List of Publications in Cloud Computing Area

2024

  1. Jin Wang, Wei Jiang, Jingya Zhou, Zhaobo Lu, Kejie Lu, and Jianping Wang, "Partial Decode and Compare: An Efficient Verification Scheme for Coded Edge Computing," IEEE Transactions on Cloud Computing, Vol. 12, No. 2, pp. 431-445, Jun. 2024. [bib]

2020

  1. Weiwei Wu, Jianping Wang, Kejie Lu, Wen Qi, Feng Shan, Junzhou Luo, "Providing Service Continuity in Clouds under Power Outage," IEEE Transactions on Services Computing, Vol. 13, No. 5, pp. 930-943, Sept. 2020. [bib]

2019

  1. Jinguo Li, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li, "Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds," Springer Peer-to-Peer Networking and Applications, Vol. 12, No. 4, pp. 893-911, Jul 2019. [bib]

2018

  1. Hermine Hovhannisyan, Wen Qi, Kejie Lu, Rongwei Yang, Jianping Wang, "Whispers in the cloud storage: A novel cross-user deduplication-based covert channel design," Peer-to-Peer Networking and Applications, Vol. 11, No. 2, pp. 277-286, Mar. 2018. [bib]
  2. Weigang Hou, Rui Zhang, Wen Qi, Kejie Lu, Jianping Wang, Lei Guo, "A Provident Resource Defragmentation Framework for Mobile Cloud Computing," IEEE Transactions on Emerging Topics in Computing, Vol. 6, No. 1, pp. 32-44, Jan. 2018. [bib]

2017

  1. Bingyi Liu, Dongyao Jia, Jianping Wang, Kejie Lu, Libing Wu, "Cloud-Assisted Safety Message Dissemination in VANET-Cellular Heterogeneous Wireless Network," IEEE System Journal, Vol. 11, No. 1, pp. 128-139, Mar. 2017. [bib]

2016

  1. Jinguo Li, Mi Wen, Kejie Lu, and Chunhua Gu, "PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data," Security and Communication Networks, Vol. 9, No. 16, pp. 3765-3776, Nov. 2016. [bib]
  2. Wen Qi, Jin Wang, Hermine Hovhannisyan, Kejie Lu, Jianping Wang, Junda Zhu, "A Generic Mitigation Framework against Cross - VM Covert Channels," in Proc. IEEE ICCCN 2016, Aug. 2016. [bib]
  3. Juntao Wang, Xun Xiao, Jianping Wang, Kejie Lu, Xiaotie Deng, Ashwin A Gumaste, "When group-buying meets cloud computing," in Proc. IEEE INFOCOM 2016, Apr. 2016. [bib]

2015

  1. Hermine Hovhannisyan, Kejie Lu, Rongwei Yang, Wen Qi, Jianping Wang, Mi Wen, "A Novel Deduplication-Based Covert Channel in Cloud Storage Service," in Proc. IEEE Globecom 2015, Dec. 2015. [bib]
  2. Mi Wen, Kejie Lu, Jingsheng Lei, Fengyong Li, Jing Li, "BDO-SD: An Efficient Scheme for Big Data Outsourcing with Secure Deduplication," in Proc. IEEE INFOCOM 2015, Workshop on BigData Security (BigSecurity), Apr. 2015. [bib]