


default search action
Jie Wu 0001
- > Home > Persons > Jie Wu 0001
Publications
- 2024
- [j524]Qin Liu
, Yu Peng
, Qian Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
, Shaobo Zhang
:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. IEEE Trans. Dependable Secur. Comput. 21(4): 1994-2011 (2024) - [j522]Qin Liu
, Yu Peng
, Ziyi Tang
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases. IEEE Trans. Knowl. Data Eng. 36(5): 2285-2300 (2024) - [j521]Qin Liu
, Yu Peng
, Mingzuo Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain. IEEE Trans. Knowl. Data Eng. 36(7): 3297-3311 (2024) - [j515]Qin Liu
, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing. IEEE Trans. Mob. Comput. 23(5): 4181-4195 (2024) - [j513]Shulan Wang
, Qin Liu
, Yang Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning. IEEE Trans. Mob. Comput. 23(6): 6522-6537 (2024) - 2023
- [j481]Qin Liu
, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. IEEE Trans. Dependable Secur. Comput. 20(5): 4359-4371 (2023) - [e5]Guojun Wang
, Kim-Kwang Raymond Choo
, Jie Wu
, Ernesto Damiani
:
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1768, Springer 2023, ISBN 978-981-99-0271-2 [contents] - 2022
- [j464]Qin Liu
, Liqiong Chen, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks. Ad Hoc Networks 124: 102727 (2022) - [j462]Xiaoyu Zhu
, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo
, Fang Qi, Qin Liu, Guojun Wang
:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j461]Qin Liu, Guojun Wang, Jiankun Hu, Jie Wu:
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications. Future Gener. Comput. Syst. 133: 169-170 (2022) - [j432]Qin Liu
, Yue Tian
, Jie Wu
, Tao Peng
, Guojun Wang
:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. IEEE Trans. Serv. Comput. 15(1): 69-82 (2022) - [j431]Qin Liu
, Yu Peng
, Shuyu Pei, Jie Wu
, Tao Peng
, Guojun Wang
:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. IEEE Trans. Serv. Comput. 15(4): 1799-1812 (2022) - [c610]Qin Liu, Jiamin Yang, Hongbo Jiang, Jie Wu, Tao Peng, Tian Wang, Guojun Wang:
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark. INFOCOM 2022: 590-599 - 2021
- [j420]Qin Liu
, Zhengzheng Hao, Yu Peng
, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, Shaobo Zhang
:
SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems. J. Syst. Archit. 120: 102300 (2021) - [j410]Peike Xia, Wenjun Jiang
, Jie Wu, Surong Xiao, Guojun Wang:
Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level. ACM Trans. Knowl. Discov. Data 15(4): 68:1-68:29 (2021) - [j402]Qin Liu
, Yu Peng
, Jie Wu
, Tian Wang
, Guojun Wang
:
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing. IEEE Trans. Netw. Serv. Manag. 18(2): 2046-2062 (2021) - [j393]Jifeng Zhang, Wenjun Jiang, Jinrui Zhang, Jie Wu, Guojun Wang:
Exploring Weather Data to Predict Activity Attendance in Event-based Social Network: From the Organizer's View. ACM Trans. Web 15(2): 10:1-10:25 (2021) - [j392]Wenjun Jiang
, Jing Chen, Xiaofei Ding, Jie Wu, Jiawei He, Guojun Wang:
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios. ACM Trans. Web 15(3): 13:1-13:33 (2021) - [c586]Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. TrustCom 2021: 420-427 - 2020
- [j382]Tian Wang
, Md. Zakirul Alam Bhuiyan
, Guojun Wang
, Lianyong Qi
, Jie Wu
, Thaier Hayajneh
:
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things. IEEE Internet Things J. 7(4): 2679-2689 (2020) - [j373]Md. Zakirul Alam Bhuiyan
, Jie Wu
, Gary M. Weiss
, Thaier Hayajneh
, Tian Wang
, Guojun Wang
:
Event Detection Through Differential Pattern Mining in Cyber-Physical Systems. IEEE Trans. Big Data 6(4): 652-665 (2020) - [j361]Chunli Huang, Wenjun Jiang
, Jie Wu, Guojun Wang:
Personalized Review Recommendation based on Users' Aspect Sentiment. ACM Trans. Internet Techn. 20(4): 42:1-42:26 (2020) - [c564]Xueqi Li
, Wenjun Jiang, Weiguang Chen, Jie Wu, Guojun Wang, Kenli Li:
Directional and Explainable Serendipity Recommendation. WWW 2020: 122-132 - 2019
- [j355]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang
, Qin Liu:
Efficient Authentication of Multi-Dimensional Top-k Queries. IEEE Access 7: 4748-4762 (2019) - [c562]Xueqi Li
, Wenjun Jiang, Weiguang Chen, Jie Wu, Guojun Wang:
HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity. CIKM 2019: 1503-1512 - 2018
- [j330]Entao Luo, Md. Zakirul Alam Bhuiyan
, Guojun Wang, Md. Arafatur Rahman
, Jie Wu, Mohammed Atiquzzaman
:
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems. IEEE Commun. Mag. 56(2): 163-168 (2018) - [j329]Tian Wang
, Md. Zakirul Alam Bhuiyan
, Guojun Wang, Md. Arafatur Rahman
, Jie Wu, Jiannong Cao:
Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring. IEEE Commun. Mag. 56(3): 128-133 (2018) - [c530]Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding. CNS 2018: 1-9 - [c502]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server. IWQoS 2018: 1-6 - [c494]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Skyline Query over Road Networks. SpaCCS 2018: 72-83 - [c493]Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:
Achieving Secure and Effective Search Services in Cloud Computing. TrustCom/BigDataSE 2018: 1386-1391 - 2017
- [j313]Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:
Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59: 153-164 (2017) - [j305]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Effective Query Grouping Strategy in Clouds. J. Comput. Sci. Technol. 32(6): 1231-1249 (2017) - [j299]Md. Zakirul Alam Bhuiyan
, Jie Wu, Guojun Wang, Tian Wang, Mohammad Mehedi Hassan:
e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems. ACM Trans. Auton. Adapt. Syst. 12(1): 1:1-1:29 (2017) - [j298]Md. Zakirul Alam Bhuiyan, Jie Wu, Guojun Wang, Jiannong Cao, Wenjun Jiang, Mohammed Atiquzzaman
:
Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities. ACM Trans. Cyber Phys. Syst. 1(4): 19:1-19:26 (2017) - [j297]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu, Jiannong Cao
, Xuefeng Liu, Tian Wang:
Dependable Structural Health Monitoring Using Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 14(4): 363-376 (2017) - [j296]Md. Zakirul Alam Bhuiyan
, Jie Wu, Guojun Wang, Zhigang Chen, Jianer Chen, Tian Wang:
Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Trans. Ind. Informatics 13(2): 572-583 (2017) - [j286]Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, Jie Wu:
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Trans. Parallel Distributed Syst. 28(5): 1417-1429 (2017) - [c487]Md. Zakirul Alam Bhuiyan, Guojun Wang, Tian Wang, Md. Arafatur Rahman
, Jie Wu:
Content-Centric Event-Insensitive Big Data Reduction in Internet of Things. GLOBECOM 2017: 1-6 - [c483]Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu:
DABKS: Dynamic attribute-based keyword search in cloud computing. ICC 2017: 1-6 - [c447]Md. Zakirul Alam Bhuiyan
, Mdaliuz Zaman, Guojun Wang, Tian Wang, Jie Wu:
Privacy-Protected Data Collection in Wireless Medical Sensor Networks. NAS 2017: 1-2 - 2016
- [j269]Wenjun Jiang
, Guojun Wang, Md. Zakirul Alam Bhuiyan
, Jie Wu:
Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges. ACM Comput. Surv. 49(1): 10:1-10:35 (2016) - [j263]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
Blood typing for families: a novel hybrid human-computer application. Int. J. Parallel Emergent Distributed Syst. 31(4): 354-376 (2016) - [j260]Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, Huanyang Zheng:
Trust Evaluation in Online Social Networks Using Generalized Network Flow. IEEE Trans. Computers 65(3): 952-963 (2016) - [j259]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics. IEEE Trans. Computers 65(4): 1211-1224 (2016) - [j256]Md. Zakirul Alam Bhuiyan
, Jie Wu, Guojun Wang, Jiannong Cao
:
Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring. IEEE Trans. Ind. Informatics 12(6): 2103-2114 (2016) - 2015
- [j232]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring. IEEE Trans. Computers 64(2): 382-395 (2015) - [j228]Wenjun Jiang
, Jie Wu, Guojun Wang:
On Selecting Recommenders for Trust Evaluation in Online Social Networks. ACM Trans. Internet Techn. 15(4): 14:1-14:21 (2015) - [c402]Qin Liu, Guojun Wang, Jie Wu, Wei Chang:
User-Controlled Security Mechanism in Data-Centric Clouds. HPCC/CSS/ICESS 2015: 647-653 - [c400]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. ICA3PP (3) 2015: 134-147 - [c371]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xiaofei Xing, Xiangyong Liu:
Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring. PRDC 2015: 91-98 - [i3]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao:
Dependable Structural Helath Monitoring Using Wireless Sensor Networks. CoRR abs/1509.06065 (2015) - 2014
- [j213]Wenjun Jiang, Guojun Wang, Jie Wu:
Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. 31: 48-58 (2014) - [j212]Qin Liu, Guojun Wang, Jie Wu:
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258: 355-370 (2014) - [j202]Qin Liu, Guojun Wang, Jie Wu:
Consistency as a Service: Auditing Cloud Consistency. IEEE Trans. Netw. Serv. Manag. 11(1): 25-35 (2014) - [j201]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Sensor Placement with Multiple Objectives for Structural Health Monitoring. ACM Trans. Sens. Networks 10(4): 68:1-68:45 (2014) - [j197]Guojun Wang, Md. Zakirul Alam Bhuiyan
, Jiannong Cao
, Jie Wu:
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 25(4): 939-949 (2014) - [j195]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Towards Differential Query Services in Cost-Efficient Clouds. IEEE Trans. Parallel Distributed Syst. 25(6): 1648-1658 (2014) - [j193]Guojun Wang, Wenjun Jiang, Jie Wu, Zhengli Xiong:
Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2286-2296 (2014) - [c352]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. INFOCOM 2014: 1707-1715 - 2013
- [j179]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
User requirements-aware security ranking in SSL protocol. J. Supercomput. 64(3): 762-776 (2013) - [c310]Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. INFOCOM 2013: 2886-2894 - [c298]Wenjun Jiang, Jie Wu, Guojun Wang:
RATE: Recommendation-aware Trust Evaluation in Online Social Networks. NCA 2013: 149-152 - [c296]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events. SECON 2013: 194-202 - [c295]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Local Monitoring and Maintenance for Operational Wireless Sensor Networks. TrustCom/ISPA/IUCC 2013: 837-844 - 2012
- [j169]Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3): 927-933 (2012) - [j166]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Cooperative private searching in clouds. J. Parallel Distributed Comput. 72(8): 1019-1031 (2012) - [c288]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Dynamic Grouping Strategy in Cloud Computing. CGC 2012: 59-66 - [c274]Qin Liu, Guojun Wang, Jie Wu:
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds. ICPP Workshops 2012: 304-305 - [c271]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Efficient information retrieval for ranked queries in cost-effective cloud environments. INFOCOM 2012: 2581-2585 - 2011
- [j157]Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5): 320-331 (2011) - [j156]Guojun Wang, Qin Liu, Jie Wu:
Achieving fine-grained access control for secure data sharing on cloud servers. Concurr. Comput. Pract. Exp. 23(12): 1443-1464 (2011) - [j155]Guojun Wang, Jie Wu:
FlowTrust: trust inference with network flows. Frontiers Comput. Sci. China 5(2): 181-194 (2011) - [j154]Guojun Wang, Jie Wu:
Multi-dimensional evidence-based trust management with multi-trusted paths. Future Gener. Comput. Syst. 27(5): 529-538 (2011) - [j147]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. Secur. Commun. Networks 4(4): 372-383 (2011) - [c251]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Reliable Re-Encryption in Unreliable Clouds. GLOBECOM 2011: 1-5 - 2010
- [j140]Sancheng Peng, Weijia Jia
, Guojun Wang, Jie Wu, Minyi Guo:
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 93-D(3): 510-517 (2010) - [c234]Yongming Xie, Guojun Wang, Jie Wu:
Fuzzy Location Service for Mobile Ad Hoc Networks. CIT 2010: 289-296 - [c233]Qin Liu, Guojun Wang, Jie Wu:
Efficient Sharing of Secure Cloud Storage Services. CIT 2010: 922-929 - [c232]Guojun Wang, Qin Liu, Jie Wu:
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. CCS 2010: 735-737 - [c226]Jin Zheng, Weijia Jia
, Guojun Wang, Jie Wu:
Target Trajectory Querying in Wireless Sensor Networks. ICC 2010: 1-6 - [c212]Yun Ge, Guojun Wang, Jie Wu:
Node-Disjoint Multipath Routing with Group Mobility in MANETs. NAS 2010: 181-189 - 2009
- [c207]Xiaofei Xing, Guojun Wang, Jie Wu, Jie Li
:
Square region-based coverage and connectivity probability model in wireless sensor networks. CollaborateCom 2009: 1-8 - [c206]Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. CSE (2) 2009: 715-720 - [c204]Peiqiang Li, Guojun Wang, Jie Wu, Hong-Chuan Yang:
Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks. GLOBECOM 2009: 1-6 - [c200]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu:
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks. ICCCN 2009: 1-6 - [c195]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu:
Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks. ICPADS 2009: 174-181 - [c187]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. MASS 2009: 842-847 - [c181]Xiaofei Xing, Guojun Wang, Jie Wu:
Herd-Based Target Tracking Protocol in Wireless Sensor Networks. WASA 2009: 135-148 - 2005
- [c100]Guojun Wang, Jiannong Cao
, Lifan Zhang, Keith C. C. Chan
, Jie Wu:
A Novel QoS Multicast Model in Mobile Ad Hoc Networks. IPDPS 2005

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-12 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint