D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 44 Citations 28,727 201 World Ranking 4671 National Ranking 432

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Database

Cong Wang mainly investigates Server, Information privacy, Encryption, Computer security and Cryptography. His Server research includes themes of Data security and Distributed computing. His Information privacy research is multidisciplinary, incorporating elements of The Internet and Service.

The study incorporates disciplines such as Ranking, Edit distance, Data mining and Database in addition to Encryption. While the research belongs to areas of Computer security, Cong Wang spends his time largely on the problem of Cloud computing security, intersecting his research to questions surrounding Storage security and Data integrity. His studies in Cryptography integrate themes in fields like Information retrieval and Relevance.

His most cited work include:

  • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing (1460 citations)
  • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (1136 citations)
  • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (1115 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Encryption, Computer security, Server, Computer network and Cryptography. His study in Encryption is interdisciplinary in nature, drawing from both Scalability, Database and Information privacy. Cong Wang usually deals with Information privacy and limits it to topics linked to Cloud storage and Data integrity.

In his study, Storage security is strongly linked to Cloud computing security, which falls under the umbrella field of Computer security. His Server research incorporates elements of Ciphertext and Distributed computing, Distributed database. Cryptography connects with themes related to Key in his study.

He most often published in these fields:

  • Encryption (43.01%)
  • Computer security (36.27%)
  • Server (24.35%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (36.27%)
  • Encryption (43.01%)
  • Server (24.35%)

In recent papers he was focusing on the following fields of study:

Cong Wang mostly deals with Computer security, Encryption, Server, Blockchain and Cryptography. His Smart contract study in the realm of Computer security interacts with subjects such as Situation awareness. Cong Wang has researched Encryption in several fields, including Scalability and Theoretical computer science.

His study explores the link between Scalability and topics such as Overhead that cross with problems in Data mining, Data integrity and Public-key cryptography. His research in Server intersects with topics in Middlebox, Ciphertext, Information privacy and Distributed computing. The concepts of his Cryptography study are interwoven with issues in Traitor tracing, Inference and Access control.

Between 2019 and 2021, his most popular works were:

  • Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data (44 citations)
  • The Security of Autonomous Driving: Threats, Defenses, and Future Directions (32 citations)
  • Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery (25 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Database

His main research concerns Encryption, Computer security, Server, Distributed computing and Ciphertext. Cong Wang integrates Encryption with Outsourcing in his study. When carried out as part of a general Computer security research project, his work on Data integrity and Public-key cryptography is frequently linked to work in Global Positioning System and Perception, therefore connecting diverse disciplines of study.

His Server research integrates issues from Plaintext, Homomorphic encryption, Range query and Obfuscation. His Distributed computing research is multidisciplinary, incorporating perspectives in Data modeling, Information privacy and Upload. Ciphertext is a primary field of his research addressed under Computer network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Ning Cao;Cong Wang;Ming Li;Kui Ren.
IEEE Transactions on Parallel and Distributed Systems (2014)

4048 Citations

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)

3030 Citations

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)

2614 Citations

Ensuring Data Storage Security in Cloud Computing.

Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
IACR Cryptology ePrint Archive (2009)

2116 Citations

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)

1838 Citations

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)

1537 Citations

Enabling public verifiability and data dynamics for storage security in cloud computing

Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)

1475 Citations

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)

1267 Citations

Secure Ranked Keyword Search over Encrypted Cloud Data

Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)

1075 Citations

Security Challenges for the Public Cloud

Kui Ren;Cong Wang;Qian Wang.
IEEE Internet Computing (2012)

1072 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Cong Wang

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 81

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 65

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 59

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 50

Kui Ren

Kui Ren

Zhejiang University

Publications: 50

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 45

Xingming Sun

Xingming Sun

Nanjing University of Information Science and Technology

Publications: 42

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 42

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 40

Hongwei Li

Hongwei Li

University of Electronic Science and Technology of China

Publications: 36

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 36

Liehuang Zhu

Liehuang Zhu

Beijing Institute of Technology

Publications: 35

Zheng Yan

Zheng Yan

Xidian University

Publications: 34

Yi Mu

Yi Mu

Fujian Normal University

Publications: 33

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 31

Qian Wang (王骞)

Qian Wang (王骞)

Wuhan University

Publications: 30

Trending Scientists

Steven M. Drucker

Steven M. Drucker

Microsoft (United States)

Husheng Li

Husheng Li

University of Tennessee at Knoxville

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Nir Tessler

Nir Tessler

Technion – Israel Institute of Technology

Jean-François Lutz

Jean-François Lutz

University of Strasbourg

Taka-aki Okamura

Taka-aki Okamura

Osaka University

William W. Christie

William W. Christie

James Hutton Institute

Dimo Kashchiev

Dimo Kashchiev

Bulgarian Academy of Sciences

Josef Altenbuchner

Josef Altenbuchner

University of Stuttgart

Gary J. Hampson

Gary J. Hampson

Imperial College London

W. David Rust

W. David Rust

National Oceanic and Atmospheric Administration

Ioannis A. Katsoyiannis

Ioannis A. Katsoyiannis

Aristotle University of Thessaloniki

Patrick L. Hill

Patrick L. Hill

Washington University in St. Louis

Jan J. Piek

Jan J. Piek

University of Amsterdam

Darren M. Scott

Darren M. Scott

McMaster University

Something went wrong. Please try again later.