Qian Wang (王骞)
Qian Wang (王骞)
School of Cyber Science and Engineering, Wuhan University
Verified email at whu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Ensuring data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009
2744*2009
Privacy-preserving public auditing for data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
2010 proceedings ieee infocom, 1-9, 2010
26882010
Privacy-preserving public auditing for secure cloud storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE transactions on computers 62 (2), 362-375, 2011
16302011
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2010
13422010
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
European symposium on research in computer security, 355-370, 2009
13332009
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-5, 2010
11072010
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Z Xia, X Wang, X Sun, Q Wang
IEEE Transactions on Parallel and Distributed Systems 27 (2), 340 - 352, 2015
10622015
Security challenges for the public cloud
K Ren, C Wang, Q Wang
IEEE Internet Computing 16 (1), 69-73, 2012
9262012
Toward secure and dependable storage services in cloud computing
C Wang, Q Wang, K Ren, N Cao, W Lou
IEEE transactions on Services Computing 5 (2), 220-232, 2011
8922011
Deep learning based feature selection for remote sensing scene classification
Q Zou, L Ni, T Zhang, Q Wang
IEEE Geoscience and Remote Sensing Letters 12 (11), 2321-2325, 2015
3512015
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Q Wang, H Su, K Ren, K Kim
2011 Proceedings IEEE INFOCOM, 1422-1430, 2011
2372011
Dependable and secure sensor data storage with dynamic integrity assurance
Q Wang, K Ren, S Yu, W Lou
ACM Transactions on Sensor Networks (TOSN) 8 (1), 1-24, 2011
2102011
Secret key generation exploiting channel characteristics in wireless communications
K Ren, H Su, Q Wang
IEEE Wireless Communications 18 (4), 6-12, 2011
2092011
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
C Wang, K Ren, J Wang, Q Wang
IEEE Transactions on Parallel and Distributed Systems 24 (6), 1172-1181, 2013
195*2013
When cloud meets ebay: Towards effective pricing for cloud computing
Q Wang, K Ren, X Meng
2012 Proceedings IEEE INFOCOM, 936-944, 2012
1512012
Cooperative secret key generation from phase estimation in narrowband fading channels
Q Wang, K Xu, K Ren
IEEE Journal on selected areas in communications 30 (9), 1666-1674, 2012
1082012
Beyond inferring class representatives: User-level privacy leakage from federated learning
Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2512-2520, 2019
1032019
Enhancing attribute-based encryption with attribute hierarchy
J Li, Q Wang, C Wang, K Ren
Mobile networks and applications 16 (5), 553-561, 2011
1002011
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy
Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016
982016
Searchable encryption over feature-rich data
Q Wang, M He, M Du, SSM Chow, RWF Lai, Q Zou
IEEE Transactions on Dependable and Secure Computing 15 (3), 496-510, 2016
942016
The system can't perform the operation now. Try again later.
Articles 1–20