default search action
Wenhai Sun
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Jing Lei, Le Wang, Qingqi Pei, Wenhai Sun, Xiaodong Lin, Xuefeng Liu:
PrivGrid: Privacy-Preserving Individual Load Forecasting Service for Smart Grid. IEEE Trans. Inf. Forensics Secur. 19: 6856-6870 (2024) - [c23]Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi:
BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts. DSN 2024: 389-402 - [c22]Mabon Ninan, Evan Nimmo, Shane Reilly, Channing Smith, Wenhai Sun, Boyang Wang, John Marty Emmert:
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces. RAID 2024: 630-643 - [i9]Xiaoguang Li, Zitao Li, Ninghui Li, Wenhai Sun:
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks. CoRR abs/2403.19510 (2024) - 2023
- [j8]Shekh Md Mahmudul Islam, Yao Zheng, Yanjun Pan, Marionne Millan, Willy Chang, Ming Li, Olga Boric-Lubecke, Victor Lubecke, Wenhai Sun:
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns. IEEE Internet Things J. 10(16): 14197-14211 (2023) - [j7]Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li:
Protecting Regression Models With Personalized Local Differential Privacy. IEEE Trans. Dependable Secur. Comput. 20(2): 960-974 (2023) - [c21]Zelei Cheng, Xian Wu, Jiahao Yu, Wenhai Sun, Wenbo Guo, Xinyu Xing:
StateMask: Explaining Deep Reinforcement Learning through State Mask. NeurIPS 2023 - [c20]Haonan Yan, Wenjing Zhang, Qian Chen, Xiaoguang Li, Wenhai Sun, Hui Li, Xiaodong Lin:
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks. NeurIPS 2023 - [c19]Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li:
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation. USENIX Security Symposium 2023: 1739-1756 - [i8]Haonan Yan, Wenjing Zhang, Qian Chen, Xiaoguang Li, Wenhai Sun, Hui Li, Xiaodong Lin:
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks. CoRR abs/2310.05431 (2023) - 2022
- [j6]Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. IEEE Trans. Dependable Secur. Comput. 19(4): 2680-2694 (2022) - [j5]Jing Lei, Qingqi Pei, Yao Wang, Wenhai Sun, Xuefeng Liu:
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials. IEEE Trans. Dependable Secur. Comput. 19(5): 3101-3112 (2022) - [c18]Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi:
Speedster: An Efficient Multi-party State Channel via Enclaves. AsiaCCS 2022: 637-651 - [c17]Hao Liu, Wenhai Sun, Nan Niu, Boyang Wang:
MultiEvasion: Evasion Attacks Against Multiple Malware Detectors. CNS 2022: 10-18 - [c16]Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Towards Overcoming the Undercutting Problem. Financial Cryptography 2022: 444-463 - [c15]Hao Liu, Jimmy Dani, Hongkai Yu, Wenhai Sun, Boyang Wang:
AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples. IWQoS 2022: 1-10 - [i7]Xiaoguang Li, Neil Zhenqiang Gong, Ninghui Li, Wenhai Sun, Hui Li:
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation. CoRR abs/2205.11782 (2022) - 2021
- [c14]Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Samson Aggelopoulos, Brian Lu, Alvin Yang, Thomas Yang, Stephanie Aelmore, Willy Chang, Alana Power, Ming Li, Olga Boric-Lubecke, Victor Lubecke, Wenhai Sun:
Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test. GLOBECOM 2021: 1-6 - [i6]Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi:
Speedster: A TEE-assisted State Channel System. CoRR abs/2104.01289 (2021) - [i5]Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Samson Aggelopoulos, Brian Lu, Alvin Yang, Thomas Yang, Stephanie Aelmore, Willy Chang, Alana Power, Ming Li, Olga Boric-Lubecke, Victor Lubecke, Wenhai Sun:
Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test. CoRR abs/2105.00314 (2021) - 2020
- [c13]Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang:
Fingerprinting encrypted voice traffic on smart speakers with deep learning. WISEC 2020: 254-265 - [i4]Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang:
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning. CoRR abs/2005.09800 (2020) - [i3]Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Undercutting Bitcoin Is Not Profitable. CoRR abs/2007.11480 (2020) - [i2]Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack. CoRR abs/2011.00418 (2020)
2010 – 2019
- 2019
- [j4]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. IEEE Trans. Inf. Forensics Secur. 14(7): 1830-1842 (2019) - [c12]Sean Kennedy, Haipeng Li, Chenggang Wang, Hao Liu, Boyang Wang, Wenhai Sun:
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers. CNS 2019: 232-240 - [i1]Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data. CoRR abs/1912.08454 (2019) - 2018
- [b1]Wenhai Sun:
Towards Secure Outsourced Data Services in the Public Cloud. Virginia Tech, Blacksburg, VA, USA, 2018 - [c11]Ning Zhang, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe:
ROSTER: Radio Context Attestation in Cognitive Radio Network. CNS 2018: 1-9 - [c10]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup. CNS 2018: 1-9 - [c9]Xiaoqun Yuan, Xiaowen Tong, Qing Fang, Wenhai Sun, Wenjing Lou:
A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers. HPCC/SmartCity/DSS 2018: 842-847 - [c8]Jing Lei, Qingqi Pei, Xuefeng Liu, Wenhai Sun:
A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability. ICA3PP (4) 2018: 193-203 - [c7]Wenhai Sun, Ruide Zhang, Wenjing Lou, Y. Thomas Hou:
REARGUARD: Secure Keyword Search Using Trusted Hardware. INFOCOM 2018: 801-809 - [c6]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT. SecureComm (1) 2018: 3-21 - 2017
- [j3]Xuefeng Liu, Wenhai Sun, Hanyu Quan, Wenjing Lou, Yuqing Zhang, Hui Li:
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys. IEEE Trans. Serv. Comput. 10(5): 826-838 (2017) - [c5]Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang:
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. INFOCOM 2017: 1-9 - [c4]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. INFOCOM 2017: 1-9 - 2016
- [j2]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud. IEEE Trans. Parallel Distributed Syst. 27(4): 1187-1198 (2016) - 2015
- [c3]Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. INFOCOM 2015: 2110-2118 - 2014
- [j1]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking. IEEE Trans. Parallel Distributed Syst. 25(11): 3025-3035 (2014) - [c2]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. INFOCOM 2014: 226-234 - [p1]Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. Secure Cloud Computing 2014: 189-212 - 2013
- [c1]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. AsiaCCS 2013: 71-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint