default search action
Cong Wang 0001
王聰
Person information
- unicode name: 王聰
- affiliation: City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation (until 2012): Illinois Institute of Technology, Chicago, IL, USA
Other persons with the same name
- Cong Wang — disambiguation page
- Cong Wang 0002 — Simon Fraser University, Burnaby, Canada
- Cong Wang 0003 — Beijing University of Posts and Telecommunications, School of Software Engineering, China
- Cong Wang 0004 — Tianjin University of Science and Technology, College of Computer Science and Information Engineering, China (and 1 more)
- Cong Wang 0005 — Harbin Institute of Technology, School of Electronics and Information Engineering, China (and 1 more)
- Cong Wang 0006 — George Mason University, USA (and 2 more)
- Cong Wang 0007 — Shandong University, School of Control Science and Engineering, Jinan, China (and 3 more)
- Cong Wang 0008 — Army Engineering University of PLA, College of Communications Engineering, Nanjing, China
- Cong Wang 0009 — Northeastern University at Qinhuangdao, School of Computer and Communication Engineering, China
- Cong Wang 0010 — École Polytechnique Fédérale de Lausanne, Switzerland
- Cong Wang 0011 — Southeast University, National Mobile Commutation Research Laboratory, Nanjing, China (and 1 more)
- Cong Wang 0012 — University of California Santa Cruz, CA, USA (and 2 more)
- Cong Wang 0013 — Northwestern Polytechnical University, School of Computer Science, Shaanxi Provincial Key Laboratory of Speech and Image Information Processing, Xi'an, China
- Cong Wang 0014 — University of North Carolina at Chapel Hill, NC, USA (and 1 more)
- Cong Wang 0015 — New Jersey Institute of Technology, Newark, NJ, USA (and 1 more)
- Cong Wang 0016 — Wright State University, Dayton, OH, USA
- Cong Wang 0017 — Tianjin University, College of Intelligence and Computing, China
- Cong Wang 0018 — Hong Kong Polytechnic University, Department of Computing, Hong Kong (and 1 more)
- Cong Wang 0019 — Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Cong Wang 0020 — Tsinghua University, School of Software, KLISS, BNRist, Beijing, China
- Cong Wang 0021 — University of Queensland, Queensland Brain Institute, Saint Lucia, QLD, Australia (and 1 more)
- Cong Wang 0022 — Macquarie University, Department of Economics, Sydney, NSW, Australia
- Cong Wang 0023 — Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Cong Wang 0024 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 1 more)
- Cong Wang 0025 — Singapore-MIT Alliance for Research and Technology, Singapore (and 1 more)
- Cong Wang 0026 — Tianjin University, School of Electrical and Information Engineering, China (and 1 more)
- Cong Wang 0027 — Chinese Academy of Sciences, Shenyang Institute of Automation, China (and 1 more)
- Cong Wang 0028 — Nanjing University of Aeronautics and Astronautics, Department of Biomedical Engineering, China
- Cong Wang 0029 — Capital Normal University, School of Mathematical Sciences, Beijing, China (and 1 more)
- Cong Wang 0030 — China University of Mining and Technology, School of Mechanical, Electronic and Information Engineering, Beijing, China
- Cong Wang 0031 — Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, Jiangsu Key Laboratory of Medical Optics, China (and 1 more)
- Cong Wang 0032 (aka: Cherry Cong Wang) — University of Washington, Information School, Seattle, WA, USA
- Cong Wang 0033 — Northwestern Polytechnical University, School of Artificial Intelligence, OPtics and ElectroNics, iOPEN, Xi'an, China (and 2 more)
- Cong Wang 0034 — Nanjing University, State Key Laboratory for Novel Software Technology, Nanjing, China
- Cong Wang 0035 — Jilin University, College of Communication Engineering, Changchun, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j128]Lei Xu, Jiaqing Chen, Shan Chang, Cong Wang, Bo Li:
Toward Quality-Aware Data Valuation in Learning Algorithms: Practices, Challenges, and Beyond. IEEE Netw. 38(5): 213-219 (2024) - [j127]Zhengxiang Zhou, Cong Wang:
ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation. IEEE Open J. Comput. Soc. 5: 95-106 (2024) - [j126]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. Proc. VLDB Endow. 17(10): 2445-2458 (2024) - [j125]Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. IEEE Trans. Dependable Secur. Comput. 21(2): 789-803 (2024) - [j124]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IEEE Trans. Dependable Secur. Comput. 21(4): 1918-1934 (2024) - [j123]Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia:
Machine Unlearning: Solutions and Challenges. IEEE Trans. Emerg. Top. Comput. Intell. 8(3): 2150-2168 (2024) - [j122]Yu Guo, Yu Zhao, Saihui Hou, Cong Wang, Xiaohua Jia:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. IEEE Trans. Inf. Forensics Secur. 19: 708-721 (2024) - [j121]Mingyue Wang, Zizhuo Chen, Yinbin Miao, Hejiao Huang, Cong Wang, Xiaohua Jia:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. IEEE Trans. Inf. Forensics Secur. 19: 1213-1226 (2024) - [j120]Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. IEEE Trans. Inf. Forensics Secur. 19: 3309-3323 (2024) - [j119]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Cong Wang:
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security. IEEE Trans. Inf. Forensics Secur. 19: 5999-6014 (2024) - [j118]Yuefeng Du, Anxin Zhou, Cong Wang:
DWare: Cost-Efficient Decentralized Storage With Adaptive Middleware. IEEE Trans. Inf. Forensics Secur. 19: 8529-8543 (2024) - [j117]Jie Xu, Sen Peng, Cong Wang, Xiaohua Jia:
PuffChain: A Dynamic Scaling Blockchain System With Optimal Effective Throughput. IEEE Trans. Netw. Sci. Eng. 11(3): 3199-3212 (2024) - [j116]Jie Xu, Yulong Ming, Zihan Wu, Cong Wang, Xiaohua Jia:
X-Shard: Optimistic Cross-Shard Transaction Processing for Sharding-Based Blockchains. IEEE Trans. Parallel Distributed Syst. 35(4): 548-559 (2024) - [j115]Zhongyun Hua, Yufei Yao, Mingyang Song, Yifeng Zheng, Yushu Zhang, Cong Wang:
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service. IEEE Trans. Serv. Comput. 17(3): 821-835 (2024) - [j114]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024) - [c109]Rui Lian, Yulong Ming, Chengjun Cai, Yifeng Zheng, Cong Wang, Xiaohua Jia:
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting. ESORICS (2) 2024: 247-267 - [c108]Yichen Zang, Chengjun Cai, Wentao Dong, Lei Xu, Cong Wang:
HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB. ICDCS 2024: 1260-1271 - [c107]Yi Liu, Cong Wang, Xingliang Yuan:
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning. KDD 2024: 1944-1955 - [c106]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Network by Analyzing Training Data. USENIX Security Symposium 2024 - [c105]Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen:
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. USENIX Security Symposium 2024 - [i44]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Networks by Analyzing Training Data. CoRR abs/2401.09740 (2024) - [i43]Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia:
LMEraser: Large Model Unlearning through Adaptive Prompt Tuning. CoRR abs/2404.11056 (2024) - [i42]Yi Liu, Cong Wang, Xingliang Yuan:
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning. CoRR abs/2406.12222 (2024) - [i41]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. CoRR abs/2407.15050 (2024) - 2023
- [j113]Zheng Zheng, Qian Wang, Cong Wang:
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones. IEEE Commun. Mag. 61(12): 213-219 (2023) - [j112]Jie Xu, Cong Wang, Xiaohua Jia:
A Survey of Blockchain Consensus Protocols. ACM Comput. Surv. 55(13s): 278:1-278:35 (2023) - [j111]Yanling Wang, Qian Wang, Lingchen Zhao, Cong Wang:
Differential privacy in deep learning: Privacy and beyond. Future Gener. Comput. Syst. 148: 408-424 (2023) - [j110]Zhengxiang Zhou, Cong Wang:
Practical Anti-Fuzzing Techniques With Performance Optimization. IEEE Open J. Comput. Soc. 4: 206-217 (2023) - [j109]Jing Yao, Xiangyi Meng, Yifeng Zheng, Cong Wang:
Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes. IEEE Trans. Cloud Comput. 11(2): 1854-1870 (2023) - [j108]Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au, Qian Wang:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 20(1): 708-723 (2023) - [j107]Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [j106]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. IEEE Trans. Dependable Secur. Comput. 20(2): 988-1001 (2023) - [j105]Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j104]Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j103]Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, Qi Li:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j102]Yu Guo, Chen Zhang, Cong Wang, Xiaohua Jia:
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain. IEEE Trans. Dependable Secur. Comput. 20(3): 2111-2126 (2023) - [j101]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
Optimizing Secure Decision Tree Inference Outsourcing. IEEE Trans. Dependable Secur. Comput. 20(4): 3079-3092 (2023) - [j100]Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang:
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services. IEEE Trans. Dependable Secur. Comput. 20(5): 4343-4358 (2023) - [j99]Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j98]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Qian Wang, Cong Wang:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2929-2944 (2023) - [j97]Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng. 35(4): 4236-4252 (2023) - [j96]Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, Cong Wang:
SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases. IEEE Trans. Knowl. Data Eng. 35(9): 8955-8967 (2023) - [j95]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service. IEEE Trans. Knowl. Data Eng. 35(10): 10478-10496 (2023) - [j94]Mingyue Wang, Yinbin Miao, Yu Guo, Hejiao Huang, Cong Wang, Xiaohua Jia:
AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems. IEEE Trans. Parallel Distributed Syst. 34(1): 92-107 (2023) - [j93]Jie Xu, Qingyuan Xie, Sen Peng, Cong Wang, Xiaohua Jia:
AdaptChain: Adaptive Scaling Blockchain With Transaction Deduplication. IEEE Trans. Parallel Distributed Syst. 34(6): 1909-1922 (2023) - [j92]Mingyue Wang, Yu Guo, Chen Zhang, Cong Wang, Hejiao Huang, Xiaohua Jia:
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. IEEE Trans. Serv. Comput. 16(1): 438-451 (2023) - [j91]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. IEEE Trans. Serv. Comput. 16(1): 656-669 (2023) - [j90]Sen Peng, Yufei Chen, Jie Xu, Zizhuo Chen, Cong Wang, Xiaohua Jia:
Intellectual property protection of DNN models. World Wide Web (WWW) 26(4): 1877-1911 (2023) - [c104]Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CCS 2023: 3003-3017 - [c103]Wentao Dong, Cong Wang:
Poster: Towards Lightweight TEE-Assisted MPC. CCS 2023: 3609-3611 - [c102]Peipei Jiang, Qian Wang, Yihao Wu, Cong Wang:
Poster: Metadata-private Messaging without Coordination. CCS 2023: 3615-3617 - [c101]Jiamin Li, Qiang Su, Yitao Yang, Yimin Jiang, Cong Wang, Hong Xu:
Adaptive Gating in Mixture-of-Experts based Language Models. EMNLP 2023: 3577-3587 - [c100]Jiamin Li, Hong Xu, Yibo Zhu, Zherui Liu, Chuanxiong Guo, Cong Wang:
Lyra: Elastic Scheduling for Deep Learning Clusters. EuroSys 2023: 835-850 - [c99]Xinyan Li, Yuefeng Du, Cong Wang:
RangeQC: A Query Control Framework for Range Query Leakage Quantification and Mitigation. ICDCS 2023: 749-759 - [c98]Yufei Cui, Ziquan Liu, Xiangyu Liu, Xue Liu, Cong Wang, Tei-Wei Kuo, Chun Jason Xue, Antoni B. Chan:
Bayes-MIL: A New Probabilistic Perspective on Attention-based Multiple Instance Learning for Whole Slide Images. ICLR 2023 - [c97]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [c96]Yanling Wang, Yuchen Liu, Qian Wang, Cong Wang, Chenliang Li:
Poisoning Self-supervised Learning Based Sequential Recommendations. SIGIR 2023: 300-310 - [c95]Jiamin Li, Yimin Jiang, Yibo Zhu, Cong Wang, Hong Xu:
Accelerating Distributed MoE Training and Inference with Lina. USENIX ATC 2023: 945-959 - [c94]Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang:
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation. USENIX Security Symposium 2023: 1307-1324 - [c93]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Cong Wang, Chao Shen:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [e5]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i40]Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia:
Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process. CoRR abs/2306.03436 (2023) - [i39]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. CoRR abs/2306.16851 (2023) - [i38]Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia:
Machine Unlearning: Solutions and Challenges. CoRR abs/2308.07061 (2023) - [i37]Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CoRR abs/2309.04697 (2023) - [i36]Jiamin Li, Qiang Su, Yitao Yang, Yimin Jiang, Cong Wang, Hong Xu:
Adaptive Gating in Mixture-of-Experts based Language Models. CoRR abs/2310.07188 (2023) - 2022
- [j89]Xinyu Tang, Cheng Guo, Yizhi Ren, Cong Wang, Kim-Kwang Raymond Choo:
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems. IEEE Syst. J. 16(2): 1717-1728 (2022) - [j88]Yifeng Zheng, Huayi Duan, Cong Wang, Ruochen Wang, Surya Nepal:
Securely and Efficiently Outsourcing Decision Tree Inference. IEEE Trans. Dependable Secur. Comput. 19(3): 1841-1855 (2022) - [j87]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. IEEE Trans. Dependable Secur. Comput. 19(5): 3038-3054 (2022) - [j86]Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, Liming Fang:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Trans. Dependable Secur. Comput. 19(5): 3055-3070 (2022) - [j85]Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. IEEE Trans. Dependable Secur. Comput. 19(5): 3149-3167 (2022) - [j84]Yu Guo, Hongcheng Xie, Cong Wang, Xiaohua Jia:
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services. IEEE Trans. Dependable Secur. Comput. 19(5): 3401-3416 (2022) - [j83]Chengjun Cai, Lei Xu, Anxin Zhou, Cong Wang:
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains. IEEE Trans. Dependable Secur. Comput. 19(6): 3640-3655 (2022) - [j82]Wanyu Lin, Baochun Li, Cong Wang:
Towards Private Learning on Decentralized Graphs With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 17: 2936-2946 (2022) - [j81]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. IEEE Trans. Inf. Forensics Secur. 17: 3582-3596 (2022) - [j80]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j79]Libin Liu, Hong Xu, Zhixiong Niu, Jingzong Li, Wei Zhang, Peng Wang, Jiamin Li, Chun Jason Xue, Cong Wang:
ScaleFlux: Efficient Stateful Scaling in NFV. IEEE Trans. Parallel Distributed Syst. 33(12): 4801-4817 (2022) - [j78]Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [j77]Yu Guo, Hongcheng Xie, Yinbin Miao, Cong Wang, Xiaohua Jia:
FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain. IEEE Trans. Serv. Comput. 15(4): 2060-2073 (2022) - [c92]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. CCS 2022: 441-454 - [c91]Yuefeng Du, Anxin Zhou, Cong Wang:
Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization. ICDCS 2022: 1133-1143 - [c90]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c89]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. INFOCOM 2022: 1749-1758 - [c88]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. NeurIPS 2022 - [c87]Zhengxiang Zhou, Cong Wang, Qingchuan Zhao:
No-Fuzz: Efficient Anti-fuzzing Techniques. SecureComm 2022: 731-751 - [c86]Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. SERVICES 2022: 14 - [c85]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. USENIX Security Symposium 2022: 3593-3610 - [c84]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [e4]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i35]Wanyu Lin, Baochun Li, Cong Wang:
Towards Private Learning on Decentralized Graphs with Local Differential Privacy. CoRR abs/2201.09398 (2022) - [i34]Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. CoRR abs/2202.01971 (2022) - [i33]Jiamin Li, Hong Xu, Yibo Zhu, Zherui Liu, Chuanxiong Guo, Cong Wang:
Aryl: An Elastic Cluster Scheduler for Deep Learning. CoRR abs/2202.07896 (2022) - [i32]Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li:
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining. CoRR abs/2203.07320 (2022) - [i31]Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. CoRR abs/2209.03526 (2022) - [i30]Yifeng Zheng, Weibo Wang, Songlei Wang, Xiaohua Jia, Hejiao Huang, Cong Wang:
SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases. CoRR abs/2209.07064 (2022) - [i29]Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. CoRR abs/2210.11334 (2022) - [i28]Jiamin Li, Yimin Jiang, Yibo Zhu, Cong Wang, Hong Xu:
Lita: Accelerating Distributed Training of Sparsely Activated Models. CoRR abs/2210.17223 (2022) - [i27]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. CoRR abs/2211.00463 (2022) - [i26]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IACR Cryptol. ePrint Arch. 2022: 894 (2022) - [i25]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. IACR Cryptol. ePrint Arch. 2022: 1115 (2022) - 2021
- [j76]Chen Zhang, Yu Guo, Xiaohua Jia, Cong Wang, Hongwei Du:
Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain. IEEE Internet Things J. 8(8): 6624-6636 (2021) - [j75]Minghui Li, Yuejing Yan, Qian Wang, Minxin Du, Zhan Qin, Cong Wang:
Secure Prediction of Neural Network in the Cloud. IEEE Netw. 35(1): 251-257 (2021) - [j74]Xinyan Li, Yufei Chen, Cong Wang, Chao Shen:
When Deep Learning Meets Differential Privacy: Privacy, Security, and More. IEEE Netw. 35(6): 148-155 (2021) - [j73]Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021)