scalable Cross-Media Retrieval
Shengshan Hu, Leo Yu Zhang, Qian Wang , Zhan Qin, and Cong Wang
IEEE Transactions on Dependable and Secure Computing 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution
Shengshan Hu, Chengjun Cai, Qian Wang , Cong Wang, Zhibo Wang, and Dengpan Ye
IEEE Transactions on Dependable and Secure Computing 2021
2020 Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics
Yanjiao Chen, Long Lin, Baochun Li, Qian Wang , and Qian Zhang
IEEE Transactions on Parallel and Distributed Systems 2020
ELLG: Explainable Lesion Learning and Generation for Diabetic Retinopathy Detection
Chenhao Lin, Jiongli Zhu, Chao Shen, Pengwei Hu, and Qian Wang
IJCAI-DCM 2020
(Won the Best Paper Award)
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models
Xueluan Gong, Yanjiao Chen, Qian Wang , Wang Yang, and Xinchang Jiang
IEEE Communications Magazine 2020
Secure Prediction of Neural Network in the Cloud
Minghui Li, Yuejing Yan, Qian Wang , Minxin Du, Zhan Qin, and Cong Wang
Collaborative Fairness in Federated Learning
Lingjuan Lyu, Xinyi Xu, and Qian Wang
FL-IJCAI 2020
(Won the Best Paper Award)
Deep Learning on Mobile and Embedded Devices: State-of-the-Art, Challenges and Future Directions
Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang , Chao Shen, and Qian Zhang
ACM Computing Surveys 2020
Towards Compression-Resistant Privacy-Preserving Photo Sharing on Social Networks
Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang , and Ben Niu
Towards Demand-driven Dynamic Incentive for Mobile Crowdsensing Systems
Jiahui Hu, Zhibo Wang, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang , Honglong Chen, and Dejun Yang
IEEE Transactions on Wireless Communications 2020
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection
Lingchen Zhao, Shengshan Hu, Qian Wang , Jianlin Jiang, Chao Shen, Xiangyang Luo, and Pengfei Hu
IEEE Transactions on Dependable and Secure Computing 2020
Deep Learning-Based Gait Recognition Using Smartphones in the Wild
Qin Zou, Yanling Wang, Qian Wang , Yi Zhao, and Qingquan Li
IEEE Transactions on Information Forensics and Security 2020
Deep Domain Adaptation with Differential Privacy
Qian Wang , Zixi Li, Qin Zou, Lingchen Zhao, and Song Wang
IEEE Transactions on Information Forensics and Security 2020
Analyzing User-Level Privacy Attack Against Federated Learning
Mengkai Song, Zhibo Wang, Zhifei Zhang, Yang Song, Qian Wang , Ju Ren, and Hairong Qi
IEEE Journal on Selected Areas in Communications 2020
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage
Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, and Qian Wang
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments
Yanjiao Chen, Xueluan Gong, Qian Wang , Xing Di, and Huayang Huang
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment with Social Networks
Zhibo Wang, Yuting Huang, Xinkai Wang, Ju Ren, Qian Wang , and Libing Wu
IEEE Transactions on Mobile Computing 2020
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing
Zhibo Wang, Jing Zhao, Jiahui Hu, Tianqing Zhu, Qian Wang , Ju Ren, and Chao Li
IEEE Transactions on Mobile Computing 2020
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves
Chengjun Cai, Lei Xu, Anxin Zhou, Ruochen Wang, Cong Wang, and Qian Wang
Attention-over-Attention Field-aware Factorization Machine
ZhiboWang, Jinxin Ma, Yongquan Zhang, Qian Wang , Ju Ren, and Peng Sun
AAAI 2020
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing
Dong Yuan, Qi Li, Guoliang Li, Qian Wang , and Kui Ren
IEEE Transactions on Information Forensics and Security 2020
The Security of Autonomous Driving: Threats, Defenses, and Future Directions
Kui Ren, Qian Wang , Cong Wang, Zhan Qin, and Xiaodong Lin
Proceedings of the IEEE 2020
(ESI Highly Cited Paper)
Privacy-Preserving Collaborative Deep Learning with Unreliable Participants
Lingchen Zhao, Qian Wang , Qin Zou, Yan Zhang, and Yanjiao Chen
IEEE Transactions on Information Forensics and Security 2020
2019 False Data Injection Attacks against Smart Gird State Estimation: Construction, Detection and Defense
Meng Zhang, Chao Shen, Ning He, SiCong Han, Qi Li, Qian Wang , and XiaoHong Guan
Science China Technological Sciences 2019
Robust Lane Detection from Continuous Driving Scenes Using Deep Neural Networks
Qin Zou, Hanwen Jiang, Qiyu Dai, Yuanhao Yue, Long Chen, and Qian Wang
IEEE Transactions on Vehicular Technology 2019
Towards A Ledger-assisted Architecture for Secure Query Processing over Distributed IoT Data
Xingliang Yuan, Chengjun Cai, Qian Wang , and Qi Li
DSC 2019
(Won the Best Paper Award)
人工智能系统安全与隐私风险
陈宇飞, 沈超, 王骞 , 李琦, 王聪, 纪守领, 李康, 管晓宏
计算机研究与发展 (Journal of Computer Research and Development) 2019
Detecting Fake Accounts in Online Social Networks at the Time of Registrations
Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Qi Li, Dawn Song, Qian Wang , and Xiao Liang
CCS 2019
LVID: A Multimodal Biometrics Authentication System on Smartphones
Libing Wu, Jingxiao Yang, Man Zhou, Yanjiao Chen, and Qian Wang
IEEE Transactions on Information Forensics and Security 2019
When Mobile Crowdsensing Meets Privacy
Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang , Yanjun Li, and Honglong Chen
IEEE Communications Magazine 2019
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang , and Kui Ren
CCS 2019
advPattern: Physical-world Attacks on Deep Person Re-identification via Adversarially Transformable Patterns
Zhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang , Alireza Rahimpour, and Hairong Qi
ICCV 2019
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures
Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang , and Cong Wang
IEEE Communications Magazine 2019
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars
Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang , and Kui Ren
IEEE Wireless Communications 2019
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum
Yanjiao Chen, Xin Tian, Qian Wang , Minghui Li, Minxin Du, and Qi Li
IEEE Transactions on Mobile Computing 2019
Note:
has corrected some typos of the journal version published in IEEE TMC 2019.
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction
Shuangke Wu, Yanjiao Chen, Qian Wang , Minghui Li, Cong Wang, and Xiangyang Luo
IEEE Transactions on Information Forensics and Security 2019
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server
Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajie Shao, Qian Wang , Libing Wu, Honglong Chen, and Hairong Qi
IEEE Transactions on Mobile Computing 2019
Personalized Privacy-preserving Task Allocation for Mobile Crowdsensing
Zhibo Wang, Jiahui Hu, Ruizhao Lv, Jian Wei, Qian Wang , Dejun Yang, and Hairong Qi
IEEE Transactions on Mobile Computing 2019
Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum
Qian Wang , Jing Huang, Yanjiao Chen, Xin Tian, and Qian Zhang
IEEE/ACM Transactions on Networking 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones
Qian Wang , Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, and Xiangyang Luo
Hardening Database Padding for Searchable Encryption
Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang , and Chungen Xu
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning
Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang , and Hairong Qi
A Context-Aware User-Item Representation Learning for Item Recommendation
Libing Wu, Cong Quan, Chenliang Li, Qian Wang , Bolong Zheng, and Xiangyang Luo
ACM Transactions on Information Systems 2019
DeepCrack: Learning Hierarchical Convolutional Features for Crack Detection
Qin Zou, Zheng Zhang, Qingquan Li, Xianbiao Qi, Qian Wang , and Song Wang
IEEE Transactions on Image Processing 2019
[
PDF ,
BIB ]
(ESI Highly Cited Paper)
Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones
Man Zhou, Qian Wang , Kui Ren, Dimitrios Koutsonikolas, Lu Su, and Yanjiao Chen
IEEE Transactions on Mobile Computing 2019
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
Qian Wang , Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, and Xiangyang Luo
IEEE Transactions on Information Forensics and Security 2019
Task Bundling Based Incentive for Location-dependent Mobile Crowdsourcing
Zhibo Wang, Jiahui Hu, Qian Wang , Ruizhao Lv, Jian Wei, Honglong Chen, and Xiaoguang Niu
IEEE Communications Magazine 2019
2018 Enabling Online Robust Barcode-based Visible Light Communication with Realtime Feedback
Man Zhou, Qian Wang , Tao Lei, Zhibo Wang, and Kui Ren
IEEE Transactions on Wireless Communications 2018
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training
Qian Wang , Minxin Du, Xiuying Chen, Yanjiao Chen, Pan Zhou, Xiaofeng Chen, and Xinyi Huang
IEEE Transactions on Knowledge and Data Engineering 2018
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals
Man Zhou, Qian Wang , Jingxiao Yang, Qi Li, Xiao Feng, Zhibo Wang, and Xiaofeng Chen
CCS 2018
Outsourced Biometric Identification with Privacy
Shengshan Hu, Minghui Li, Qian Wang , Sherman S. M. Chow, and Minxin Du
IEEE Transactions on Information Forensics and Security 2018
Privacy-preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
Minxin Du, Qian Wang , Meiqi He, and Jian Weng
IEEE Transactions on Information Forensics and Security 2018
Ensuring Minimum Requirement in Matching-based Spectrum Allocation
Yanjiao Chen, Yuxuan Xiong, Qian Wang , Xiaoyan Yin, and Baochun Li
IEEE Transactions on Mobile Computing 2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang , and Kui Ren
IEEE Transactions on Parallel and Distributed Systems 2018
Differentially Private Distributed Online Learning
Chencheng Li, Pan Zhou, Li Xiong, Qian Wang and Ting Wang
IEEE Transactions on Knowledge and Data Engineering 2018
Dating Ancient Paintings of Mogao Grottoes Using Deeply Learnt Visual Codes
Qingquan Li, Qin Zou, De Ma, Qian Wang , and Song Wang
SCIENCE CHINA Information Sciences 2018
Pay On-demand: Dynamic Incentive and Task Selection for Location-dependent Mobile Crowdsensing Systems
Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang, Honglong Chen, and Qian Wang
ICDCS 2018
Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy
Qian Wang , Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren
IEEE Transactions on Dependable and Secure Computing 2018
[
PDF ,
BIB ]
(ESI Highly Cited Paper)
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
Zhengwei Ren, Lina Wang, Qian Wang , and Mingdi Xu
IEEE Transactions on Services Computing 2018
Searchable Encryption over Feature-Rich Data
Qian Wang , Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, and Qin Zou
IEEE Transactions on Dependable and Secure Computing 2018<di
[
PDF ,
BIB ]
(ESI Highly Cited Paper)
Robust Gait Recognition by Integrating Inertial and RGBD Sensors
Qin Zou, Lihao Ni, Qian Wang , Qingquan Li, and Song Wang
IEEE Transactions on Cybernetics 2018
InstantCryptoGram: Secure Image Retrieval Service
Minghui Li, Mingxue Zhang, Qian Wang , Sherman S. M. Chow, Minxin Du, Yanjiao Chen, and Chenliang Li
INFOCOM 2018
(Won the Best-in-Session Presentation Award)
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization
Shengshan Hu, Chengjun Cai, Qian Wang , Cong Wang, Xiangyang Luo, and Kui Ren
INFOCOM 2018
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy
Lingchen Zhao, Lihao Ni, Shengshan Hu, Yanjiao Chen, Fu Xiao, Pan Zhou, and Libing Wu
INFOCOM 2018
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks
Zhibo Wang, Yongquan Zhang, Honglong Chen, Zhetao Li, and Feng Xia
INFOCOM 2018
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications
Xiaoting Tang, Cong Wang, Xingliang Yuan, and Qian Wang
INFOCOM 2018
2017 POSTER: Enabling Secure Location Authentication in Drone
Feng Xiao, Man Zhou, Youcheng Liye, Jingxiao Yang, and Qian Wang
MobiCom 2017 (Poster Session)
Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources
Wei Song, Bing Wang, Qian Wang , Chengliang Shi, Wenjing Lou, and Zhiyong Peng
IEEE Transactions on Information Forensics and Security 2017
Stable Matching for Spectrum Market with Guaranteed Minimum Requirement
Yanjiao Chen, Yuxuang Xiong, Qian Wang , Xiaoyuan Yin, and Baochun Li
MobiHoc 2017
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang , Jian Weng, Lu Su, and Aziz Mohaisen
ICDCS 2017
(Won the Best Student Paper Award)
THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply
Qian Wang , Qihang Sun, and Kui Ren
IEEE Transactions on Mobile Computing 2017
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
Qian Wang , Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen
Financial Cryptography and Data Security 2017
Learning Privately: Privacy-Preserving Canonical Correlation Analysis for Cross-Media Retrieval
Qian Wang , Shengshan Hu, Minxin Du, Jingjun Wang, and Kui Ren
INFOCOM 2017
Exploiting Social Influence for Context-Aware Event Recommendation in Event-based Social Networks
Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang , and Feng Xia
INFOCOM 2017
Local Pattern Collocations Using Regional Co-occurrence Factorization
Qin Zou, Lihao Ni, Qian Wang , Qingquan Li, and Song Wang
IEEE Transactions on Multimedia 2017
2016 Messages Behind the Sound: Real-Time Hidden Acoustic Signal Capture with Smartphones
Qian Wang , Kui Ren, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, and Lu Su
MobiCom 2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks
Qian Wang , Kui Ren, Peng Ning, and Shengshan Hu
IEEE Transactions on Vehicular Technology 2016
Securing Fast Learning! Ridge Regression over Encrypted Big Data
Shengshan Hu, Qian Wang , Jingjun Wang, Sherman S. M. Chow, and Qin Zou
TrustCom 2016
(Won the Best Paper Award)
Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
Shengshan Hu, Qian Wang , Jingjun Wang, Zhan Qin, and Kui Ren
IEEE Transactions on Image Processing 2016
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor
Qian Wang , Shengshan Hu, Jingjun Wang, and Kui Ren
ICDCS 2016
Catch Me in the Dark: Effective Privacy-preserving Outsourcing of Feature Extractions over Image Data
Qian Wang , Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, and Minxin Du
INFOCOM 2016
RescueDP: Real-time Spatio-temporal Crowd-sourced Data Publishing with Differential Privacy
Qian Wang , Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren
INFOCOM 2016
2015 Deep Learning Based Feature Selection for Remote Sensing Scene Classification
Qin Zou, Lihao Ni, Tong Zhang, and Qian Wang
IEEE Geoscience and Remote Sensing Letters 2015
(ESI Highly Cited Paper)
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
Qian Wang , Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, and Zhibo Wang
ESORICS 2015
Note: the
has appeared in IEEE TIFS 2018, and presents significantly improved constructions
(for single-server and multi-server solutions) and a complete rewrite and evaluation.
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice
Qian Wang , Kui Ren, Guancheng Li, Chengbo Xia, Zhibo Wang, and Qin Zou
CCS 2015
RainBar: Robust Application-Driven Visual Communication Using Color Barcodes
Qian Wang , Man Zhou, Kui Ren, Tao Lei, Jikun Li, and Zhibo Wang
ICDCS 2015
2014 Securing Emerging Short Range Wireless Communications: The State of the Art
Kui Ren, Qian Wang , and Di Ma
IEEE Wireless Communications 2014
Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply
Qihang Sun, Qian Wang , and Kui Ren
ICNP 2014
2013 Opportunistic Spectrum Access: from Stochastic Channels to Non-Stochastic Channels
Kui Ren, and Qian Wang
IEEE Wireless Communications 2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Cong Wang, Kui Ren, Jia Wang, and Qian Wang
IEEE Transactions on Parallel and Distributed Systems 2013
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang, Sherman S. M. Chow, Qian Wang , Kui Ren, and Wenjing Lou
IEEE Transactions on Computers 2013
(ESI Highly Cited Paper)
Popular Articles of IEEE TC (Top 1 most frequently downloaded articles, as of Nov. 2016) Most Cited Articles of IEEE TC (Top 4 most frequently cited articles, as of Nov. 2016) Proof-carrying Cloud Computation: The Case of Convex Optimization
Zhen Xu, Cong Wang, Qian Wang , Kui Ren, and Lingyu Wang
INFOCOM MINI 2013
2012 Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels
Qian Wang , Kaihe Xu, and Kui Ren
IEEE Journal on Selected Areas in Communications 2012
Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication
Qian Wang , Ping Xu, Kui Ren, and Xiang-Yang Li
IEEE Journal on Selected Areas in Communications 2012
When Cloud Meets eBay: Towards Effective Pricing for Cloud Computing
Qian Wang , Kui Ren, and Xiaoqiao Meng
INFOCOM 2012
Toward Secure and Dependable Storage Services in Cloud Computing
Cong Wang, Qian Wang , Kui Ren, and Wenjing Lou
IEEE Transactions on Service Computing 2012
(ESI Highly Cited Paper)
Toward Secure and Effective Data Utilization in Public Cloud
Kui Ren, Cong Wang, and Qian Wang
IEEE Network 2012
Security Challenges for the Public Cloud
Kui Ren, Cong Wang, and Qian Wang
IEEE Internet Computing 2012
(ESI Highly Cited Paper)
2011 Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang , Cong Wang, Kui Ren, Wenjing Lou, and Jin Li
IEEE Transactions on Parallel and Distributed Systems 2011
(ESI Highly Cited Paper)
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Qian Wang , Kui Ren, Shucheng Yu, and Wenjing Lou
ACM Transactions on Sensor Networks 2011
Anti-Jamming Communication in Cognitive Radio Networks with Unknown Channel Statistics
Qian Wang , Kui Ren, and Peng Ning
ICNP 2011
(Won the Best Paper Award)
Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks
Qian Wang , Hai Su, Kui Ren, and Kwangjo Kim
INFOCOM 2011
Delay-Bounded Adaptive UFH-based Anti-Jamming Wireless Communication
Qian Wang , Ping Xu, Kui Ren, and Xiang-Yang Li
INFOCOM 2011
Secret Key Generation Exploiting Channel Characteristics in Wireless Communications
Kui Ren, Hai Su, and Qian Wang
IEEE Wireless Communications 2011
2010 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang, Qian Wang , Kui Ren, and Wenjing Lou
INFOCOM 2010
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li, Qian Wang , Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou
INFOCOM MINI 2010
2009 Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang , Cong Wang, Jin Li, Kui Ren, and Wenjing Lou
ESORICS 2009
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Qian Wang , Kui Ren, Wenjing Lou, and Yanchao Zhang
INFOCOM 2009
Ensuring Data Storage Security in Cloud Computing
Cong Wang, Qian Wang , Kui Ren, and Wenjing Lou
IWQoS 2009