BibTeX records: Hong Rong

download as .bib file

@article{DBLP:journals/cn/HaoHNRXS19,
  author    = {Jialu Hao and
               Cheng Huang and
               Jianbing Ni and
               Hong Rong and
               Ming Xian and
               Xuemin (Sherman) Shen},
  title     = {Fine-grained data access control with attribute-hiding policy for
               cloud-based IoT},
  journal   = {Comput. Networks},
  volume    = {153},
  pages     = {1--10},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.comnet.2019.02.008},
  doi       = {10.1016/j.comnet.2019.02.008},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cn/HaoHNRXS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WuLRWX18,
  author    = {Wei Wu and
               Jian Liu and
               Hong Rong and
               Huimei Wang and
               Ming Xian},
  title     = {Efficient k-Nearest Neighbor Classification Over Semantically Secure
               Hybrid Encrypted Cloud Database},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {41771--41784},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2859758},
  doi       = {10.1109/ACCESS.2018.2859758},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/WuLRWX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/RongWLTX18,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Fengyi Tang and
               Ming Xian},
  editor    = {Shijian Li},
  title     = {Verifiable and Privacy-Preserving Association Rule Mining in Hybrid
               Cloud Environment},
  booktitle = {Green, Pervasive, and Cloud Computing - 13th International Conference,
               {GPC} 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11204},
  pages     = {33--48},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-15093-8\_3},
  doi       = {10.1007/978-3-030-15093-8\_3},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/gpc/RongWLTX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/RongWLX17,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Ming Xian},
  title     = {Efficient Privacy-Preserving Building Blocks in Cloud Environments
               under Multiple Keys},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {33},
  number    = {3},
  pages     = {635--652},
  year      = {2017},
  url       = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=156\_2020},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jise/RongWLX17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RongWLHX17,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Jialu Hao and
               Ming Xian},
  title     = {Privacy-Preserving \emph{k}-Means Clustering under Multiowner Setting
               in Distributed Cloud Environments},
  journal   = {Security and Communication Networks},
  volume    = {2017},
  pages     = {3910126:1--3910126:19},
  year      = {2017},
  url       = {https://doi.org/10.1155/2017/3910126},
  doi       = {10.1155/2017/3910126},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/RongWLHX17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HaoLRWX17,
  author    = {Jialu Hao and
               Jian Liu and
               Hong Rong and
               Huimei Wang and
               Ming Xian},
  editor    = {Zheng Yan and
               Refik Molva and
               Wojciech Mazurczyk and
               Raimo Kantola},
  title     = {{OE-CP-ABE:} Over-Encryption Based {CP-ABE} Scheme for Efficient Policy
               Updating},
  booktitle = {Network and System Security - 11th International Conference, {NSS}
               2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10394},
  pages     = {499--509},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-64701-2\_37},
  doi       = {10.1007/978-3-319-64701-2\_37},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/nss/HaoLRWX17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RongWLHX17,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Jialu Hao and
               Ming Xian},
  editor    = {Xiaodong Lin and
               Ali Ghorbani and
               Kui Ren and
               Sencun Zhu and
               Aiqing Zhang},
  title     = {Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys
               in Spark Framework},
  booktitle = {Security and Privacy in Communication Networks - 13th International
               Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
               2017, Proceedings},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {238},
  pages     = {67--87},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-78813-5\_4},
  doi       = {10.1007/978-3-319-78813-5\_4},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/securecomm/RongWLHX17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RongWLX16,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Ming Xian},
  title     = {Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud
               Environments},
  journal   = {{IEEE} Access},
  volume    = {4},
  pages     = {9589--9603},
  year      = {2016},
  url       = {https://doi.org/10.1109/ACCESS.2016.2633544},
  doi       = {10.1109/ACCESS.2016.2633544},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/RongWLX16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LiuWXRH16,
  author    = {Jian Liu and
               Huimei Wang and
               Ming Xian and
               Hong Rong and
               Kun Huang},
  title     = {Reliable and confidential cloud storage with efficient data forwarding
               functionality},
  journal   = {{IET} Communications},
  volume    = {10},
  number    = {6},
  pages     = {661--668},
  year      = {2016},
  url       = {https://doi.org/10.1049/iet-com.2015.0608},
  doi       = {10.1049/iet-com.2015.0608},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-com/LiuWXRH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/RongWLWHX16,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Wei Wu and
               Jialu Hao and
               Ming Xian},
  editor    = {Kefei Chen and
               Dongdai Lin and
               Moti Yung},
  title     = {Secure Collaborative Outsourced k-Nearest Neighbor Classification
               with Multiple Owners in Cloud Environment},
  booktitle = {Information Security and Cryptology - 12th International Conference,
               Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10143},
  pages     = {451--471},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-54705-3\_28},
  doi       = {10.1007/978-3-319-54705-3\_28},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cisc/RongWLWHX16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideal/RongWHLX16,
  author    = {Hong Rong and
               Huimei Wang and
               Kun Huang and
               Jian Liu and
               Ming Xian},
  editor    = {Hujun Yin and
               Yang Gao and
               Bin Li and
               Daoqiang Zhang and
               Ming Yang and
               Yun Li and
               Frank Klawonn and
               Antonio J. Tall{\'{o}}n{-}Ballesteros},
  title     = {Privacy-Preserving Scalar Product Computation in Cloud Environments
               Under Multiple Keys},
  booktitle = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2016
               - 17th International Conference, Yangzhou, China, October 12-14, 2016,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9937},
  pages     = {248--258},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-46257-8\_27},
  doi       = {10.1007/978-3-319-46257-8\_27},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ideal/RongWHLX16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RongWLWX16,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Wei Wu and
               Ming Xian},
  title     = {Efficient Integrity Verification of Secure Outsourced kNN Computation
               in Cloud Environments},
  booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  pages     = {236--243},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/TrustCom.2016.0069},
  doi       = {10.1109/TrustCom.2016.0069},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/trustcom/RongWLWX16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/RongWLZX15,
  author    = {Hong Rong and
               Huimei Wang and
               Jian Liu and
               Xiaochen Zhang and
               Ming Xian},
  editor    = {Keqiu Li and
               Heng Qi and
               Jean{-}Luc Gaudiot and
               Jay Kishigami and
               Hongyi Wu and
               Kuan{-}Ching Li and
               Yongwei Wu},
  title     = {WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel
               Based on Memory Deduplication},
  booktitle = {Fifth {IEEE} International Conference on Big Data and Cloud Computing,
               BDCloud 2015, Dalian, China, August 26-28, 2015},
  pages     = {68--75},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://doi.org/10.1109/BDCloud.2015.12},
  doi       = {10.1109/BDCloud.2015.12},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/bdcloud/RongWLZX15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuHRWX15,
  author    = {Jian Liu and
               Kun Huang and
               Hong Rong and
               Huimei Wang and
               Ming Xian},
  title     = {Efficient and secure data forwarding for erasure-code-based cloud
               storage},
  booktitle = {{IEEE} International Conference on Communication, {ICC} 2015, London,
               United Kingdom, June 8-12, 2015, Workshop Proceedings},
  pages     = {1820--1826},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/ICCW.2015.7247445},
  doi       = {10.1109/ICCW.2015.7247445},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icc/LiuHRWX15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/RongXWS13,
  author    = {Hong Rong and
               Ming Xian and
               Huimei Wang and
               Jiangyong Shi},
  editor    = {Sihan Qing and
               Jianying Zhou and
               Dongmei Liu},
  title     = {Time-Stealer: {A} Stealthy Threat for Virtualization Scheduler and
               Its Countermeasures},
  booktitle = {Information and Communications Security - 15th International Conference,
               {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8233},
  pages     = {100--112},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-02726-5\_8},
  doi       = {10.1007/978-3-319-02726-5\_8},
  timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icics/RongXWS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics