Recent Publications (Copied from Google Scholar)
CFHider: Protecting Control Flow Confidentiality with Intel SGX
Y Wang, Y Zou, Y Shen, Y Liu
IEEE Transactions on Computers 2021
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA
X Dong, L Wang, Q Yao, Y Wang, J Zhang, Y Shen
IEEE Transactions on Vehicular Technology 70 (5), 4646-46562021
Technical Details and Educational Applications for Virtual Reality Technologies
Y Wang
Current and Prospective Applications of Virtual Reality in Higher Education …2021
A secured TPM integration scheme towards smart embedded system based collaboration network
D Lu, R Han, Y Wang, Y Wang, X Dong, X Ma, T Li, J Ma
Computers & Security 97, 1019222020
Reconsidering Leakage Prevention in MapReduce
X Zhang, Y Wang, Y Zou
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …2020
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees
K Cheng, L Wang, Y Shen, Y Liu, Y Wang, L Zheng
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1708-17172 2020
Enforcing Control Flow Confidentiality with SGX
Y Zou, Y Wang, X Zhang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …1 2020
Special issue on security and privacy in network computing
H Wang, Y Wang, T Taleb, X Jiang
World Wide Web 23 (2), 951-957332020
Improving User Experience for GENI-based Cybersecurity Labs
Y Wang, WJ Hsin
Proceedings of the 51st ACM Technical Symposium on Computer Science …1 2020
CryptSQLite: SQLite with high data security
Y Wang, Y Shen, C Su, J Ma, L Liu, X Dong
IEEE Transactions on Computers 69 (5), 666-67872019
Protecting Security-Sensitive Data Using Program Transformation and Intel SGX
A Faree, Y Wang
2019 International Conference on Networking and Network Applications (NaNA …1 2019
Strongly secure and efficient range queries in cloud databases under multiple keys
K Cheng, Y Shen, Y Wang, L Wang, J Ma, X Jiang, C Su
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2494-25029 2019
Cfhider: Control flow obfuscation with intel sgx
Y Wang, Y Shen, C Su, K Cheng, Y Yang, AN Faree, Y Liu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 541-5496 2019
A Reflective Covert Channel Attack Anchored on Trusted Web Services
F Zhu, Y Yun, J Wei, BB Kang, Y Wang, D Kim, P Li, H Xu, R Wang
International Conference on Web Services, 84-992018
A Reflective Covert Channel Attack Anchored on Trusted Web Services
BB Kang, Y Wang, D Kim, P Li, H Xu, R Wang
Web Services–ICWS 2018: 25th International Conference, Held as Part of the … 2018
Obfuscating program control flow with Intel SGX
Y Wang, Y Shen, K Cheng, Y Yang, C Su, A Faree
Proceedings of the 40th International Conference on Software Engineering …1 2018
Salute: A strategy-proof auction mechanism for flexible multichannel allocation
X Dong, X Yang, Y Wang, A Salem, Y Shen, J Ma
IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …1 2018
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21 (1), 185-20015 2018
Practical verifiable computation–a mapreduce case study
Y Wang, Y Shen, X Jiang
IEEE Transactions on Information Forensics and Security 13 (6), 1376-13915 2017
Modeling grain storage quality with linear regression
A Faree, Y Wang, G Li
2017 3rd IEEE International Conference on Computer and Communications (ICCC …2 2017
Selected Earlier Publications:
Journal Publications
[1] Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu, Exploiting Content Delivery Networks for Covert Channel Communications, Elsevier Journal of Computer Communications. (COMCOM) Vol. 99, pp. 84-92, Feb 2017. doi:10.1016/j.comcom.2016.07.011
[2] Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang, MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications. IEEE Transaction on Big Data. (TBD) In Press. doi:10.1109/TBDATA.2016.2599928
[3] Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen, Toward integrity assurance of outsourced computing - a game theoretic perspective, Elsevier Journal of Future Generation Computer Systems (FGCS), 2016, 55:87-100.
[4]Yongzhi Wang, Jinpeng Wei. “Towards Protecting Control Flow Confidentiality on Cloud Based Computation.” Elsevier Journal of Computers and Security (Computers & Security).Vol. 52, pp.106-127, July 2015. doi:10.1016/j.cose.2015.04.005.
[5] Yongzhi Wang, Jinpeng Wei, Yucong Duan. “Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework.” International Journal of Grid and Distributed Computing (IJGDC), Vol. 7, No. 6, 2014, pages 53-77.
[6] Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. “Cross Cloud MapReduce: A Result Integrity Check Framework on Hybrid Clouds”. International Journal of Cloud Computing (IJCC), Vol. 1, No. 1, 2013, pages 26-39.
[7] Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du, “Service Value Broker Patterns: An Empirical Collection and Analysis”. International Journal of Networked and Distributed Computing (IJNDC), Vol. 2, No. 1, 2013, pages 54-69.
[8] Yongzhi Wang, Zhenguo Ding “Research on the Protocol Analysis Module Based on the TCP Splicing Method”. Science Technology and Engineering (Chinese Journal). Vol. 7, no. 5, 2007, pages 782-785.
Conference Publications
[9] Yongzhi Wang, Yulong Shen, “RIA – An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications”, 23rd ACM Conference on Computer and Communications Security (ACM CCS 2016), Oct 24-28, 2016, Vienna, Austria. Poster Paper.
[10]Yucong Duan, Nanjangud Narendra, Wencai Du, Yongzhi Wang, Nianjun Zhou, “Exploring Cloud Service Brokering from an Interface Perspective” 21th IEEE International Conference on Web Services (IEEE ICWS 2014), June 27 – July 2, 2014, Alaska, USA.
[11] Yucong Duan,Yongzhi Wang, Jinpeng Wei, Ajay Kattepur and Wencai Du "Value Added Modeling and Analysis on Service Value Brokerage". The 1st International Workshop on Cloud Service Brokerage (CSB 2013), co-located with the 11th International Conference on Service Oriented Computing (ICSOC 2013), Berlin, Germany, December 2-5, 2013, pages 209-222.
[12] Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, and Wencai Du. "IntegrityMR: Integrity Assurance Framework for Big Data Analytics and Management Applications". Proceedings of the IEEE International Conference on Big Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop, October 6-9, 2013, pages 17-24.
[13]Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, and Wencai Du. "Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective". Proceedings of the IEEE International Conference on Big Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop, October 6-9, 2013, pages 33-40.
[14]Yongzhi Wang, Jinpeng Wei, and Mudhakar Srivatsa. "Result Integrity Check for MapReduce Computation on Hybrid Clouds". Proceedings of the 6th IEEE International Conference on Cloud Computing (IEEE CLOUD 2013), IEEE Computer Society, Santa Clara, CA, June 27-July 2, 2013, pages 847-854. (25% acceptance rate)
[15]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. "Cross Cloud MapReduce: an Uncheatable MapReduce". The 33rd IEEE Symposium on Security and Privacy (IEEE S&P 2012), San Francisco, CA, May 20-23, 2012. Poster paper.
[16]Yongzhi Wang, Jinpeng Wei. "VIAF: Verification-based Integrity Assurance Framework for MapReduce". Proceedings of the fourth IEEE International Conference on Cloud Computing (IEEE CLOUD 2011), IEEE Computer Society, Washington DC, July 4-9, 2011, pages 300-307. (19% acceptance rate).