Journal Publications

[1]       Yongzhi Wang, X. Zhang, Y. Wu and Y. Shen, "Enhancing Leakage Prevention for MapReduce," in IEEE Transactions on Information Forensics and Security (TIFS), vol. 17, pp. 1558-1572, 2022, doi: 10.1109/TIFS.2022.3166641.

[2]       Yongzhi Wang, Y. Zou, Y. Shen and Y. Liu, "CFHider: Protecting Control Flow Confidentiality with Intel SGX" in IEEE Transactions on Computers (TC), vol. , no. 01, pp. 1-1, 5555. doi: 10.1109/TC.2021.3122903

[3]       Yongzhi Wang, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu, Xuewen Dong, “CryptSQLite: SQLite with High Data Security” in IEEE Transactions on Computers (TC), vol. 69, no. 5, pp. 666-678, 1 May 2020.

[4]       Yongzhi Wang, Yulong Shen and Xiaohong Jiang, "Practical Verifiable Computation–A MapReduce Case Study," in IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 6, pp. 1376-1391, June 2018.

[5]       Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang, MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications. IEEE Transactions on Big Data. Vol. 4, No. 3, pp 418-431, Sep, 2018

[6]       Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu, Exploiting Content Delivery Networks for Covert Channel Communications, Elsevier Journal of Computer Communications, 2017, Vol. 99:pp 84-92.

[7]       Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang, Xiaohong Jiang, MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation, IEEE Communications Magazine, 2017, Vol. 55, Issue 9, pp 86-93.

[8]       Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong, Secure K-NN Query on Encrypted Cloud Data with Multiple Keys, IEEE Transactions on Big Data, Vol, PP, No. 99, 2016

[9]       Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen, Toward integrity assurance of outsourced computing - a game theoretic perspective, Elsevier Journal of Future Generation Computer Systems (FGCS), 2016, 55:87-100.

[10]    Yongzhi Wang, Jinpeng Wei. “Towards Protecting Control Flow Confidentiality on Cloud Based Computation.” Elsevier Journal of Computers and Security (Computers & Security). Vol. 52, pp.106-127, July 2015. doi:10.1016/j.cose.2015.04.005.

[11]    Yongzhi Wang, Jinpeng Wei, Yucong Duan. “Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework.” International Journal of Grid and Distributed Computing (IJGDC), Vol. 7, No. 6, 2014, pages 53-77.

[12]    Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. “Cross Cloud MapReduce: A Result Integrity Check Framework on Hybrid Clouds”. International Journal of Cloud Computing (IJCC), Vol. 1, No. 1, 2013, pages 26-39.

[13]    Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du, “Service Value Broker Patterns: An Empirical Collection and Analysis”. International Journal of Networked and Distributed Computing (IJNDC), Vol. 2, No. 1, 2013, pages 54-69.

[14]    Yongzhi Wang, Zhenguo Ding “Research on the Protocol Analysis Module Based on the TCP Splicing Method”. Science Technology and Engineering (Chinese Journal). Vol. 7, no. 5, 2007, pages 782-785.

Conference Publications (Full Papers)

[15]    Yongzhi Wang, Wen-Jung Hsin, Manish Lamsal, EdGENI: Making GENI User-Friendly for General Computer Education, The 53rd ACM Technical Symposium on Computer Science Education (SIGCSE2022), March 2 - March 5, Providence, Rhode Island, USA.

[16]    Ke Cheng, Liangmin Wang, Yulong Shen, Yangyang Liu, Yongzhi Wang, Lele Zheng, A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees, IEEE Conference on Computer Communications (INFOCOM’20), July 6- July 9. 2020, Virtual Conference (Due to COVID-19).

[17]    Anter Faree, Yongzhi Wang, Protecting Security-Sensitive Data Using Program Transformation and Intel SGX, 2019 International Conference on Networking and Network Applications (NaNA’19), Oct 10-Oct 13, 2019, Daegu City, South Korea.

[18]    Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, and Yao Liu, “CFHider: Control Flow Obfuscation with Intel SGX”, IEEE Conference on Computer Communications (INFOCOM’19), Apr 29- May 2. 2019, Paris, France.

[19]    Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Xiaohong Jiang, Jian-feng Ma, Cuicui Su, “Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys”, IEEE Conference on Computer Communications (INFOCOM’19), Apr 29- May 2. 2019, Paris, France.

[20]    Zhu, Feng, Youngtae Yun, Jinpeng Wei, Brent Byunghoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, and Ruchuan Wang. "A Reflective Covert Channel Attack Anchored on Trusted Web Services." In International Conference on Web Services (ICWS ’18), pp. 84-99. Springer, Cham, 2018.

[21]    Yongzhi Wang, Lingtong Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang, Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong, "CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX", 2017 International Conference on Networking and Network Applications, Oct 16 – Oct 19, 2017, Katmandu, Nepal. (Best paper award)

[22]    Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma, "Improving Database Storage Usability with the Cloud-based Architecture", IEEE 2nd International Conference on Data Science in Cyberspace (DSC), June. 26- June. 29, 2017, Shenzhen, China.

[23]    Yucong Duan, Nanjangud Narendra, Wencai Du, Yongzhi Wang, Nianjun Zhou, “Exploring Cloud Service Brokering from an Interface Perspective” 21th IEEE International Conference on Web Services (IEEE ICWS 2014), June 27 – July 2, 2014, Alaska, USA.

[24]    Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur and Wencai Du "Value Added Modeling and Analysis on Service Value Brokerage". The 1st International Workshop on Cloud Service Brokerage (CSB 2013), co-located with the 11th International Conference on Service Oriented Computing (ICSOC 2013), Berlin, Germany, December 2-5, 2013, pages 209-222.

[25]    Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, and Wencai Du. "IntegrityMR: Integrity Assurance Framework for Big Data Analytics and Management Applications". Proceedings of the IEEE International Conference on Big Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop, October 6-9, 2013, pages 17-24.

[26]    Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, and Wencai Du. "Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective". Proceedings of the IEEE International Conference on Big Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop, October 6-9, 2013, pages 33-40.

[27]    Yongzhi Wang, Jinpeng Wei, and Mudhakar Srivatsa. "Result Integrity Check for MapReduce Computation on Hybrid Clouds". Proceedings of the 6th IEEE International Conference on Cloud Computing (IEEE CLOUD 2013), IEEE Computer Society, Santa Clara, CA, June 27-July 2, 2013, pages 847-854.

[28]    Yongzhi Wang, Jinpeng Wei. "VIAF: Verification-based Integrity Assurance Framework for MapReduce". Proceedings of the fourth IEEE International Conference on Cloud Computing (IEEE CLOUD 2011), IEEE Computer Society, Washington DC, July 4-9, 2011, pages 300-307.

Conference Publications (Poster Papers)

[29]    Yongzhi Wang, Wen-Jung Hsin, Improving User Experience for GENI-based Cybersecurity Labs, ACM Special Interest Group on Computer Science Education Technical Symposium (SIGCSE2020), March 11 - March 14, Portland, Oregon, USA. Poster paper.

[30]    Xiaoyu Zhang, Yongzhi Wang, Yu Zou, Reconsidering Leakage Prevention in MapReduce, IEEE Conference on Computer Communications (INFOCOM’ 20), July 6- July 9. 2020, Virtual Conference (Due to COVID-19), Poster paper.

[31]    Yu Zou, Yongzhi Wang, Xiaoyu Zhang, Enforcing Control Flow Confidentiality with SGX, IEEE Conference on Computer Communications (INFOCOM’ 20), July 6- July 9. 2020, Virtual Conference (Due to COVID-19), Poster paper.

[32]    Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, and Anter Faree. 2018. Obfuscating program control flow with Intel SGX. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings (ICSE '18). ACM, New York, NY, USA, 321-322., Poster Paper.

[33]    Yongzhi Wang, Yulong Shen, “RIA – An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications”, 23rd ACM Conference on Computer and Communications Security (ACM CCS 2016), Oct 24-28, 2016, Vienna, Austria. Poster Paper.

[34]    Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. "Cross Cloud MapReduce: an Uncheatable MapReduce". The 33rd IEEE Symposium on Security and Privacy (IEEE S&P 2012), San Francisco, CA, May 20-23, 2012. Poster paper.

Book Chapter

[35]    Yongzhi Wang, "Technical Details and Educational Application for Virtual Reality Technologies", in Current and Prospective Applications of Virtual Reality in Higher Education, pp. 74-95. IGI Global, 2021