Ensuring data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009 | 3282* | 2009 |
Privacy-preserving public auditing for secure cloud storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE transactions on computers 62 (2), 362-375, 2011 | 2136 | 2011 |
Enabling public auditability and data dynamics for storage security in cloud computing Q Wang, C Wang, K Ren, W Lou, J Li IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2010 | 1718 | 2010 |
Enabling public verifiability and data dynamics for storage security in cloud computing Q Wang, C Wang, J Li, K Ren, W Lou Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 1604 | 2009 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Z Xia, X Wang, X Sun, Q Wang IEEE Transactions on Parallel and Distributed Systems 27 (2), 340 - 352, 2015 | 1395 | 2015 |
Fuzzy keyword search over encrypted data in cloud computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 1387 | 2010 |
Security challenges for the public cloud K Ren, C Wang, Q Wang IEEE Internet computing 16 (1), 69-73, 2012 | 1241 | 2012 |
Toward secure and dependable storage services in cloud computing C Wang, Q Wang, K Ren, N Cao, W Lou IEEE transactions on Services Computing 5 (2), 220-232, 2011 | 1073 | 2011 |
Beyond inferring class representatives: User-level privacy leakage from federated learning Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi IEEE INFOCOM 2019-IEEE conference on computer communications, 2512-2520, 2019 | 940 | 2019 |
Deep learning based feature selection for remote sensing scene classification Q Zou, L Ni, T Zhang, Q Wang IEEE Geoscience and remote sensing letters 12 (11), 2321-2325, 2015 | 878 | 2015 |
Deepcrack: Learning hierarchical convolutional features for crack detection Q Zou, Z Zhang, Q Li, X Qi, Q Wang, S Wang IEEE transactions on image processing 28 (3), 1498-1512, 2018 | 781 | 2018 |
Recent advances in adversarial training for adversarial robustness T Bai, J Luo, J Zhao, B Wen, Q Wang arXiv preprint arXiv:2102.01356, 2021 | 456 | 2021 |
Robust lane detection from continuous driving scenes using deep neural networks Q Zou, H Jiang, Q Dai, Y Yue, L Chen, Q Wang IEEE transactions on vehicular technology 69 (1), 41-54, 2019 | 393 | 2019 |
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks Q Wang, H Su, K Ren, K Kim 2011 Proceedings IEEE INFOCOM, 1422-1430, 2011 | 333 | 2011 |
Secret key generation exploiting channel characteristics in wireless communications K Ren, H Su, Q Wang IEEE Wireless Communications 18 (4), 6-12, 2011 | 287 | 2011 |
Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization S Hu, C Cai, Q Wang, C Wang, X Luo, K Ren IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 792-800, 2018 | 265 | 2018 |
Deep learning-based gait recognition using smartphones in the wild Q Zou, Y Wang, Q Wang, Y Zhao, Q Li IEEE Transactions on Information Forensics and Security 15, 3197-3212, 2020 | 257 | 2020 |
Personalized privacy-preserving task allocation for mobile crowdsensing Z Wang, J Hu, R Lv, J Wei, Q Wang, D Yang, H Qi IEEE Transactions on Mobile Computing 18 (6), 1330-1341, 2018 | 250 | 2018 |
Dependable and secure sensor data storage with dynamic integrity assurance Q Wang, K Ren, S Yu, W Lou ACM Transactions on Sensor Networks (TOSN) 8 (1), 1-24, 2011 | 238 | 2011 |
Analyzing user-level privacy attack against federated learning M Song, Z Wang, Z Zhang, Y Song, Q Wang, J Ren, H Qi IEEE Journal on Selected Areas in Communications 38 (10), 2430-2444, 2020 | 226 | 2020 |