Ensuring data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009 | 3068* | 2009 |
Privacy-preserving public auditing for data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou 2010 proceedings ieee infocom, 1-9, 2010 | 3012 | 2010 |
Privacy-preserving public auditing for secure cloud storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE transactions on computers 62 (2), 362-375, 2011 | 1834 | 2011 |
Enabling public auditability and data dynamics for storage security in cloud computing Q Wang, C Wang, K Ren, W Lou, J Li IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2010 | 1497 | 2010 |
Enabling public verifiability and data dynamics for storage security in cloud computing Q Wang, C Wang, J Li, K Ren, W Lou European symposium on research in computer security, 355-370, 2009 | 1459 | 2009 |
Fuzzy keyword search over encrypted data in cloud computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 1256 | 2010 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Z Xia, X Wang, X Sun, Q Wang IEEE Transactions on Parallel and Distributed Systems 27 (2), 340 - 352, 2015 | 1213 | 2015 |
Security challenges for the public cloud K Ren, C Wang, Q Wang IEEE Internet computing 16 (1), 69-73, 2012 | 1062 | 2012 |
Toward secure and dependable storage services in cloud computing C Wang, Q Wang, K Ren, N Cao, W Lou IEEE transactions on Services Computing 5 (2), 220-232, 2011 | 967 | 2011 |
Deep learning based feature selection for remote sensing scene classification Q Zou, L Ni, T Zhang, Q Wang IEEE Geoscience and Remote Sensing Letters 12 (11), 2321-2325, 2015 | 551 | 2015 |
Beyond inferring class representatives: User-level privacy leakage from federated learning Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2512-2520, 2019 | 336 | 2019 |
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks Q Wang, H Su, K Ren, K Kim 2011 Proceedings IEEE INFOCOM, 1422-1430, 2011 | 281 | 2011 |
Deepcrack: Learning hierarchical convolutional features for crack detection Q Zou, Z Zhang, Q Li, X Qi, Q Wang, S Wang IEEE Transactions on Image Processing 28 (3), 1498-1512, 2018 | 268 | 2018 |
Secret key generation exploiting channel characteristics in wireless communications K Ren, H Su, Q Wang IEEE Wireless Communications 18 (4), 6-12, 2011 | 239 | 2011 |
Dependable and secure sensor data storage with dynamic integrity assurance Q Wang, K Ren, S Yu, W Lou ACM Transactions on Sensor Networks (TOSN) 8 (1), 1-24, 2011 | 231 | 2011 |
When cloud meets ebay: Towards effective pricing for cloud computing Q Wang, K Ren, X Meng 2012 Proceedings IEEE INFOCOM, 936-944, 2012 | 170 | 2012 |
Robust lane detection from continuous driving scenes using deep neural networks Q Zou, H Jiang, Q Dai, Y Yue, L Chen, Q Wang IEEE transactions on vehicular technology 69 (1), 41-54, 2019 | 160 | 2019 |
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations C Wang, K Ren, J Wang, Q Wang IEEE Transactions on Parallel and Distributed Systems 24 (6), 1172-1181, 2013 | 159 | 2013 |
Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization S Hu, C Cai, Q Wang, C Wang, X Luo, K Ren IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 792-800, 2018 | 151 | 2018 |
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016 | 145 | 2016 |