If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Hui Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 21 Similar Profiles
Outsourcing Engineering & Materials Science
Data mining Engineering & Materials Science
Wireless networks Engineering & Materials Science
Cryptography Engineering & Materials Science
Data privacy Engineering & Materials Science
Cloud computing Engineering & Materials Science
Data storage equipment Engineering & Materials Science
Authentication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2006 2019

  • 659 Citations
  • 12 h-Index
  • 44 Conference contribution
  • 17 Article
  • 2 Chapter
  • 2 Conference article
Outsourcing
Authentication
Servers
Cloud computing
Information management

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy

Sun, H., Dong, B., Wang, H., Yu, T. & Qin, Z., Jan 22 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 488-497 10 p. 8622635. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Stevens Institute of Technology, Montclair State University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Experiments

Assuremr: Verifiable SQL execution on mapreduce

Zhang, B., Dong, B. & Wang, H., Oct 24 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1232-1235 4 p. 8509338

Stevens Institute of Technology, Montclair State University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Data structures
Agglomeration
Encryption
Data base
Experiment
Query
Service provider