


default search action
Boyang Wang 0001
Person information
- affiliation: University of Cincinnati, Department of Electrical Engineering and Computer Science, OH, USA
- affiliation (PhD 2017): University of Arizona, Department of electrical and computer engineering, Tucson, AZ, USA
- affiliation (2012-2013): Utah State University, Department of Computer Science, UT, USA
- affiliation (2010-2012): University of Toronto, Department of Electrical and Computer Engineering, Canada
- affiliation: Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
Other persons with the same name
- Boyang Wang — disambiguation page
- Boyang Wang 0002
— Beijing Institute of Technology, College of Mechanical Engineering, China (and 2 more) - Boyang Wang 0003
— Fudan University, Academy for Engineering and Technology, Shanghai Engineering Research Center of AI and Robotics, China - Boyang Wang 0004
— Xi'an Jiaotong University, School of Electrical Engineering, China - Boyang Wang 0005
— Illinois Institute of Technology, Department of Electrical and Computer Engineering, IL, USA - Boyang Wang 0006 — Beihang University, State Key Lab of Software Development Environment, Beijing, China
- Boyang Wang 0007 — University of Cincinnati, Department of Electrical and Computer Engineering, OH, USA
- Boyang Wang 0008 — University of Michigan, Ann Arbor, MI, USA
- Boyang Wang 0009 — Kunming University of Science and Teachnology, Faculty of Modern Agriculture Engineering, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c34]Xiaolin Li, Ninghui Li, Boyang Wang, Wenhai Sun:
Mitigating Data Poisoning Attacks to Local Differential Privacy. CCS 2025: 1230-1244
[i4]Xiaolin Li, Ninghui Li, Boyang Wang, Wenhai Sun:
Mitigating Data Poisoning Attacks to Local Differential Privacy. CoRR abs/2506.02156 (2025)- 2024
[c33]Mabon Ninan
, Evan Nimmo
, Shane Reilly
, Channing Smith
, Wenhai Sun
, Boyang Wang
, John Marty Emmert
:
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces. RAID 2024: 630-643- 2023
[j16]Hanyu Quan
, Boyang Wang, Ming Li, Iraklis Leontiadis:
FastReach: A system for privacy-preserving reachability queries over location data. Comput. Secur. 135: 103513 (2023)
[c32]Chenggang Wang
, Mabon Ninan
, Shane Reilly
, Joel Ward
, William Hawkins
, Boyang Wang
, John Marty Emmert
:
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies. WISEC 2023: 227-238- 2022
[j15]Boyang Wang
, Yantian Hou
, Ming Li
:
QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data. IEEE Trans. Cloud Comput. 10(3): 2066-2078 (2022)
[j14]Ben Niu, Yahong Chen, Zhibo Wang, Fenghua Li, Boyang Wang, Hui Li:
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE Trans. Mob. Comput. 21(1): 125-138 (2022)
[c31]Hao Liu, Wenhai Sun
, Nan Niu, Boyang Wang:
MultiEvasion: Evasion Attacks Against Multiple Malware Detectors. CNS 2022: 10-18
[c30]Hao Liu, Jimmy Dani, Hongkai Yu, Wenhai Sun
, Boyang Wang:
AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples. IWQoS 2022: 1-10- 2021
[c29]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10- 2020
[j13]Shuo Qiu
, Boyang Wang
, Ming Li
, Jiqiang Liu
, Yanfeng Shi:
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data. IEEE Trans. Cloud Comput. 8(1): 312-323 (2020)
[c28]Chenggang Wang, Boyang Wang, Xinxin Fan:
EcoBoost: Efficient Bootstrapping for Confidential Transactions. IEEE ICBC 2020: 1-3
[c27]Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu:
Sparser: Secure Nearest Neighbor Search with Space-filling Curves. INFOCOM Workshops 2020: 370-375
[c26]Yanjun Pan
, Alon Efrat
, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, Esther M. Arkin:
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. MobiHoc 2020: 151-160
[c25]Haipeng Li, Ben Niu, Boyang Wang:
SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting. SecureComm (1) 2020: 255-275
[c24]Ben Niu, Yahong Chen, Boyang Wang, Jin Cao, Fenghua Li:
Utility-aware Exponential Mechanism for Personalized Differential Privacy. WCNC 2020: 1-6
[c23]Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun
, Boyang Wang:
Fingerprinting encrypted voice traffic on smart speakers with deep learning. WISEC 2020: 254-265
[i3]Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, Esther M. Arkin:
Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach. CoRR abs/2001.08773 (2020)
[i2]Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang:
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning. CoRR abs/2005.09800 (2020)
2010 – 2019
- 2019
[j12]Boyang Wang
, Ming Li
, Li Xiong
:
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. IEEE Trans. Dependable Secur. Comput. 16(2): 245-258 (2019)
[c22]Hao Liu, Boyang Wang, Nan Niu, Shomir Wilson, Xuetao Wei:
Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks. CNS 2019: 109-117
[c21]Hanyu Quan, Hao Liu, Boyang Wang, Ming Li, Yuqing Zhang:
Randex: Mitigating Range Injection Attacks on Searchable Encryption. CNS 2019: 133-141
[c20]Sean Kennedy, Haipeng Li, Chenggang Wang, Hao Liu, Boyang Wang, Wenhai Sun
:
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers. CNS 2019: 232-240
[c19]Xuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu
, Qiang Tang
:
A Behavior-Aware Profiling of Smart Contracts. SecureComm (2) 2019: 245-258- 2018
[j11]Hanyu Quan
, Boyang Wang, Yuqing Zhang
, Gaofei Wu:
Efficient and Secure Top-k Queries With Top Order-Preserving Encryption. IEEE Access 6: 31525-31540 (2018)
[j10]Boyang Wang
, Xinxin Fan:
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 15(6): 1027-1040 (2018)
[c18]Boris Aronov
, Alon Efrat
, Ming Li, Jie Gao, Joseph S. B. Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan, Jiaxin Ding:
Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World. MobiHoc 2018: 280-289
[c17]Boyang Wang, Xinxin Fan:
Lightweight Verification for Searchable Encryption. TrustCom/BigDataSE 2018: 932-937- 2017
[b1]Boyang Wang:
Secure Geometric Search on Encrypted Spatial Data. University of Arizona, Tucson, USA, 2017
[i1]Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. IACR Cryptol. ePrint Arch. 2017: 737 (2017)- 2016
[j9]Boyang Wang, Ming Li, Haitao Wang:
Geometric Range Search on Encrypted Spatial Data. IEEE Trans. Inf. Forensics Secur. 11(4): 704-719 (2016)
[c16]Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. CANS 2016: 419-434
[c15]Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang:
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets. SCC@AsiaCCS 2016: 29-36
[c14]Boyang Wang, Yantian Hou, Ming Li:
Practical and secure nearest neighbor search on encrypted large-scale data. INFOCOM 2016: 1-9- 2015
[j8]Boyang Wang
, Baochun Li, Hui Li:
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans. Serv. Comput. 8(1): 92-106 (2015)
[j7]Yong Yu
, Jianbing Ni, Man Ho Au
, Yi Mu, Boyang Wang, Hui Li:
Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Trans. Serv. Comput. 8(6): 998-999 (2015)
[c13]Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular range search on encrypted spatial data. CNS 2015: 182-190
[c12]Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular Range Search on Encrypted Spatial Data. ICDCS 2015: 794-795- 2014
[j6]Boyang Wang, Hui Li, Xuefeng Liu, Fenghua Li, Xiaoqing Li:
Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Networks 16(6): 592-599 (2014)
[j5]Xuefeng Liu, Yuqing Zhang, Boyang Wang, Huaqun Wang:
An anonymous data aggregation scheme for smart grid systems. Secur. Commun. Networks 7(3): 602-610 (2014)
[j4]Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li, Fenghua Li:
Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Networks 7(11): 2104-2113 (2014)
[j3]Boyang Wang
, Baochun Li, Hui Li:
Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud. IEEE Trans. Cloud Comput. 2(1): 43-56 (2014)
[c11]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li:
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. AsiaCCS 2014: 111-122
[c10]Boyang Wang, Ming Li, Sherman S. M. Chow
, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS 2014: 337-345
[c9]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li:
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy. SecureComm (1) 2014: 374-394- 2013
[j2]Xuefeng Liu, Yuqing Zhang, Boyang Wang, Jingbo Yan:
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Parallel Distributed Syst. 24(6): 1182-1191 (2013)
[c8]Boyang Wang, Baochun Li, Hui Li, Fenghua Li:
Certificateless public auditing for data integrity in the cloud. CNS 2013: 136-144
[c7]Boyang Wang, Ming Li, Sherman S. M. Chow
, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. CNS 2013: 504-513
[c6]Boyang Wang, Hui Li, Ming Li:
Privacy-preserving public auditing for shared cloud data supporting group dynamics. ICC 2013: 1946-1950
[c5]Boyang Wang, Sherman S. M. Chow
, Ming Li, Hui Li:
Storing Shared Data on the Cloud via Security-Mediator. ICDCS 2013: 124-133
[c4]Boyang Wang, Baochun Li, Hui Li:
Public auditing for shared data with efficient user revocation in the cloud. INFOCOM 2013: 2904-2912- 2012
[j1]Boyang Wang, Hui Li, Jin Cao:
An efficient MAC scheme for secure network coding with probabilistic detection. Frontiers Comput. Sci. 6(4): 429-441 (2012)
[c3]Boyang Wang
, Baochun Li, Hui Li:
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. IEEE CLOUD 2012: 295-302
[c2]Boyang Wang, Baochun Li, Hui Li:
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. ACNS 2012: 507-525
[c1]Boyang Wang, Baochun Li, Hui Li:
Gmatch: Secure and privacy-preserving group matching in social networks. GLOBECOM 2012: 726-731
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-05 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







