Conference & Workshop
  • Zeinab S. Jalali, Chenghong Wang, Caiwen Ding, Sucheta Soundarajan, Yanzhi Wang, Real Matrices Eigenpair Extraction Algorithm with O(N^2) Complexity, International Conference on Neural Information Processing Systems(NIPS)(submitted).
  • [Chenghong Wang*, Yichen Jiang*], Zhixuan Wu, Xin Du, Shuang Wang, Privacy-preserving biomedical data dissemination via a hybrid approach, American Medical Informatics Association Annual Symposium(AMIA) 2018. 
  • Chenghong Wang, Zeinab Jalali, Caiwen Ding, Yanzhi Wang, Sucheta Soundarajan,  A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-Negative Matrices, IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2018.
  • XiaoFeng Wang, Haixu Tang, Shuang Wang, Xiaoqian Jiang, Wenhao Wang, Diyue Bu, Lei Wang, Yicheng Jiang, Chenghong Wang, iDASH Secure Genome Analysis Competition 2017, Proceedings of the 6th iDASH Privacy and Security , Orlando, FL, 2017.​
  • Priya Govindan, Chenghong Wang, Chumeng Xu, Hongyu Duan, Sucheta Soundarajan, The k-peak decomposition: Mapping the global structure of graphs,  26th International World Wide Web Conference (WWW), Australia, 2017. (Full Paper, Acceptance Rate 14%).
  • [Chenghong Wang* and Yichen Jiang*], Feng Chen, Xiaoqian Jiang, Noman Mohammed, Md Momin Al Aziz, Md Nazmus Sadat, Shuang Wang, SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach, American Medical Informatics Association Annual Symposium(AMIA) 2017. (Full Research Paper, presented at Precision Medicine Session), Washington DC, 2017. 
Before 2017:
  • Jing Zhao, Yan-Bin Wang, Gao-Rong Ning, Cheng-Hong Wang, Kishor S. Trivedi, K.-Y. Cai, Zhen-yu Zhang, Software Maintenance Optimization Based on Stackelberg Game Methods, IEEE International Workshop on Software Aging and Rejuvenation (WoSAR), Italy: IEEE, 2014. 
Journal & Thesis
  • Donghong Zhang, Chenghong Wang, Zhenyu Zhang , Jing Zhao, ART4SQLi: the ART of SQL Injection Vulnerability Discovery, IEEE Transactions on Reliability (TREL). (submitted).
  • Chenghong Wang, Feng Chen, Yichen Jiang, Xiaoqian Jiang, Cenk Sahinalp, Shuang Wang,  SecureVC: a software guard extensions framework for Secure Variant Calling,  Bioinformatics.  (in Submission).
  • Chenghong Wang, Secure Cloud for Human Population Stratification Analysis. Nature Biotechnology.(in submission).
  • Ziyi Li, Chenghong Wang, Xiaoqian Jiang, Qi Long, Distributed Learning from Multiple EHR Databases: Contextual Embedding Models for Medical Events, Scientific Report. (in submission).
  • Yichen Jiang*, Jenny Hamer*, Chenghong Wang*, Xiaoqian Jiang , Miran Kim, Yongsoo Song, Yuhou Xia, Noman Mohammed, Md Nazmus Sadat, Shuang Wang, SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol, IEEE/ACM Transactions on Computational Biology and Bioinformatic (TCBB). (co-first author, accepted, IF=1.97).
  • Feng Chen, Chenghong Wang, W. Dai, Xiaoqian Jiang, N. Mohammed, M. Aziz, M. Sadat, Cenk Sahinalp, Kristin Lauter, Shuang Wang, PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension}, BMC Medical Genomics, 2017.(IF 2.87 )
Before 2017:
  • [in Chinese] Chun-Guang Ma, (Cheng-Hong~Wang*), Dong-Hong~Zhang, Ying-Tao~Li, A Dynamic Network Risk Assessment Model based on Attacker's Inclination, Journal of Computer Research and Development (JCRD), July 3rd, 2014. (Acceptance Rate:< 13%)
  • [in Chinese]"Research and Simulation of Mutation Based SQL injection Vulnerability Testing Technique", Bachelor Thesis, Harbin, China, 2015. (Outstanding Bachelor Thesis, Reward Rate <4%)
  • Facebook - Black Circle
  • Twitter - Black Circle
  • Google+ - Black Circle
  • YouTube - Black Circle
  • Pinterest - Black Circle
  • Instagram - Black Circle
Powered by Lovingmage