default search action
Yongzhi Wang 0001
Person information
- affiliation: Xidian University, School of Computer Science and Technology, Xi'an, Shaanxi, China
- affiliation (PhD 2015): Florida International University, Miama, FL, USA
- affiliation: Henan University of Technology, Key Laboratory of Grain Information Processing and Control, China
Other persons with the same name
- Yongzhi Wang — disambiguation page
- Yongzhi Wang 0002 — Jiangxi University of Science and Technology, School of Architectural and Surveying & Mapping Engineering, Ganzhou, China
- Yongzhi Wang 0003 — Jilin University, College of Geoexploration Science and Technology, Changchun, China (and 3 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Yongzhi Wang, Pengfei Gui, Mehdi Sookhak:
Sort-then-insert: A space efficient and oblivious model aggregation algorithm for top-k sparsification in federated learning. Future Gener. Comput. Syst. 158: 1-10 (2024) - 2022
- [j16]Yongzhi Wang, Yu Zou, Yulong Shen, Yao Liu:
CFHider: Protecting Control Flow Confidentiality With Intel SGX. IEEE Trans. Computers 71(9): 2128-2141 (2022) - [j15]Yongzhi Wang, Xiaoyu Zhang, Yao Wu, Yulong Shen:
Enhancing Leakage Prevention for MapReduce. IEEE Trans. Inf. Forensics Secur. 17: 1558-1572 (2022) - [c15]Yongzhi Wang, Wen-Jung Hsin, Manish Lamsal:
EdGENI: Making GENI User-Friendly for General Computer Education. SIGCSE (1) 2022: 801-807 - 2021
- [j14]Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [j13]Xuewen Dong, Liangmin Wang, Qingsong Yao, Yongzhi Wang, Junwei Zhang, Yulong Shen:
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA. IEEE Trans. Veh. Technol. 70(5): 4646-4656 (2021) - 2020
- [j12]Di Lu, Ruidong Han, Yue Wang, Yongzhi Wang, Xuewen Dong, Xindi Ma, Teng Li, Jianfeng Ma:
A secured TPM integration scheme towards smart embedded system based collaboration network. Comput. Secur. 97: 101922 (2020) - [j11]Yongzhi Wang, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu, Xuewen Dong:
CryptSQLite: SQLite With High Data Security. IEEE Trans. Computers 69(5): 666-678 (2020) - [j10]Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang:
Editorial: Special issue on security and privacy in network computing. World Wide Web 23(2): 951-957 (2020) - [c14]Ke Cheng, Liangmin Wang, Yulong Shen, Yangyang Liu, Yongzhi Wang, Lele Zheng:
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees. INFOCOM 2020: 1708-1717
2010 – 2019
- 2019
- [c13]Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. INFOCOM 2019: 541-549 - [c12]Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM 2019: 2494-2502 - 2018
- [j9]Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang:
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Trans. Big Data 4(3): 418-431 (2018) - [j8]Yongzhi Wang, Yulong Shen, Xiaohong Jiang:
Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Inf. Forensics Secur. 13(6): 1376-1391 (2018) - [j7]Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:
Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) - [c11]Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree:
Obfuscating program control flow with Intel SGX. ICSE (Companion Volume) 2018: 321-322 - [c10]Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen, Jianfeng Ma:
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation. INFOCOM Workshops 2018: 1-2 - 2017
- [j6]Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang, Xiaohong Jiang:
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation. IEEE Commun. Mag. 55(9): 86-93 (2017) - [j5]Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu:
Exploiting Content Delivery Networks for covert channel communications. Comput. Commun. 99: 84-92 (2017) - [c9]Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:
Improving Database Storage Usability with the Cloud-Based Architecture. DSC 2017: 494-499 - [c8]Tao Zhang, Yongzhi Wang, Guangxia Li, Jingjing Guo, Qi Li:
Reputation Propagation for Web Service Composition: A Shapley Value Approach. NaNA 2017: 232-238 - [c7]Yongzhi Wang, Lingtong Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang, Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong:
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX. NaNA 2017: 303-308 - 2016
- [j4]Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen:
Toward integrity assurance of outsourced computing - a game theoretic perspective. Future Gener. Comput. Syst. 55: 87-100 (2016) - [j3]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du:
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications. Int. J. Networked Distributed Comput. 4(2): 116-126 (2016) - [c6]Yongzhi Wang, Yulong Shen:
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. CCS 2016: 1799-1801 - 2015
- [j2]Yongzhi Wang, Jinpeng Wei:
Toward protecting control flow confidentiality in cloud-based computation. Comput. Secur. 52: 106-127 (2015) - 2014
- [j1]Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du:
Service Value Broker Patterns: An Empirical Collection and Analysis. Int. J. Networked Distributed Comput. 2(1): 54-69 (2014) - [c5]Yucong Duan, Nanjangud C. Narendra, Wencai Du, Yongzhi Wang, Nianjun Zhou:
Exploring Cloud Service Brokering from an Interface Perspective. ICWS 2014: 329-336 - 2013
- [c4]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa:
Result Integrity Check for MapReduce Computation on Hybrid Clouds. IEEE CLOUD 2013: 847-854 - [c3]Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, Wencai Du:
Constructing E-Tourism platform based on service value broker: A knowledge management perspective. IEEE BigData 2013: 17-24 - [c2]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du:
IntegrityMR: Integrity assurance framework for big data analytics and management applications. IEEE BigData 2013: 33-40 - [c1]Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, Wencai Du:
Value-Added Modelling and Analysis in Service Value Brokerage. ICSOC Workshops 2013: 209-222
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint