How to bid the cloud L Zheng, C Joe-Wong, CW Tan, M Chiang, X Wang ACM SIGCOMM Computer Communication Review 45 (4), 71-84, 2015 | 157 | 2015 |
Enabling privacy-preserving image-centric social discovery X Yuan, X Wang, C Wang, A Squicciarini, K Ren 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 48 | 2014 |
Privacy-preserving deep packet inspection in outsourced middleboxes X Yuan, X Wang, J Lin, C Wang IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 44 | 2016 |
Enabling encrypted cloud media center with secure deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 42 | 2015 |
Toward encrypted cloud media center with secure deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui IEEE Transactions on Multimedia 19 (2), 251-265, 2016 | 36 | 2016 |
Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing X Yuan, X Wang, C Wang, J Weng, K Ren IEEE Transactions on Multimedia 18 (10), 2002-2014, 2016 | 30 | 2016 |
Enabling privacy-assured similarity retrieval over millions of encrypted records X Yuan, H Cui, X Wang, C Wang European Symposium on Research in Computer Security, 40-60, 2015 | 30 | 2015 |
Enckv: An encrypted key-value store with rich queries X Yuan, Y Guo, X Wang, C Wang, B Li, X Jia Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 26 | 2017 |
IoT for next-generation racket sports training Y Wang, M Chen, X Wang, RHM Chan, WJ Li IEEE Internet of Things Journal 5 (6), 4558-4566, 2018 | 25 | 2018 |
Building an encrypted, distributed, and searchable key-value store X Yuan, X Wang, C Wang, C Qian, J Lin Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 25 | 2016 |
Privacy-preserving similarity joins over encrypted data X Yuan, X Wang, C Wang, C Yu, S Nutanong IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017 | 21 | 2017 |
Enabling secure and efficient video delivery through encrypted in-network caching X Yuan, X Wang, J Wang, Y Chu, C Wang, J Wang, MJ Montpetit, S Liu IEEE Journal on Selected Areas in Communications 34 (8), 2077-2090, 2016 | 18 | 2016 |
Towards privacy-preserving and practical image-centric social discovery X Yuan, X Wang, C Wang, AC Squicciarini, K Ren IEEE Transactions on Dependable and Secure Computing 15 (5), 868-882, 2016 | 12 | 2016 |
Enabling encrypted rich queries in distributed key-value stores X Yuan, X Wang, C Wang, B Li, X Jia IEEE Transactions on Parallel and Distributed Systems 30 (6), 1283-1297, 2018 | 11 | 2018 |
Construction and mitigation of user-behavior-based covert channels on smartphones W Qi, W Ding, X Wang, Y Jiang, Y Xu, J Wang, K Lu IEEE Transactions on Mobile Computing 17 (1), 44-57, 2017 | 10 | 2017 |
Towards a scalable, private, and searchable key-value store X Yuan, X Wang, Y Chu, C Wang, C Qian 2015 IEEE Conference on Communications and Network Security (CNS), 773-774, 2015 | 1 | 2015 |
AI3: application-independent information infrastructure B Zhang, J Wang, X Wang, Y Cheng, X Jia, J He Proceedings of the 2014 ACM conference on SIGCOMM, 145-146, 2014 | 1 | 2014 |
Systems and methods for privacy-assured similarity joins over encrypted datasets C Wang, S Nutanong, X Yuan, X Wang, C Yu US Patent 10,496,638, 2019 | | 2019 |
Method for operating a distributed key-value store X Yuan, Y Guo, X Wang, C Wang US Patent 10,476,662, 2019 | | 2019 |
On the design of a general multiple-namespace system for future networks J Wang, K Lu, W Ding, X Wang, S Liu, J Wang 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015 | | 2015 |