Login / Signup
Wei Wang
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 31
Top Topics
Elliptic Curve Cryptography
Lightweight
Forward And Backward
Ciphertext
Top Venues
IEEE Trans. Inf. Forensics Secur.
CoRR
Future Gener. Comput. Syst.
IEEE Trans. Ind. Informatics
</>
Publications
</>
Hao Nie
,
Wei Wang
,
Peng Xu
,
Xianglong Zhang
,
Laurence T. Yang
,
Kaitai Liang
Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
USENIX Security Symposium
(2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
CoRR
(2024)
Haochen Dou
,
Zhenwu Dan
,
Peng Xu
,
Wei Wang
,
Shuning Xu
,
Tianyang Chen
,
Hai Jin
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Hao Nie
,
Wei Wang
,
Peng Xu
,
Xianglong Zhang
,
Laurence T. Yang
,
Kaitai Liang
Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
CoRR
(2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
USENIX Security Symposium
(2024)
Wei Wang
,
Dongli Liu
,
Peng Xu
,
Laurence Tianruo Yang
,
Kaitai Liang
Keyword Search Shareable Encryption for Fast and Secure Data Replication.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Xianglong Zhang
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Kaitai Liang
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
CoRR
(2023)
Xianglong Zhang
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Kaitai Liang
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
USENIX Security Symposium
(2023)
Peng Xu
,
Manqing Hu
,
Tianyang Chen
,
Wei Wang
,
Hai Jin
LaF: Lattice-Based and Communication-Efficient Federated Learning.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Yubo Zheng
,
Peng Xu
,
Wei Wang
,
Tianyang Chen
,
Willy Susilo
,
Kaitai Liang
,
Hai Jin
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
ESORICS (2)
(2022)
Peng Xu
,
Willy Susilo
,
Wei Wang
,
Tianyang Chen
,
Qianhong Wu
,
Kaitai Liang
,
Hai Jin
ROSE: Robust Searchable Encryption With Forward and Backward Security.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Peng Xu
,
Ruijie Sun
,
Wei Wang
,
Tianyang Chen
,
Yubo Zheng
,
Hai Jin
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment.
Future Gener. Comput. Syst.
125 (2021)
Peng Xu
,
Willy Susilo
,
Wei Wang
,
Tianyang Chen
,
Qianhong Wu
,
Hai Jin
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance.
IACR Cryptol. ePrint Arch.
2021 (2021)
Wei Wang
,
Cheng Fang
,
Laurence Tianruo Yang
,
Hongrui Duan
,
Peng Xu
A Fairness-Based Collaborative Communication Ecosystem Over Sustainable D2D Fogs in a 5G Industrial IoT.
IEEE Trans. Ind. Informatics
17 (11) (2021)
Tianyang Chen
,
Peng Xu
,
Wei Wang
,
Yubo Zheng
,
Willy Susilo
,
Hai Jin
Bestie: Very Practical Searchable Encryption with Forward and Backward Security.
ESORICS (2)
(2021)
Wei Wang
,
Peng Xu
,
Dongli Liu
,
Laurence Tianruo Yang
,
Zheng Yan
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics
16 (6) (2020)
Jun Feng
,
Laurence T. Yang
,
Guohui Dai
,
Wei Wang
,
Deqing Zou
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment.
IEEE Trans. Big Data
5 (3) (2019)
Laurence T. Yang
,
Wei Wang
,
Gregorio Martínez Pérez
,
Willy Susilo
Security, Privacy, and Trust for Cyberphysical-Social Systems.
Secur. Commun. Networks
2019 (2019)
Yong Chen
,
Hai Jin
,
Ran Zheng
,
Yuandong Liu
,
Wei Wang
A Hybrid CPU-GPU Multifrontal Optimizing Method in Sparse Cholesky Factorization.
J. Signal Process. Syst.
90 (1) (2018)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
,
Jinjun Chen
Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE Trans. Serv. Comput.
11 (5) (2018)
Xiaokang Wang
,
Wei Wang
,
Laurence T. Yang
,
Siwei Liao
,
Dexiang Yin
,
M. Jamal Deen
A Distributed HOSVD Method With Its Incremental Computation for Big Data in Cyber-Physical-Social Systems.
IEEE Trans. Comput. Soc. Syst.
5 (2) (2018)
Peng Xu
,
Shuanghong He
,
Wei Wang
,
Willy Susilo
,
Hai Jin
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks.
IEEE Trans. Ind. Informatics
14 (8) (2018)
Wei Wang
,
Peng Xu
,
Laurence T. Yang
Secure Data Collection, Storage and Access in Cloud-Assisted IoT.
IEEE Cloud Comput.
5 (4) (2018)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
,
Willy Susilo
,
Jinjun Chen
Securely Reinforcing Synchronization for Embedded Online Contests.
ACM Trans. Embed. Comput. Syst.
16 (2) (2017)
Peng Xu
,
Shuai Liang
,
Wei Wang
,
Willy Susilo
,
Qianhong Wu
,
Hai Jin
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
ACISP (1)
(2017)
Peng Xu
,
Xia Gao
,
Wei Wang
,
Willy Susilo
,
Qianhong Wu
,
Hai Jin
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch.
2017 (2017)
Peng Xu
,
Xiaolan Tang
,
Wei Wang
,
Hai Jin
,
Laurence T. Yang
Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT.
IEEE Access
5 (2017)
Peng Xu
,
Jun Xu
,
Wei Wang
,
Hai Jin
,
Willy Susilo
,
Deqing Zou
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
AsiaCCS
(2016)
Wei Wang
,
Peng Xu
,
Hui Li
,
Laurence Tianruo Yang
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Gener. Comput. Syst.
55 (2016)
Peng Xu
,
Jingnan Li
,
Wei Wang
,
Hai Jin
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
AsiaCCS
(2016)
Peng Xu
,
Tengfei Jiao
,
Qianhong Wu
,
Wei Wang
,
Hai Jin
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers
65 (1) (2016)
Ran Zheng
,
Wei Wang
,
Hai Jin
,
Song Wu
,
Yong Chen
,
Han Jiang
GPU-based multifrontal optimizing method in sparse Cholesky factorization.
ASAP
(2015)
Peng Xu
,
Qianhong Wu
,
Wei Wang
,
Willy Susilo
,
Josep Domingo-Ferrer
,
Hai Jin
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur.
10 (9) (2015)
Peng Xu
,
Qianhong Wu
,
Wei Wang
,
Willy Susilo
,
Josep Domingo-Ferrer
,
Hai Jin
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search.
CoRR
(2015)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
One-Pass Anonymous Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE MS
(2015)
Wei Wang
,
Peng Xu
,
Laurence Tianruo Yang
,
Hui Li
A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Gener. Comput. Syst.
52 (2015)
Wei Wang
,
Peng Xu
,
Hui Li
,
Laurence Tianruo Yang
A Secure Synchronized Reading system over time-critical online contests.
ICC
(2014)
Peng Xu
,
Hai Jin
,
Qianhong Wu
,
Wei Wang
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers
62 (11) (2013)
Song Wu
,
Wei Wang
,
Muzhou Xiong
,
Hai Jin
Data Management Services in ChinaGrid for Data Mining Applications.
PAKDD Workshops
(2007)
Song Wu
,
Hai Jin
,
Muzhou Xiong
,
Wei Wang
Data management services and transfer scheme in ChinaGrid.
Int. J. Web Grid Serv.
3 (4) (2007)