H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 40 Citations 27,753 161 World Ranking 4588 National Ranking 429

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Database

Cong Wang mainly investigates Server, Information privacy, Encryption, Computer security and Cryptography. His Server research includes themes of Data security and Distributed computing. His Information privacy research is multidisciplinary, incorporating elements of The Internet and Service.

The study incorporates disciplines such as Ranking, Edit distance, Data mining and Database in addition to Encryption. While the research belongs to areas of Computer security, Cong Wang spends his time largely on the problem of Cloud computing security, intersecting his research to questions surrounding Storage security and Data integrity. His studies in Cryptography integrate themes in fields like Information retrieval and Relevance.

His most cited work include:

  • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing (1460 citations)
  • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (1136 citations)
  • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (1115 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Encryption, Computer security, Server, Computer network and Cryptography. His study in Encryption is interdisciplinary in nature, drawing from both Scalability, Database and Information privacy. Cong Wang usually deals with Information privacy and limits it to topics linked to Cloud storage and Data integrity.

In his study, Storage security is strongly linked to Cloud computing security, which falls under the umbrella field of Computer security. His Server research incorporates elements of Ciphertext and Distributed computing, Distributed database. Cryptography connects with themes related to Key in his study.

He most often published in these fields:

  • Encryption (43.01%)
  • Computer security (36.27%)
  • Server (24.35%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (36.27%)
  • Encryption (43.01%)
  • Server (24.35%)

In recent papers he was focusing on the following fields of study:

Cong Wang mostly deals with Computer security, Encryption, Server, Blockchain and Cryptography. His Smart contract study in the realm of Computer security interacts with subjects such as Situation awareness. Cong Wang has researched Encryption in several fields, including Scalability and Theoretical computer science.

His study explores the link between Scalability and topics such as Overhead that cross with problems in Data mining, Data integrity and Public-key cryptography. His research in Server intersects with topics in Middlebox, Ciphertext, Information privacy and Distributed computing. The concepts of his Cryptography study are interwoven with issues in Traitor tracing, Inference and Access control.

Between 2019 and 2021, his most popular works were:

  • Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data (44 citations)
  • The Security of Autonomous Driving: Threats, Defenses, and Future Directions (32 citations)
  • Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery (25 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Database

His main research concerns Encryption, Computer security, Server, Distributed computing and Ciphertext. Cong Wang integrates Encryption with Outsourcing in his study. When carried out as part of a general Computer security research project, his work on Data integrity and Public-key cryptography is frequently linked to work in Global Positioning System and Perception, therefore connecting diverse disciplines of study.

His Server research integrates issues from Plaintext, Homomorphic encryption, Range query and Obfuscation. His Distributed computing research is multidisciplinary, incorporating perspectives in Data modeling, Information privacy and Upload. Ciphertext is a primary field of his research addressed under Computer network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)

2691 Citations

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)

2354 Citations

Ensuring data storage security in Cloud Computing

Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international workshop on quality of service (2009)

2071 Citations

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Ning Cao;Cong Wang;Ming Li;Kui Ren.
international conference on computer communications (2011)

1703 Citations

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)

1516 Citations

Enabling public verifiability and data dynamics for storage security in cloud computing

Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)

1322 Citations

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)

1317 Citations

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)

1099 Citations

Secure Ranked Keyword Search over Encrypted Cloud Data

Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)

939 Citations

Attribute based data sharing with attribute revocation

Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
computer and communications security (2010)

935 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Cong Wang

Jin Li

Jin Li

Guangzhou University

Publications: 81

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 65

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 59

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 50

Kui Ren

Kui Ren

Zhejiang University

Publications: 50

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 45

Xingming Sun

Xingming Sun

Nanjing University of Information Science and Technology

Publications: 42

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 42

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 40

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 36

Liehuang Zhu

Liehuang Zhu

Beijing Institute of Technology

Publications: 35

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 34

Yi Mu

Yi Mu

Fujian Normal University

Publications: 33

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 31

Pierangela Samarati

Pierangela Samarati

University of Milan

Publications: 30

Something went wrong. Please try again later.