Yongzhi Wang
Yongzhi Wang
Verified email at park.edu - Homepage
Cited by
Cited by
Viaf: Verification-based integrity assurance framework for mapreduce
Y Wang, J Wei
2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
Special issue on security and privacy in network computing
H Wang, Y Wang, T Taleb, X Jiang
World Wide Web 23 (2), 951-957, 2020
Secure k-nn query on encrypted cloud data with multiple keys
K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong
IEEE Transactions on Big Data, 2017
Result integrity check for mapreduce computation on hybrid clouds
Y Wang, J Wei, M Srivatsa
2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
IntegrityMR: Integrity assurance framework for big data analytics and management applications
Y Wang, J Wei, M Srivatsa, Y Duan, W Du
2013 IEEE International Conference on Big Data, 33-40, 2013
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21 (1), 185-200, 2018
Toward protecting control flow confidentiality in cloud-based computation
Y Wang, J Wei
Computers & Security 52, 106-127, 2015
Toward integrity assurance of outsourced computing—a game theoretic perspective
Y Wang, J Wei, S Ren, Y Shen
Future Generation Computer Systems 55, 87-100, 2016
Strongly secure and efficient range queries in cloud databases under multiple keys
K Cheng, Y Shen, Y Wang, L Wang, J Ma, X Jiang, C Su
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2494-2502, 2019
Exploiting Content Delivery Networks for covert channel communications
Y Wang, Y Shen, X Jiao, T Zhang, X Si, A Salem, J Liu
Computer Communications 99, 84-92, 2017
Cross cloud MapReduce: A result integrity check framework on hybrid clouds
Y Wang, J Wei, M Srivatsa
Int. J. Cloud Comput 1 (1), 26-39, 2013
CryptSQLite: SQLite with high data security
Y Wang, Y Shen, C Su, J Ma, L Liu, X Dong
IEEE Transactions on Computers 69 (5), 666-678, 2019
CryptSQLite: Protecting data confidentiality of SQLite with intel SGX
Y Wang, L Liu, C Su, J Ma, L Wang, Y Yang, Y Shen, G Li, T Zhang, ...
2017 International Conference on Networking and Network Applications (NaNA …, 2017
Cfhider: Control flow obfuscation with intel sgx
Y Wang, Y Shen, C Su, K Cheng, Y Yang, AN Faree, Y Liu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 541-549, 2019
Practical verifiable computation–a mapreduce case study
Y Wang, Y Shen, X Jiang
IEEE Transactions on Information Forensics and Security 13 (6), 1376-1391, 2017
Securing MapReduce result integrity via verification-based integrity assurance framework
Y Wang, J Wei, Y Duan
International Journal of Grid and Distributed Computing (IJGDC) 7 (6), 53-70, 2014
Exploring cloud service brokering from an interface perspective
Y Duan, NC Narendra, W Du, Y Wang, N Zhou
2014 IEEE international conference on web services, 329-336, 2014
Service Value Broker Patterns: An Empirical Collection and Analysis.
Y Duan, K Huang, D Chen, Y Wang, A Kattepur, W Du
Int. J. Networked Distributed Comput. 2 (1), 54-69, 2014
The system can't perform the operation now. Try again later.
Articles 1–20