Follow
Pengfei Wu
Title
Cited by
Cited by
Year
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT
Y Zhang, RH Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics 15 (9), 5099-5108, 2019
1362019
Lightning-fast and privacy-preserving outsourced computation in the cloud
X Liu, RH Deng, P Wu, Y Yang
Cybersecurity 3, 1-21, 2020
192020
大数据计算环境下的隐私保护技术研究进展
钱文君, 沈晴霓, 吴鹏飞, 董春涛, 吴中海
计算机学报 45 (4), 669-701, 2022
17*2022
Combining curriculum learning and knowledge distillation for dialogue generation
Q Zhu, X Chen, P Wu, JF Liu, D Zhao
Findings of the Association for Computational Linguistics: EMNLP 2021, 1284-1295, 2021
162021
ObliDC: An SGX-based oblivious distributed computing framework with formal proof
P Wu, Q Shen, RH Deng, X Liu, Y Zhang, Z Wu
ACM Asia Conference on Computer and Communications Security (AsiaCCS), 86-99, 2019
132019
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis
X Wang, Q Shen, W Luo, P Wu
IEEE International Conference on Cloud Computing (IEEE Cloud), 600-608, 2020
112020
Exploring dynamic task loading in SGX-based distributed computing
P Wu, J Ning, W Luo, X Huang, D He
IEEE Transactions on Services Computing 16 (1), 288-301, 2021
92021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
J Sun, H Xiong, X Nie, Y Zhang, P Wu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2518-2519, 2019
92019
Rphx: Result Pattern Hiding Conjunctive Query over Private Compressed Index Using Intel SGX
Q Jiang, EC Chang, Y Qi, S Qi, P Wu, J Wang
IEEE Transactions on Information Forensics and Security 17, 1053-1068, 2022
82022
SGX应用支持技术研究进展
董春涛, 沈晴霓, 罗武, 吴鹏飞, 吴中海
软件学报 32 (1), 137-166, 2020
8*2020
Hybrid Trust Multi-party Computation with Trusted Execution Environment
P Wu, J Ning, J Shen, H Wang, EC Chang
Network and Distributed System Security Symposium (NDSS), 2022
72022
Differentially oblivious data analysis with Intel SGX: Design, optimization, and evaluation
P Wu, Q Li, J Ning, X Huang, W Wu
IEEE Transactions on Dependable and Secure Computing 19 (6), 3741-3758, 2021
62021
T-Counter: Trustworthy and Efficient CPU Resource Measurement using SGX in the Cloud
C Dong, Q Shen, X Ding, D Yu, W Luo, P Wu, Z Wu
IEEE Transactions on Dependable and Secure Computing 20 (1), 867-885, 2022
52022
ObliComm: Towards Building an Efficient Oblivious Communication System
P Wu, R Deng, Q Shen, X Liu, Q Li, Z Wu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2331-2348, 2019
32019
Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE
L Yao, J Weng, P Wu, X Li, Y Liu, J Lai, G Yang, RH Deng
Cryptology ePrint Archive, 2024
2*2024
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes
M Deng, K Zhang, P Wu, M Wen, J Ning
IEEE Transactions on Cloud Computing 11 (4), 3510-3524, 2023
12023
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities
W Luo, X Ding, P Wu, X Zhang, Q Shen, Z Wu
Network and Distributed System Security Symposium (NDSS), 2022
12022
A new framework for privacy-preserving biometric-based remote user authentication
Y Tian, Y Li, RH Deng, N Li, P Wu, A Liu
Journal of computer security 28 (4), 469-498, 2020
12020
不经意随机访问机研究综述
吴鹏飞, 沈晴霓, 秦嘉, 钱文君, 李聪, 吴中海
软件学报 29 (9), 2753-2777, 2018
12018
Privacy-preserving and verifiable data aggregation for Internet of Vehicles
F Zhou, Q Wu, P Wu, J Xu, D Feng
Computer Communications 218, 198-208, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20