Wenjun Luo

Learn More
— Uncontrolled variable-bit-rate (VBR) coded video yields consistent picture quality, but the traffic stream is very bursty. When sent over ATM networks, cell losses may be incurred due to limited buffer capacity at the switches; this could cause severe picture quality degradation. Source rate control can be implemented to generate a controlled VBR bit(More)
Along with variant advantages, the cloud storage gained great attention from both industry and academics since 2007. However, it also brings new challenges in creating a secure and reliable data storage and access facility over insecure or unreliable service providers. The integrity of data stored in the cloud is one of the challenges to be addressed before(More)
Private-preserving shared dot product protocol is an important protocol of many secure multi-party computation problems. It has been the main building block of various data mining algorithms with privacy concerns, and providing fundamental security guarantee for many privacy-preserving data mining algorithms. In this paper, we construct a privacy-preserving(More)
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supply. These computations could occur between mutually untrusted parties, or even between competitors. Today, to conduct such computations, one entity must usually know(More)
The photoelectrodes based on III-nitride semiconductors with high energy conversion efficiency especially for those self-driven ones are greatly desirable for hydrogen generation. In this study, highly ordered InGaN/GaN multiple-quantum-well nanorod-based photoelectrodes have been fabricated by a soft UV-curing nano-imprint lithography and a top-down(More)
Dynamic searchable encryption enables data owner to store a dynamic collection of encrypted files to the cloud server and generate search tokens of queries over the cloud server. Upon receiving a token, the server can perform the search on the \encrypted data while preserving privacy. Unlike many previous works that focused on a single-user scheme, we(More)