学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 王永智的留言板
学术论文

Recent Publications (Copied from Google Scholar)

CFHider: Protecting Control Flow Confidentiality with Intel SGX

Y Wang, Y Zou, Y Shen, Y Liu

IEEE Transactions on Computers 2021

Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA

X Dong, L Wang, Q Yao, Y Wang, J Zhang, Y Shen

IEEE Transactions on Vehicular Technology 70 (5), 4646-46562021

Technical Details and Educational Applications for Virtual Reality Technologies

Y Wang

Current and Prospective Applications of Virtual Reality in Higher Education …2021

A secured TPM integration scheme towards smart embedded system based collaboration network

D Lu, R Han, Y Wang, Y Wang, X Dong, X Ma, T Li, J Ma

Computers & Security 97, 1019222020

Reconsidering Leakage Prevention in MapReduce

X Zhang, Y Wang, Y Zou

IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …2020

A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees

K Cheng, L Wang, Y Shen, Y Liu, Y Wang, L Zheng

IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1708-17172 2020

Enforcing Control Flow Confidentiality with SGX

Y Zou, Y Wang, X Zhang

IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …1 2020

Special issue on security and privacy in network computing

H Wang, Y Wang, T Taleb, X Jiang

World Wide Web 23 (2), 951-957332020

Improving User Experience for GENI-based Cybersecurity Labs

Y Wang, WJ Hsin

Proceedings of the 51st ACM Technical Symposium on Computer Science …1 2020

CryptSQLite: SQLite with high data security

Y Wang, Y Shen, C Su, J Ma, L Liu, X Dong

IEEE Transactions on Computers 69 (5), 666-67872019

Protecting Security-Sensitive Data Using Program Transformation and Intel SGX

A Faree, Y Wang

2019 International Conference on Networking and Network Applications (NaNA …1 2019

Strongly secure and efficient range queries in cloud databases under multiple keys

K Cheng, Y Shen, Y Wang, L Wang, J Ma, X Jiang, C Su

IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2494-25029 2019

Cfhider: Control flow obfuscation with intel sgx

Y Wang, Y Shen, C Su, K Cheng, Y Yang, AN Faree, Y Liu

IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 541-5496 2019

A Reflective Covert Channel Attack Anchored on Trusted Web Services

F Zhu, Y Yun, J Wei, BB Kang, Y Wang, D Kim, P Li, H Xu, R Wang

International Conference on Web Services, 84-992018

A Reflective Covert Channel Attack Anchored on Trusted Web Services

BB Kang, Y Wang, D Kim, P Li, H Xu, R Wang

Web Services–ICWS 2018: 25th International Conference, Held as Part of the … 2018

Obfuscating program control flow with Intel SGX

Y Wang, Y Shen, K Cheng, Y Yang, C Su, A Faree

Proceedings of the 40th International Conference on Software Engineering …1 2018

Salute: A strategy-proof auction mechanism for flexible multichannel allocation

X Dong, X Yang, Y Wang, A Salem, Y Shen, J Ma

IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …1 2018

Trustworthy service composition with secure data transmission in sensor networks

T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong

World Wide Web 21 (1), 185-20015 2018

Practical verifiable computation–a mapreduce case study

Y Wang, Y Shen, X Jiang

IEEE Transactions on Information Forensics and Security 13 (6), 1376-13915 2017

Modeling grain storage quality with linear regression

A Faree, Y Wang, G Li

2017 3rd IEEE International Conference on Computer and Communications (ICCC …2 2017

Selected Earlier Publications:

Journal Publications

[1]   Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu, Exploiting Content Delivery Networks for Covert Channel Communications, Elsevier Journal of Computer Communications. (COMCOM) Vol. 99, pp. 84-92, Feb 2017. doi:10.1016/j.comcom.2016.07.011

[2]   Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang, MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications. IEEE Transaction on Big Data. (TBD) In Press. doi:10.1109/TBDATA.2016.2599928

[3]   Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen, Toward integrity assurance of outsourced computing - a game theoretic perspective, Elsevier Journal of Future Generation Computer Systems (FGCS), 2016, 55:87-100.

[4]Yongzhi Wang, Jinpeng Wei. “Towards Protecting Control Flow Confidentiality on Cloud Based Computation.” Elsevier Journal of Computers and Security (Computers & Security).Vol. 52, pp.106-127, July 2015. doi:10.1016/j.cose.2015.04.005.

[5]   Yongzhi Wang, Jinpeng Wei, Yucong Duan. “Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework.” International Journal of Grid and Distributed Computing (IJGDC), Vol. 7, No. 6, 2014, pages 53-77.

[6]   Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. “Cross Cloud MapReduce: A Result Integrity Check Framework on Hybrid Clouds”. International Journal of Cloud Computing (IJCC), Vol. 1, No. 1, 2013, pages 26-39.

[7]   Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du, “Service Value Broker Patterns: An Empirical Collection and Analysis”. International Journal of Networked and Distributed Computing (IJNDC), Vol. 2, No. 1, 2013, pages 54-69.

[8]   Yongzhi Wang, Zhenguo Ding “Research on the Protocol Analysis Module Based on the TCP Splicing Method”. Science Technology and Engineering (Chinese Journal). Vol. 7, no. 5, 2007, pages 782-785.

 

Conference Publications

 

[9]   Yongzhi Wang, Yulong Shen, “RIA – An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications”, 23rd ACM Conference on Computer and Communications Security (ACM CCS 2016), Oct 24-28, 2016, Vienna, Austria. Poster Paper.

[10]Yucong Duan, Nanjangud Narendra, Wencai Du, Yongzhi Wang, Nianjun Zhou, “Exploring Cloud Service Brokering from an Interface Perspective” 21th IEEE International Conference on Web Services (IEEE ICWS 2014), June 27 – July 2, 2014, Alaska, USA.

[11]  Yucong Duan,Yongzhi Wang, Jinpeng Wei, Ajay Kattepur and Wencai Du "Value Added Modeling and Analysis on Service Value Brokerage". The 1st International Workshop on Cloud Service Brokerage (CSB 2013), co-located with the 11th International Conference on Service Oriented Computing (ICSOC 2013), Berlin, Germany, December 2-5, 2013, pages 209-222.

[12]  Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, and Wencai Du. "IntegrityMR: Integrity Assurance Framework for Big Data Analytics and Management Applications". Proceedings of the IEEE International Conference on Big Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop, October 6-9, 2013, pages 17-24.

[13]Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, and Wencai Du. "Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective". Proceedings of the IEEE International Conference on Big Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop, October 6-9, 2013, pages 33-40.

[14]Yongzhi Wang, Jinpeng Wei, and Mudhakar Srivatsa. "Result Integrity Check for MapReduce Computation on Hybrid Clouds". Proceedings of the 6th IEEE International Conference on Cloud Computing (IEEE CLOUD 2013), IEEE Computer Society, Santa Clara, CA, June 27-July 2, 2013, pages 847-854. (25% acceptance rate)

[15]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. "Cross Cloud MapReduce: an Uncheatable MapReduce". The 33rd IEEE Symposium on Security and Privacy (IEEE S&P 2012), San Francisco, CA, May 20-23, 2012. Poster paper.

[16]Yongzhi Wang, Jinpeng Wei. "VIAF: Verification-based Integrity Assurance Framework for MapReduce". Proceedings of the fourth IEEE International Conference on Cloud Computing (IEEE CLOUD 2011), IEEE Computer Society, Washington DC, July 4-9, 2011, pages 300-307. (19% acceptance rate).