Follow
Pengfei Wu
Title
Cited by
Cited by
Year
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT
Y Zhang, RH Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics 15 (9), 5099-5108, 2019
1452019
Combining curriculum learning and knowledge distillation for dialogue generation
Q Zhu, X Chen, P Wu, JF Liu, D Zhao
Findings of the Association for Computational Linguistics: EMNLP 2021, 1284-1295, 2021
202021
Research progress on privacy-preserving techniques in big data computing environment
W Qian, Q Shen, P Wu, C Dong, Z Wu
Chinese Journal of Computers 45 (4), 669-701, 2022
19*2022
Lightning-fast and privacy-preserving outsourced computation in the cloud
X Liu, RH Deng, P Wu, Y Yang
Cybersecurity 3, 1-21, 2020
192020
ObliDC: An SGX-based oblivious distributed computing framework with formal proof
P Wu, Q Shen, RH Deng, X Liu, Y Zhang, Z Wu
ACM Asia Conference on Computer and Communications Security (AsiaCCS), 86-99, 2019
132019
Rphx: Result Pattern Hiding Conjunctive Query over Private Compressed Index Using Intel SGX
Q Jiang, EC Chang, Y Qi, S Qi, P Wu, J Wang
IEEE Transactions on Information Forensics and Security 17, 1053-1068, 2022
122022
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis
X Wang, Q Shen, W Luo, P Wu
IEEE International Conference on Cloud Computing (IEEE Cloud), 600-608, 2020
122020
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
J Sun, H Xiong, X Nie, Y Zhang, P Wu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2518-2519, 2019
112019
Exploring dynamic task loading in SGX-based distributed computing
P Wu, J Ning, W Luo, X Huang, D He
IEEE Transactions on Services Computing 16 (1), 288-301, 2021
102021
Hybrid Trust Multi-party Computation with Trusted Execution Environment
P Wu, J Ning, J Shen, H Wang, EC Chang
Network and Distributed System Security Symposium (NDSS), 2022
92022
Research progress of SGX application supporting techniques
C Dong, Q Shen, W Luo, P Wu, Z Wu
Journal of Software 32 (1), 137-166, 2020
72020
Differentially oblivious data analysis with Intel SGX: Design, optimization, and evaluation
P Wu, Q Li, J Ning, X Huang, W Wu
IEEE Transactions on Dependable and Secure Computing 19 (6), 3741-3758, 2021
62021
T-Counter: Trustworthy and Efficient CPU Resource Measurement using SGX in the Cloud
C Dong, Q Shen, X Ding, D Yu, W Luo, P Wu, Z Wu
IEEE Transactions on Dependable and Secure Computing 20 (1), 867-885, 2022
52022
Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE
L Yao, J Weng, P Wu, X Li, Y Liu, J Lai, G Yang, RH Deng
Cryptology ePrint Archive, 2024
3*2024
ObliComm: Towards Building an Efficient Oblivious Communication System
P Wu, R Deng, Q Shen, X Liu, Q Li, Z Wu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2331-2348, 2019
32019
Survey of Oblivious RAM
P Wu, Q Shen, J Qin, W Qian, C Li, Z Wu
Journal of Software 29 (9), 2753-2777, 2018
3*2018
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
F Li, J Ma, Y Miao, P Wu, X Song
European Symposium on Research in Computer Security (ESORICS), 126-146, 2023
12023
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes
M Deng, K Zhang, P Wu, M Wen, J Ning
IEEE Transactions on Cloud Computing 11 (4), 3510-3524, 2023
12023
Differentially Oblivious Two-party Pattern Matching with Sublinear Round Complexity
P Wu, J Ning, X Huang, JK Liu
IEEE Transactions on Dependable and Secure Computing 20 (5), 4101-4117, 2022
12022
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities
W Luo, X Ding, P Wu, X Zhang, Q Shen, Z Wu
Network and Distributed System Security Symposium (NDSS), 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20