Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing Y Zheng, H Duan, C Wang IEEE Transactions on Information Forensics and Security 13 (10), 2475-2489, 2018 | 158 | 2018 |
Privacy-aware and efficient mobile crowdsensing with truth discovery Y Zheng, H Duan, X Yuan, C Wang IEEE Transactions on Dependable and Secure Computing 17 (1), 121-133, 2017 | 115 | 2017 |
LightBox: Full-stack protected stateful middlebox at lightning speed H Duan, C Wang, X Yuan, Y Zhou, Q Wang, K Ren Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 102* | 2019 |
Enabling secure and efficient decentralized storage auditing with blockchain Y Du, H Duan, A Zhou, C Wang, MH Au, Q Wang IEEE Transactions on Dependable and Secure Computing 19 (5), 3038-3054, 2021 | 70 | 2021 |
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization H Duan, Y Zheng, Y Du, A Zhou, C Wang, MH Au 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 67 | 2019 |
Towards secure and efficient outsourcing of machine learning classification Y Zheng, H Duan, C Wang Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 45 | 2019 |
Denoising in the dark: Privacy-preserving deep neural network-based image denoising Y Zheng, H Duan, X Tang, C Wang, J Zhou IEEE Transactions on Dependable and Secure Computing 18 (3), 1261-1275, 2019 | 41 | 2019 |
Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption L Xu, H Duan, A Zhou, X Yuan, C Wang IEEE Transactions on Information Forensics and Security 16, 5310-5325, 2021 | 32 | 2021 |
Securely and efficiently outsourcing decision tree inference Y Zheng, H Duan, C Wang, R Wang, S Nepal IEEE Transactions on Dependable and Secure Computing 19 (3), 1841-1855, 2020 | 32 | 2020 |
Towards privacy-assured and lightweight on-chain auditing of decentralized storage Y Du, H Duan, A Zhou, C Wang, MH Au, Q Wang 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 31 | 2020 |
Treasure collection on foggy islands: Building secure network archives for Internet of Things H Duan, Y Zheng, C Wang, X Yuan IEEE Internet of Things Journal 6 (2), 2637-2650, 2018 | 26 | 2018 |
Bringing execution assurances of pattern matching in outsourced middleboxes X Yuan, H Duan, C Wang 2016 IEEE 24th International Conference on Network Protocols (ICNP), 1-10, 2016 | 23 | 2016 |
Tutorial: building secure and trustworthy blockchain applications C Cai, H Duan, C Wang 2018 IEEE Cybersecurity Development (SecDev), 120-121, 2018 | 21 | 2018 |
Towards practical auditing of dynamic data in decentralized storage H Duan, Y Du, L Zheng, C Wang, MH Au, Q Wang IEEE Transactions on Dependable and Secure Computing 20 (1), 708-723, 2022 | 20 | 2022 |
SPEED: Accelerating enclave applications via secure deduplication H Cui, H Duan, Z Qin, C Wang, Y Zhou 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 19 | 2019 |
Assuring string pattern matching in outsourced middleboxes X Yuan, H Duan, C Wang IEEE/ACM Transactions on Networking 26 (3), 1362-1375, 2018 | 18 | 2018 |
Towards verifiable performance measurement over in-the-cloud middleboxes X Zhang, H Duan, C Wang, Q Li, J Wu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1162-1170, 2019 | 13 | 2019 |
pRide: Private ride request for online ride hailing service with secure hardware enclave Y Luo, X Jia, H Duan, C Wang, M Xu, S Fu Proceedings of the International Symposium on Quality of Service, 1-10, 2019 | 10 | 2019 |
Secure hashing-based verifiable pattern matching F Chen, D Wang, R Li, J Chen, Z Ming, AX Liu, H Duan, C Wang, J Qin IEEE Transactions on Information Forensics and Security 13 (11), 2677-2690, 2018 | 10 | 2018 |
A Formal Framework for End-to-End DNS Resolution S Liu, H Duan, L Heimes, M Bearzi, J Vieli, D Basin, A Perrig Proceedings of the ACM SIGCOMM 2023 Conference, 932-949, 2023 | 8 | 2023 |