Mingzhong Wang

Learn More
Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted third party while maintains the capability of keyword search on the data. Searchable encryption can be achieved using the classical method called oblivious(More)
Schizophrenia (SCZ) is a severe psychiatric disorder associated with many different risk factors, both genetic and environmental. A recent genome-wide association study (GWAS) of Han Chinese identified three single-nucleotide polymorphisms (SNPs rs11038167, rs11038172, and rs835784) in the tetraspanins gene TSPAN18 as possible susceptibility loci for(More)
Delay Tolerant Networks (DTNs) are intermittently connected networks, such as mobile social networks formed by human-carried mobile devices. Routing in such mobile social DTNs is very challenging as it must handle network partitioning, long delays, and dynamic topology. Recently, social-based approaches, which attempt to exploit social behaviors of DTN(More)
The robustness of a schedule, with respect to its probability of successful execution, becomes an indispensable requirement in open and dynamic service-oriented environment, such as grids or clouds. We design a fine-grained risk assessment model customized for workflows to precisely compute the cost of failure of a schedule. In comparison with current(More)
Selecting appropriate services for task execution in workflows should not only consider budget and deadline constraints, but also ensure the best probability that workflow will succeed and minimize the potential loss in case of exceptions. This requirement is more critical for data-intensive applications in grids or clouds since any failure is costly.(More)
Evidence from genetic studies has revealed that genome-wide rare copy number variations (CNVs) are risk factors for neurodevelopmental disorders and this evidence has given rise to a new understanding of disease etiology, including that of schizophrenia (SCZ). Recent studies have indicated that duplication in the vasoactive intestinal peptide receptor-2(More)
Authentication in vehicular ad-hoc network (VANET) is still a research challenge, as it requires not only secure and efficient authentication, but also privacy preservation. In this paper, we proposed a lightweight and efficient authentication scheme (LESPP) with strong privacy preservation for secure VANET communication. The proposed scheme utilizes(More)