Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
83 2017 Secure -NN Query on Encrypted Cloud Data with Multiple Keys K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong
IEEE Transactions on Big Data 7 (4), 689-702, 2017
82 2017 Viaf: Verification-based integrity assurance framework for mapreduce Y Wang, J Wei
2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011
77 2011 Special issue on security and privacy in network computing H Wang, Y Wang, T Taleb, X Jiang
World Wide Web 23, 951-957, 2020
74 2020 Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
58 2016 Result integrity check for MapReduce computation on hybrid clouds Y Wang, J Wei, M Srivatsa
2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013
30 2013 IntegrityMR: Integrity assurance framework for big data analytics and management applications Y Wang, J Wei, M Srivatsa, Y Duan, W Du
2013 IEEE International Conference on Big Data, 33-40, 2013
29 2013 CryptSQLite: SQLite with high data security Y Wang, Y Shen, C Su, J Ma, L Liu, X Dong
IEEE Transactions on Computers 69 (5), 666-678, 2019
28 2019 Strongly secure and efficient range queries in cloud databases under multiple keys K Cheng, Y Shen, Y Wang, L Wang, J Ma, X Jiang, C Su
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2494-2502, 2019
25 2019 Toward protecting control flow confidentiality in cloud-based computation Y Wang, J Wei
Computers & Security 52, 106-127, 2015
16 2015 A lightweight auction framework for spectrum allocation with strong security guarantees K Cheng, L Wang, Y Shen, Y Liu, Y Wang, L Zheng
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1708-1717, 2020
15 2020 Cfhider: Control flow obfuscation with intel sgx Y Wang, Y Shen, C Su, K Cheng, Y Yang, AN Faree, Y Liu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 541-549, 2019
15 2019 Trustworthy service composition with secure data transmission in sensor networks T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
15 2018 CryptSQLite: Protecting data confidentiality of SQLite with intel SGX Y Wang, L Liu, C Su, J Ma, L Wang, Y Yang, Y Shen, G Li, T Zhang, ...
2017 International Conference on Networking and Network Applications (NaNA …, 2017
11 2017 Toward integrity assurance of outsourced computing—a game theoretic perspective Y Wang, J Wei, S Ren, Y Shen
Future Generation Computer Systems 55, 87-100, 2016
11 2016 Exploiting Content Delivery Networks for covert channel communications Y Wang, Y Shen, X Jiao, T Zhang, X Si, A Salem, J Liu
Computer Communications 99, 84-92, 2017
9 2017 Cross cloud MapReduce: A result integrity check framework on hybrid clouds Y Wang, J Wei, M Srivatsa
Int. J. Cloud Comput 1 (1), 26-39, 2013
9 2013 Practical verifiable computation–A MapReduce case study Y Wang, Y Shen, X Jiang
IEEE Transactions on Information Forensics and Security 13 (6), 1376-1391, 2017
7 2017 Exploring cloud service brokering from an interface perspective Y Duan, NC Narendra, W Du, Y Wang, N Zhou
2014 IEEE international conference on web services, 329-336, 2014
7 2014 Securing MapReduce result integrity via verification-based integrity assurance framework Y Wang, J Wei, Y Duan
Int. J. Grid Distrib. Comput 7 (6), 53-70, 2014
6 2014