Publications

Note: PDF copies of our research papers on this website should be used for education purposes only.

Conference Papers

  1. Haipeng Li. Mabon Ninan, Boyang Wang, and John M. Emmert
    “TinyPower: Side-Channel Attacks with Tiny Neural Networks”
    IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2024), Washington DC, May 6-9, 2024.
    Code & Datasets, Paper PDF

  2. Andrew Kosikowski, Daniel (Jun) Cho, Mabon Ninan, Anca Ralescu, Boyang Wang
    “EvilELF: Evasion Attacks on Deep-Learning Malware Detection over ELF Files”
    22nd IEEE International Conference on Machine Learning and Applications (IEEE ICMLA 2023), Jacksonville, FL, December 15-17, 2023.
    Code & Datasets, Paper PDF

  3. Chenggang Wang, Mabon Ninan, Shane Reilly, Joel Ward, William Hawkins, Boyang Wang, John M. Emmert
    “Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies”
    ACM Conference on Security and Privacy in Wireless and Mobile Network (ACM WiSec 2023), Guildford, Surrey, United Kingdom, May 29-June 01, 2023.
    Code & Datasets, Paper PDF

  4. Chenggang Wang, Jimmy Dani, Shane Reilly, Austen Brownfield, Boyang Wang, John M. Emmert
    “TripletPower: Deep-Learning Side-Channel Attacks over Few Traces”
    IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2023), San Jose, May 1-5, 2023.
    Code & Datasets, Paper PDF

  5. Kaustubh Gupta, Nirnimesh Ghose, Boyang Wang
    “RADTEC: Re-authentication of IoT Devices with Machine Learning”
    IEEE Consumer Communications and Networking Conference (IEEE CCNC), Las Vegas, NV, Jan. 08 - 11, 2023.

  6. Logan Reichling, Ikran Warsame, Shane Reilly, Austen Brownfield, Nan Niu, Boyang Wang
    “FaultHunter: Automatically Detecting Vulnerabilities in C against Fault Injection Attacks”
    2022 Symposium for Undergraduate Research in Data Science, Systems, and Security (REU Symposium 2022), Portland, Oregon, December 6-9, 2022
    Code & Datasets, Paper PDF

  7. Haipeng Li, Kaustubh Gupta, Chenggang Wang, Nirnimesh Ghose, and Boyang Wang
    “RadioNet: Robust Deep-Learning Based Radio Fingerprinting”
    IEEE Conference on Communication and Network Security (CNS 2022), Austin, TX, October 3–5, 2022.
    Code & Datasets, Paper PDF

  8. Hao Liu, Wenhai Sun, Nan Niu, and Boyang Wang
    “MultiEvasion: Evasion Attacks Against Multiple Malware Detectors”
    IEEE Conference on Communication and Network Security (CNS 2022), Austin, TX, October 3–5, 2022.
    Code & Datasets, Paper PDF

  9. Hao Liu, Jimmy Dani, Hongkai Yu, Wenhai Sun, and Boyang Wang
    “AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples”
    IEEE/ACM International Symposium on Quality of Service (IWQoS 2022), Virtual, June 10–12, 2022.
    Code

  10. Haipeng Li, Nan Niu and Boyang Wang
    “Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting”
    ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2022), Baltimore MD, April 24–27, 2022.
    Code & Datasets

  11. Jimmy Dani and Boyang Wang
    “HiddenText: Cross-Trace Website Fingerprinting over Encrypted Traffic,”
    IEEE Conference on Information Reuse and Integration for Data Science (IEEE IRI 2021), Virtual, August 10-12, 2021
    Code & Datasets

  12. Chenggang Wang, Jimmy Dani, Xiang Li, Xiaodong Jia and Boyang Wang
    “Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic,”
    ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2021), Virtual, April 26–28, 2021.
    Code & Datasets

  13. Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li and Jin Cao
    “AdaPDP: Adaptive Personalized Differential Privacy,”
    IEEE International Conference on Computer Communications (IEEE INFOCOM 2021), Virtual, May 10–13, 2021.

  14. Haipeng Li, Ben Niu and Boyang Wang
    “SmartSwitch: Efficient Traffic Obfuscation against Stream Fingerprinting,”
    International Conference on Security and Privacy in Communication Networks (SecureComm 2020), Virtual, October 21–23, 2020. (Best paper award runner-up)
    Code & Datasets

  15. Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph Mitchell, Esther Arkin, Jie Gao
    “Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach,”
    International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM Mobihoc 2020), Virtual, October 11-14, 2020. (Acceptance rate: 30/196=15%)

  16. Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang,
    “Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning,”
    ACM Conference on Security and Privacy in Wireless and Mobile Network (ACM WiSec 2020), Virtual, July 8-10, 2020. (Acceptance rate: 27/104=26%) (The first two authors contribute equally in this paper)
    Code & Datasets, Teaser Video, Preprint Version

  17. Ben Niu, Yahong Chen, Boyang Wang, Jin Cao, and Fenghua Li,
    “Utility-aware Exponential Mechanism for Personalized Differential Privacy,”
    IEEE Wireless Communications and Networking Conference (WCNC 2020), Seoul, South Korea, April 6–9, 2020.

  18. Xuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu and Qiang Tang,
    “A Behavior-Aware Profiling of Smart Contracts,”
    International Conference on Security and Privacy in Communication Networks (SecureComm 2019), Orlando, FL, October 23–25, 2019.

  19. Sean Kennedy, Haipeng Li, Chenggang Wang, Hao Liu, Boyang Wang and Wenhai Sun,
    “I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers,”
    IEEE Conference on Communication and Network Security (CNS 2019), 2019 (Acceptance rate: 32/115=28%) (The first three authors contribute equally in this paper)
    Code and Datasets

  20. Hao Liu, Boyang Wang, Nan Niu, Shomir Wilson and Xuetao Wei,
    “Vaccine: Obfuscating Access Pattern Against File-Injection Attacks,”
    IEEE Conference on Communication and Network Security (CNS 2019), 2019 (Acceptance rate: 32/115=28%)

  21. Hanyu Quan, Hao Liu, Boyang Wang, Ming Li and Yuqing Zhang,
    “Randex: Mitigating Range Injection Attacks on Searchable Encryption,”
    IEEE Conference on Communication and Network Security (CNS 2019), 2019 (Acceptance rate: 32/115=28%)

  22. Boyang Wang and Xinxin Fan,
    “Lightweight Verification for Searchable Encryption,”
    the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018), New York, August, 2018

  23. Boris Aronov, Alon Efrat, Ming Li, Jie Gao, Joseph Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan and Jiaxin Ding,
    “Are Friends of My Friends Too Social? Limitations of Location Privacy in a Socially-Connected World,”
    the 19th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2018), Los Angeles, June, 2018 (Acceptance rate: 30/178=17%)

  24. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li and Yuqing Zhang,
    “SecReach: Secure Reachability Computation on Encrypted Location Check-in Data,”
    the 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November, 2016. (Acceptance rate: 30/116=26%)

  25. Boyang Wang, Yantian Hou, and Ming Li,
    “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data,”
    the 35th IEEE International Conference on Computer Communications (INFOCOM 2016), pp.1-9, San Francisco, California, April 10-15, 2016. (Acceptance rate: 300/1644=18%)

  26. Boyang Wang, Ming Li, Haitao Wang and Hui Li,
    “Circular Range Search on Encrypted Spatial Data,”
    the 3rd IEEE Conference on Communication and Security Networks (CNS 2015), pp.182-190, Florence, Italy, September 28-30, 2015. (Acceptance rate: 48/171=28%)

  27. Boyang Wang, Ming Li, Sherman S.M. Chow and Hui Li,
    “A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys,”
    the 2nd IEEE Conference on Communication and Security Networks (CNS 2014), pp.337-345, San Francisco, California, October 29-31, 2014. (Acceptance rate: 38/130=29%)

  28. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li,
    “Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy,”
    the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014), pp.374-394, Beijing, China, September 24-26, 2014.

  29. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li,
    “Maple: Scalable Multi- Dimensional Range Search over Encrypted Cloud Data with Tree-based Index,”
    the 9th ACM Symposium on Information, Computer and Communication Security (ACM ASIACCS 2014), pp.111-122, Kyoto, Japan, June 3-6, 2014. (Acceptance rate: 52/260=20%)

  30. Boyang Wang, Baochun Li, Hui Li and Fenghua Li,
    “Certificateless Public Auditing for Data integrity in the Cloud,”
    the First IEEE Conference on Communications and Network Security (CNS 2013), pp.276-284, Washington D.C., October 14-16, 2013. (Acceptance rate: 40/141=28%)

  31. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li,
    “Storing Shared Data on the Cloud via Security-Mediator,”
    the 33rd International Conference on Distributed Computing Systems (ICDCS 2013), pp.124-133, Philadelphia, Pennsylvania, July 8-11, 2013. (Acceptance rate: 61/464=13%)

  32. Boyang Wang, Hui Li and Ming Li,
    “Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics,”
    the IEEE International Conference on Communications (ICC 2013), pp.539-543, Budapest, Hungary, June 9-13, 2013.

  33. Boyang Wang, Baochun Li and Hui Li,
    “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,”
    the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), pp.2904-2912, Turin, Italy, April 14-19, 2013. (Acceptance rate: 280/1613=17%)

  34. Boyang Wang, Baochun Li and Hui Li,
    “Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks,”
    IEEE Globecom 2012, pp.744-749, Anaheim, California, December 3-7, 2012.

  35. Boyang Wang, Baochun Li and Hui Li,
    “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud,”
    the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), pp.507-525, Singapore, June 26-29, 2012. (Acceptance rate: 33/192=17%)

  36. Boyang Wang, Baochun Li and Hui Li,
    “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,”
    the 5th IEEE International Conference on Cloud Computing (Cloud 2012), pp.295–302, Honolulu, Hawaii, June 24-29, 2012. (Acceptance rate: 48/282=17%)

Journal Papers

  1. Hanyu Quan, Boyang Wang, Yuqing Zhang, and Gaofei Wu,
    ’'Efficient and Secure Top-k Queries with Top Order-Preserving Encryption,"
    IEEE Access, accepted, 2018

  2. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu and Yanfeng Shi,
    “Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data,”
    IEEE Transactions on Cloud Computing (TCC), accepted, 2017.

  3. Boyang Wang, Ming Li and Li Xiong,
    “FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data,”
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2017.

  4. Boyang Wang and Xinxin Fan,
    “Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data,”
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2016.

  5. Boyang Wang, Ming Li and Haitao Wang,
    “Geometric Range Search on Encrypted Spatial Data,”
    IEEE Transactions on Information Forensics and Security (TIFS), 11(4), pp.704-719, 2016.

  6. Yong Yu, Jiangbing Ni, Man Ho Au, Yi Mu, Boyang Wang and Hui Li,
    “On the Security of a Public Auditing Mechanism for Shared Cloud Data Service,”
    IEEE Transactions on Services Computing (TSC), 8(6), pp.998–999, 2015.

  7. Boyang Wang, Baochun Li and Hui Li,
    “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud,”
    IEEE Transactions on Services Computing (TSC), 8(1), pp.92–106, 2015. (The full version of INFOCOM’13 paper.)

  8. Boyang Wang, Hui Li, Xuefeng Liu, Fenghua Li and Xiaoqing Li,
    “Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud,”
    IEEE Journal of Communication and Networks (JCN), 16(6), pp.592–599, 2014.

  9. Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li,
    “Preserving Identity Privacy on Multi-Owner Cloud Data during Public Verification,”
    Security and Communication Networks (SCN), 7(11), pp.2104-2113, Wiley, 2014.

  10. Boyang Wang, Baochun Li and Hui Li,
    “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,”
    IEEE Transactions on Cloud Computing (TCC), 1(2), pp.43-56, 2014. (The full version of Cloud’12 paper.)

  11. Xuefeng Liu, Yuqing Zhang, Boyang Wang and Huaqun Wang,
    “An Anonymous Data Ag- gregation Scheme for Smart Grid Systems,”
    Security and Communication Networks (SCN), 7(3), pp.602-610, Wiley, 2014.

  12. Xuefeng Liu, Yuqing Zhang, Boyang Wang and Jingbo Yan,
    “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,”
    IEEE Transactions on Parallel and Distributed Systems (TPDS), 24(6), pp.1182-1191, 2013

  13. Boyang Wang, Hui Li and Jin Cao,
    “An Efficient Homomorphic MAC Scheme for Secure Network Coding with Probabilistic Detection,”
    Frontier of Computer Science, 6(4), pp.429-441, Springer, 2012.

Workshop Papers and Posters:

  1. Haipeng Li, Chenggang Wang, Nirnimesh Ghose, Boyang Wang,
    “POSTER: Robust Deep-learning-based Radio Fingerprinting with Fine-Tuning,”
    ACM Conference on Security and Privacy in Wireless and Mobile Network (ACM WiSec 2021), Virtual, June, 2021.
    Code & Datasets

  2. Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, and Xuefeng Liu,
    “Sparser: Secure Nearest Neighbor Search with Space-filling Curves,”
    The 8th International Workshop on Security and Privacy in Big Data (BigSecurity 2020), July 6, Toronto, Canada.

  3. Chenggang Wang, Boyang Wang and Xinxin Fan,
    “EcoBoost: Efficient Bootstrapping for Confidential Transactions,”
    IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020), May 3-6, 2020, Toronto, Canada.

  4. Hao Liu, and Boyang Wang,
    “Mitigating File-Injection Attacks with Natural Language Processing,”
    the Sixth International Workshop on Security and Privacy Analytics (IWSPA’20), March 18, 2020, New Orleans, LA.

  5. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang,
    “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets,”
    the 4th International Workshop on Security in Cloud Computing (SCC in conjunction with ACM ASIACCS 2016)

  6. Boyang Wang, Ming Li, Haitao Wang, and Hui Li
    “Circular Range Search on Encrypted Spatial Data,”
    the 35th IEEE International Conference on Distributed Computing Systems (ICDCS 2015), two-page poster.

  7. Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li,
    “Computing Encrypted Cloud Data Efficiently under Multiple Keys,”
    the 4th International Workshop on Security and Privacy in Cloud Computing (SPCC in conjunction with IEEE CNS 2013)

Patents

  1. Xinxin Fan and Boyang Wang,
    “Method and System for Range Search on Encrypted Data,”
    U.S. Patent (Patent No. US9971904B2, Granted), filed at Bosch RTC, Pittsburgh, PA

  2. Xinxin Fan and Boyang Wang,
    “Method and System for Verifiable Searchable Symmetric Encryption,”
    U.S. Patent (Patent No. US9977918B2, Granted), filed at Bosch RTC, Pittsburgh, PA

  3. Hui Li, Boyang Wang, and Jin Cao,
    “Network Encoding Method against Pollution Attacks based on Probabilistic Detection,”
    Chinese Patent (CN101714910 B, Granted), filed at Xidian University, Xi'an, China