[1]Wei Song, Bing Wang, Qian Wang, Chengliang Shi, Wenjing Lou, Zhiyong Peng, Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources, IEEE Transactions on Information Forensics and Security, 2017, October, vol. 12, no. 10, pp. 2334-2347
[2]Bing Wang, Wei Song, Wenjing Lou, Thomas Hou, “Privacy-Preserving Pattern Matching over Encrypted Genetic Data in Cloud Computing”, IEEE INFOCOM, 2017
[3]Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou, and Yihui Cui, “A Privacy-Preserved Full-text Retrieval Algorithm over Encrypted Data for Cloud Storage Applications”. Journal of Parallel and Distributed Computing(JPDC), 2017, January, vol.99, pp. 14-27
[4]Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou, “Tell me the truth: Practically Public Authentication for Outsourced Databases with Multi-user Modification”. INFORMATION SCIENCES, 2016, vol. 387, pp. 221-237
[5]Bing Wang, Wei Song, Wenjing Lou, Thomas Hou, “Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee”, IEEE INFOCOM, 2015, pp. 2092-2100
[6]Wei Song, Zhiyong Peng, Qian Wang, Fangquan Cheng, Xiaoxin Wu, and Yihui Cui, “Efficient Privacy-preserved Data Query over Ciphertext in Cloud Computing”, Security and Communication Networks, 2014,Vol.7, pp. 1049-1065
[7]宋伟、彭智勇、王骞、李瑞轩、程芳权、崔一辉, “Mimir:一种基于密文的全文检索服务系统”,计算机学报,Volume: 37, Issue: 5, Page(s):1170-1183, May 2014.
[8]崔一辉,宋伟*,王占兵,史成良,程芳权,一种基于格的隐私保护聚类数据挖掘方法,计算机学报,2017, 9, Accepted to appear
[9]Song Wei, Zou Hua, Haowen Liu, Chen Jun, “A Practical Group Key Management Algorithm for Cloud Data Sharing with Dynamic Group”. China Communications, Volume: 13, Issue: 6, Page(s): 205– 216, June. 2016
[10]Wang Qian, He Meiqi, Song Wei*, Rui Yun, “Energy Efficient Opportunistic Cooperative Transmission with Different Ratio Combings: from a New Perspective”. Science China-Information Science, Volume: 57, Issue: 4, Page(s): 1– 14, April 2014
[11]Yihui Cui, Zhiyong Peng, Wei Song*, Xiaojuan Li, Fangquan Cheng, Luxiao Ding. “A Time-based Group Key Management Algorithm based on Proxy Re-encryption for Cloud Storage”, APWeb, 2014, pp. 117-128