default search action
Wenting Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Hao Zhou, Wenting Shen, Jinlu Liu:
Certificate-based multi-copy cloud storage auditing supporting data dynamics. Comput. Secur. 148: 104096 (2025) - [j23]Wei Cao, Wenting Shen, Jing Qin, Hao Lin:
Privacy-preserving and verifiable convolution neural network inference and training in cloud computing. Future Gener. Comput. Syst. 164: 107560 (2025) - 2024
- [j22]Jingze Yu, Wenting Shen:
Secure cloud storage auditing with deduplication and efficient data transfer. Clust. Comput. 27(2): 2203-2215 (2024) - [j21]Qun Zhou, Wenting Shen:
PPFLV: privacy-preserving federated learning with verifiability. Clust. Comput. 27(9): 12727-12743 (2024) - [j20]Yinghui Huang, Wenting Shen, Jing Qin:
Certificateless cloud storage auditing supporting data ownership transfer. Comput. Secur. 139: 103738 (2024) - [j19]Jingze Yu, Wenting Shen, Xi Zhang:
Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR. Comput. Secur. 144: 103932 (2024) - [j18]Jiewang Cai, Wenting Shen, Jing Qin:
ESVFL: Efficient and secure verifiable federated learning with privacy-preserving. Inf. Fusion 109: 102420 (2024) - [j17]Min Wang, Jia Yu, Wenting Shen, Rong Hao:
Privacy-Preserving Time-Based Auditing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 19: 7866-7878 (2024) - [j16]Wenting Shen, Chao Gai, Jia Yu, Ye Su:
Keyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics. IEEE Trans. Serv. Comput. 17(5): 2516-2529 (2024) - 2023
- [j15]Yinghui Huang, Wenting Shen, Jing Qin, Huiying Hou:
Privacy-preserving certificateless public auditing supporting different auditing frequencies. Comput. Secur. 128: 103181 (2023) - [j14]Wei Cao, Wenting Shen, Zhixiang Zhang, Jing Qin:
Privacy-preserving healthcare monitoring for IoT devices under edge computing. Comput. Secur. 134: 103464 (2023) - [j13]Chao Gai, Wenting Shen, Ming Yang, Jia Yu:
PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data. IEEE Internet Things J. 10(22): 20065-20079 (2023) - [j12]Wenting Shen, Jia Yu, Ming Yang, Jiankun Hu:
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(6): 4593-4606 (2023) - [j11]Wenting Shen, Yaonan Wang, Min Liu, Jiazheng Wang, Renjie Ding, Zhe Zhang, Erik Meijering:
Branch Aggregation Attention Network for Robotic Surgical Instrument Segmentation. IEEE Trans. Medical Imaging 42(11): 3408-3419 (2023) - [c6]Xi Zhang, Ye Su, Zhongkai Wei, Wenting Shen, Jing Qin:
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security. AIS&P (1) 2023: 342-357 - [c5]Yangjie Zhou, Jingwen Leng, Yaoxu Song, Shuwen Lu, Mian Wang, Chao Li, Minyi Guo, Wenting Shen, Yong Li, Wei Lin, Xiangwen Liu, Hanqing Wu:
uGrapher: High-Performance Graph Operator Computation via Unified Abstraction for Graph Neural Networks. ASPLOS (2) 2023: 878-891 - [c4]Jie Sun, Li Su, Zuocheng Shi, Wenting Shen, Zeke Wang, Lei Wang, Jie Zhang, Yong Li, Wenyuan Yu, Jingren Zhou, Fei Wu:
Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training. USENIX ATC 2023: 165-179 - [i2]Jie Sun, Li Su, Zuocheng Shi, Wenting Shen, Zeke Wang, Lei Wang, Jie Zhang, Yong Li, Wenyuan Yu, Jingren Zhou, Fei Wu:
Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training. CoRR abs/2305.16588 (2023) - 2022
- [i1]Baole Ai, Zhou Qin, Wenting Shen, Yong Li:
Structure Enhanced Graph Neural Networks for Link Prediction. CoRR abs/2201.05293 (2022) - 2021
- [j10]Xiang Gao, Jia Yu, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Inf. Sci. 546: 177-191 (2021) - [j9]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu, Jixin Ma:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - [c3]Chunyou Su, Hao Liang, Wei Zhang, Kun Zhao, Baole Ai, Wenting Shen, Zeke Wang:
Graph Sampling with Fast Random Walker on HBM-enabled FPGA Accelerators. FPL 2021: 211-218 - 2020
- [j8]Wenting Shen, Ye Su, Rong Hao:
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection. IEEE Access 8: 44359-44372 (2020)
2010 – 2019
- 2019
- [j7]Wenting Shen, Jing Qin, Jixin Ma:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. Secur. Commun. Networks 2019: 8275074:1-8275074:15 (2019) - [j6]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(2): 331-346 (2019) - 2017
- [j5]Wenting Shen, Guangyang Yang, Jia Yu, Hanlin Zhang, Fanyu Kong, Rong Hao:
Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener. Comput. Syst. 76: 136-145 (2017) - [j4]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - 2016
- [j3]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A public cloud storage auditing scheme for resource-constrained clients. Int. J. High Perform. Syst. Archit. 6(3): 121-130 (2016) - [j2]Wenting Shen, Jia Yu, Guangyang Yang, Yue Zhang, Zhangjie Fu, Rong Hao:
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data. KSII Trans. Internet Inf. Syst. 10(7): 3319-3338 (2016) - [j1]Guangyang Yang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao:
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113: 130-139 (2016) - [c2]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - 2015
- [c1]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 3PGCIC 2015: 36-39
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint