Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT Y Zhang, RH Deng, D Zheng, J Li, P Wu, J Cao IEEE Transactions on Industrial Informatics 15 (9), 5099-5108, 2019 | 145 | 2019 |
Combining curriculum learning and knowledge distillation for dialogue generation Q Zhu, X Chen, P Wu, JF Liu, D Zhao Findings of the Association for Computational Linguistics: EMNLP 2021, 1284-1295, 2021 | 20 | 2021 |
Research progress on privacy-preserving techniques in big data computing environment W Qian, Q Shen, P Wu, C Dong, Z Wu Chinese Journal of Computers 45 (4), 669-701, 2022 | 19* | 2022 |
Lightning-fast and privacy-preserving outsourced computation in the cloud X Liu, RH Deng, P Wu, Y Yang Cybersecurity 3, 1-21, 2020 | 19 | 2020 |
ObliDC: An SGX-based oblivious distributed computing framework with formal proof P Wu, Q Shen, RH Deng, X Liu, Y Zhang, Z Wu ACM Asia Conference on Computer and Communications Security (AsiaCCS), 86-99, 2019 | 13 | 2019 |
Rphx: Result Pattern Hiding Conjunctive Query over Private Compressed Index Using Intel SGX Q Jiang, EC Chang, Y Qi, S Qi, P Wu, J Wang IEEE Transactions on Information Forensics and Security 17, 1053-1068, 2022 | 12 | 2022 |
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis X Wang, Q Shen, W Luo, P Wu IEEE International Conference on Cloud Computing (IEEE Cloud), 600-608, 2020 | 12 | 2020 |
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting J Sun, H Xiong, X Nie, Y Zhang, P Wu IEEE Transactions on Dependable and Secure Computing 18 (5), 2518-2519, 2019 | 11 | 2019 |
Exploring dynamic task loading in SGX-based distributed computing P Wu, J Ning, W Luo, X Huang, D He IEEE Transactions on Services Computing 16 (1), 288-301, 2021 | 10 | 2021 |
Hybrid Trust Multi-party Computation with Trusted Execution Environment P Wu, J Ning, J Shen, H Wang, EC Chang Network and Distributed System Security Symposium (NDSS), 2022 | 9 | 2022 |
Research progress of SGX application supporting techniques C Dong, Q Shen, W Luo, P Wu, Z Wu Journal of Software 32 (1), 137-166, 2020 | 7 | 2020 |
Differentially oblivious data analysis with Intel SGX: Design, optimization, and evaluation P Wu, Q Li, J Ning, X Huang, W Wu IEEE Transactions on Dependable and Secure Computing 19 (6), 3741-3758, 2021 | 6 | 2021 |
T-Counter: Trustworthy and Efficient CPU Resource Measurement using SGX in the Cloud C Dong, Q Shen, X Ding, D Yu, W Luo, P Wu, Z Wu IEEE Transactions on Dependable and Secure Computing 20 (1), 867-885, 2022 | 5 | 2022 |
Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE L Yao, J Weng, P Wu, X Li, Y Liu, J Lai, G Yang, RH Deng Cryptology ePrint Archive, 2024 | 3* | 2024 |
ObliComm: Towards Building an Efficient Oblivious Communication System P Wu, R Deng, Q Shen, X Liu, Q Li, Z Wu IEEE Transactions on Dependable and Secure Computing 18 (5), 2331-2348, 2019 | 3 | 2019 |
Survey of Oblivious RAM P Wu, Q Shen, J Qin, W Qian, C Li, Z Wu Journal of Software 29 (9), 2753-2777, 2018 | 3* | 2018 |
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage F Li, J Ma, Y Miao, P Wu, X Song European Symposium on Research in Computer Security (ESORICS), 126-146, 2023 | 1 | 2023 |
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes M Deng, K Zhang, P Wu, M Wen, J Ning IEEE Transactions on Cloud Computing 11 (4), 3510-3524, 2023 | 1 | 2023 |
Differentially Oblivious Two-party Pattern Matching with Sublinear Round Complexity P Wu, J Ning, X Huang, JK Liu IEEE Transactions on Dependable and Secure Computing 20 (5), 4101-4117, 2022 | 1 | 2022 |
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities W Luo, X Ding, P Wu, X Zhang, Q Shen, Z Wu Network and Distributed System Security Symposium (NDSS), 2022 | 1 | 2022 |