


default search action
Jie Wu 0001
- > Home > Persons > Jie Wu 0001
Publications
- 2024
- [j524]Qin Liu
, Yu Peng
, Qian Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
, Shaobo Zhang
:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. IEEE Trans. Dependable Secur. Comput. 21(4): 1994-2011 (2024) - [j522]Qin Liu
, Yu Peng
, Ziyi Tang
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases. IEEE Trans. Knowl. Data Eng. 36(5): 2285-2300 (2024) - [j521]Qin Liu
, Yu Peng
, Mingzuo Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain. IEEE Trans. Knowl. Data Eng. 36(7): 3297-3311 (2024) - [j515]Qin Liu
, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing. IEEE Trans. Mob. Comput. 23(5): 4181-4195 (2024) - [j513]Shulan Wang
, Qin Liu
, Yang Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning. IEEE Trans. Mob. Comput. 23(6): 6522-6537 (2024) - 2023
- [j481]Qin Liu
, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. IEEE Trans. Dependable Secur. Comput. 20(5): 4359-4371 (2023) - 2022
- [j464]Qin Liu
, Liqiong Chen, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks. Ad Hoc Networks 124: 102727 (2022) - [j462]Xiaoyu Zhu
, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo
, Fang Qi, Qin Liu, Guojun Wang
:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j461]Qin Liu, Guojun Wang, Jiankun Hu, Jie Wu:
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications. Future Gener. Comput. Syst. 133: 169-170 (2022) - [j432]Qin Liu
, Yue Tian
, Jie Wu
, Tao Peng
, Guojun Wang
:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. IEEE Trans. Serv. Comput. 15(1): 69-82 (2022) - [j431]Qin Liu
, Yu Peng
, Shuyu Pei, Jie Wu
, Tao Peng
, Guojun Wang
:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. IEEE Trans. Serv. Comput. 15(4): 1799-1812 (2022) - [c610]Qin Liu, Jiamin Yang, Hongbo Jiang, Jie Wu, Tao Peng, Tian Wang, Guojun Wang:
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark. INFOCOM 2022: 590-599 - 2021
- [j420]Qin Liu
, Zhengzheng Hao, Yu Peng
, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, Shaobo Zhang
:
SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems. J. Syst. Archit. 120: 102300 (2021) - [j402]Qin Liu
, Yu Peng
, Jie Wu
, Tian Wang
, Guojun Wang
:
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing. IEEE Trans. Netw. Serv. Manag. 18(2): 2046-2062 (2021) - [c586]Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. TrustCom 2021: 420-427 - 2020
- [j378]Qin Liu, Md. Zakirul Alam Bhuiyan, Jiankun Hu
, Jie Wu:
Preface: Security & privacy in social big data. J. Parallel Distributed Comput. 141: 59-60 (2020) - 2019
- [j355]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang
, Qin Liu:
Efficient Authentication of Multi-Dimensional Top-k Queries. IEEE Access 7: 4748-4762 (2019) - 2018
- [c530]Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding. CNS 2018: 1-9 - [c502]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server. IWQoS 2018: 1-6 - [c494]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Skyline Query over Road Networks. SpaCCS 2018: 72-83 - [c493]Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:
Achieving Secure and Effective Search Services in Cloud Computing. TrustCom/BigDataSE 2018: 1386-1391 - 2017
- [j313]Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:
Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59: 153-164 (2017) - [j306]Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
Dynamic access policy in cloud-based personal health record (PHR) systems. Inf. Sci. 379: 62-81 (2017) - [j305]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Effective Query Grouping Strategy in Clouds. J. Comput. Sci. Technol. 32(6): 1231-1249 (2017) - [j286]Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, Jie Wu:
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Trans. Parallel Distributed Syst. 28(5): 1417-1429 (2017) - [c483]Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu:
DABKS: Dynamic attribute-based keyword search in cloud computing. ICC 2017: 1-6 - [c456]Qin Liu, Xiaohong Nie, Xuhui Liu, Tao Peng, Jie Wu:
Verifiable Ranked Search over dynamic encrypted data in cloud computing. IWQoS 2017: 1-6 - 2015
- [c402]Qin Liu, Guojun Wang, Jie Wu, Wei Chang:
User-Controlled Security Mechanism in Data-Centric Clouds. HPCC/CSS/ICESS 2015: 647-653 - [c399]Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems. ICA3PP (3) 2015: 562-576 - 2014
- [j212]Qin Liu, Guojun Wang, Jie Wu:
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258: 355-370 (2014) - [j202]Qin Liu, Guojun Wang, Jie Wu:
Consistency as a Service: Auditing Cloud Consistency. IEEE Trans. Netw. Serv. Manag. 11(1): 25-35 (2014) - [j195]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Towards Differential Query Services in Cost-Efficient Clouds. IEEE Trans. Parallel Distributed Syst. 25(6): 1648-1658 (2014) - 2013
- [c310]Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. INFOCOM 2013: 2886-2894 - 2012
- [j169]Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3): 927-933 (2012) - [j166]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Cooperative private searching in clouds. J. Parallel Distributed Comput. 72(8): 1019-1031 (2012) - [c288]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Dynamic Grouping Strategy in Cloud Computing. CGC 2012: 59-66 - [c274]Qin Liu, Guojun Wang, Jie Wu:
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds. ICPP Workshops 2012: 304-305 - [c271]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Efficient information retrieval for ranked queries in cost-effective cloud environments. INFOCOM 2012: 2581-2585 - 2011
- [j157]Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5): 320-331 (2011) - [j156]Guojun Wang, Qin Liu, Jie Wu:
Achieving fine-grained access control for secure data sharing on cloud servers. Concurr. Comput. Pract. Exp. 23(12): 1443-1464 (2011) - [c257]Chiu C. Tan, Qin Liu, Jie Wu:
Secure Locking for Untrusted Clouds. IEEE CLOUD 2011: 131-138 - [c251]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Reliable Re-Encryption in Unreliable Clouds. GLOBECOM 2011: 1-5 - 2010
- [c233]Qin Liu, Guojun Wang, Jie Wu:
Efficient Sharing of Secure Cloud Storage Services. CIT 2010: 922-929 - [c232]Guojun Wang, Qin Liu, Jie Wu:
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. CCS 2010: 735-737 - 2009
- [c206]Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. CSE (2) 2009: 715-720

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-06 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint