default search action
Jian Wang 0038
Person information
- affiliation: Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- affiliation (2001 - 2003): University of Tokyo, Japan
- affiliation (PhD 1998): Nanjing University, China
Other persons with the same name
- Jian Wang — disambiguation page
- Jian Wang 0001 — Huawei Technologies, Shenzhen, China (and 1 more)
- Jian Wang 0002 — University of Leuven, Department of Managerial Economics, Strategy and Innovation, Belgium (and 2 more)
- Jian Wang 0003 — Jilin University, College of Computer Science and Technology / MoE Key Laboratory of Symbolic Computation and Knowledge Engineering, Changchun, China
- Jian Wang 0004 — Shandong Normal University, School of Information Science and Engineering, China (and 1 more)
- Jian Wang 0005 — Key Laboratory for Urban Geomatics of National Administration of Surveying, Mapping and Geoinformation, Beijing, China (and 1 more)
- Jian Wang 0006 — Hohai University, College of Energy and Electrical Engineering, Nanjing, China (and 1 more)
- Jian Wang 0007 — National University of Defense Technology, School of Electronic Science and Engineering, Changsha, China (and 1 more)
- Jian Wang 0008 — Huzhou University, Zhejiang, China
- Jian Wang 0009 — University of Erlangen-Nuremberg, Pattern Recognition Lab, Erlangen, Germany
- Jian Wang 0010 — University of Petroleum, College of Science, Qingdao, China (and 2 more)
- Jian Wang 0011 — National University of Defense Technology, Institute of Automation, Changsha, China
- Jian Wang 0012 — Xi'an Air Force Military Representative Office, China
- Jian Wang 0013 — Jiangsu University, School of Electrical and Information Engineering, Zhenjiang, China
- Jian Wang 0014 — PLA University of Science and Technology, College of Communications Engineering, Nanjing, China
- Jian Wang 0015 — Beijing Jiaotong University, School of Computer and Information Technology, Beijing, China (and 1 more)
- Jian Wang 0016 — Fudan University, School of Data Science, Shanghai, China (and 5 more)
- Jian Wang 0017 — Nanjing Institute of Technology, School of Automation, China (and 2 more)
- Jian Wang 0018 — Wuhan University, School of Computer Science, State Key Laboratory of Software Engineering, China
- Jian Wang 0019 — Shenyang Pharmaceutical University, Key Laboratory of Structure-Based Drug Design & Discovery, China
- Jian Wang 0020 — National University of Defense Technology, College of Electronic Science and Engineering, Changsha, China
- Jian Wang 0021 — Dalian University of Technology, College of Computer Science and Technology, China
- Jian Wang 0022 — Beijing Engineering Research Center of EMC and GNSS Technology for Rail Transportation, China (and 1 more)
- Jian Wang 0023 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, China
- Jian Wang 0024 — University of Electronic Science and Technology of China, School of Communication and Infomation Engineering, Chengdu, China (and 1 more)
- Jian Wang 0025 — Nanjing University, School of Electronic Science and Engineering, China
- Jian Wang 0026 — Hangzhou Dianzi University, Management School, China
- Jian Wang 0027 — Hangzhou Dianzi University, School of Automation, China
- Jian Wang 0028 — Shanghai Second Polytechnic University, Department of Network Engineering, School of Computer and Information Engineering, China
- Jian Wang 0029 — Chinese Academy of Sciences, Institute of Automation, High-tech Innovation Center, Beijing, China
- Jian Wang 0030 — Tsinghua University, Beijing National Research Center for Information Science and Technology, Beijing, China (and 1 more)
- Jian Wang 0031 — Southeast University, MOE Key Laboratory of Micro-Inertial Instrument and Advanced Navigation Technology, Nanjing, China
- Jian Wang 0032 — Chinese Academy of Sciences, Northwest Institute of Eco-Environment and Resources, Lanzhou, China (and 1 more)
- Jian Wang 0033 — Chinese Academy of Agricultural Sciences, Agricultural Information Institute, Beijing, China
- Jian Wang 0034 — Beihang University, School of Transportation Science and Engineering, Beijing Advanced Innovation Center for Big Data and Brain Computing, China
- Jian Wang 0035 — Linköping University, Sweden
- Jian Wang 0036 — Fudan University, School of Microelectronics, State Key Lab of ASIC & System, Shanghai, China
- Jian Wang 0037 — Chinese Academy of Sciences, Institute of Policy and Management, Beijing, China
- Jian Wang 0039 — Harbin University of Science and Technology, School of Computer Science and Technology, China (and 1 more)
- Jian Wang 0040 — Southwest Jiaotong University, School of Civil Engineering / MOE Key Laboratory of High-speed Railway Engineering, Chengdu, China
- Jian Wang 0041 — Chongqing University, State Key Laboratory of Power Transmission Equipment and System Security and New Technology, China
- Jian Wang 0042 — Saarland Informatics Campus, Max Planck Institute for Informatics, Saarbrücken, Germany (and 1 more)
- Jian Wang 0043 — Beihang University, School of Automation Science and Electrical Engineering, Beijing, China
- Jian Wang 0044 — National Institute of Metrology, Division of Mechanics and Acoustics, Beijing, China
- Jian Wang 0045 — Hohai University, College of Computer and Information Engineerin, Nanjing, China
- Jian Wang 0046 — Ericsson, Mobile Broadband Software Design, Ottawa, ON, Canada (and 4 more)
- Jian Wang 0047 — Shanghai Jiao Tong University, School of Medicine, Department of General Dentistry, China
- Jian Wang 0048 — Shandong University of Science and Technology, College of Geomatics, Qingdao, China
- Jian Wang 0049 — Anhui University of Science & Technology, School of Foreign Languages, Huainan, China
- Jian Wang 0050 — RealPage, Alpharetta, GA, USA
- Jian Wang 0051 — Tianjin University, School of Microelectronics / Qingdao Institute for Ocean Technology, China
- Jian Wang 0052 — Nanjing University of Information Science and Technology, School of Mathematics and Statistics, China (and 1 more)
- Jian Wang 0053 — Central South University, School of Mechanical and Electrical Engineering, State Key Laboratory of High Performance and Complex Manufacturing, Changsha, China
- Jian Wang 0054 — Hong Kong Polytechnic University, Department of Computing, Hong Kong (and 2 more)
- Jian Wang 0055 — China Electronics Technology Group Corporation, 13th Research Institute, Shijiazhuang, China (and 1 more)
- Jian Wang 0056 — Air Force Engineering University, College of Air and Missile Defense, Xi'an, China
- Jian Wang 0057 — Beijing University of Chemical Technology, Beijing Key Laboratory of Health Monitoring and Self-Recovery for High-End Mechanical Equipment, China
- Jian Wang 0058 — Fujian Medical University Union Hospital, Fujian Institute of Endocrinology, Fuzhou, China
- Jian Wang 0059 — Zhejiang Sci-Tech University, School of Information Science and Technology, Hangzhou, China
- Jian Wang 0060 — Huazhong University of Science and Technology, School of Optical and Electronic Information, Wuhan National Laboratory for Optoelectronics, Wuhan, China
- Jian Wang 0061 — University of Tennessee at Martin, TN, USA (and 1 more)
- Jian Wang 0062 — Chinese Academy of Sciences, Institute of Acoustics, Beijing, China (and 2 more)
- Jian Wang 0063 — Beijing Normal University, Faculty of Geographical Science, Beijing, China (and 1 more)
- Jian Wang 0064 — Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China (and 1 more)
- Jian Wang 0065 — James D. Watson Institute of Genome Sciences, Hangzhou, China (and 1 more)
- Jian Wang 0066 — Baidu Inc., Department of Computer Vision Technology, China
- Jian Wang 0067 — Nanyang Technological University, Singapore
- Jian Wang 0068 — Beijing Union University, College of Robotics, Beijing, China (and 1 more)
- Jian Wang 0069 — Northeastern University, School of Mechanical Engineering and Automation, Shenyang, China
- Jian Wang 0070 — Shanghai Jiaotong University, Department of Computer Science and Engineering, Shanghai, China
- Jian Wang 0071 — Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing, China
- Jian Wang 0072 — Wuhan University of Science and Technology, School of Information Science and Engineering, Wuhan, China
- Jian Wang 0073 — Shanghai Jiao Tong University, School of Mechanical Engineering, State Key Laboratory of Mechanical System and Vibration, Shanghai, China
- Jian Wang 0074 — University of Chinese Academy of Sciences, School of Computer Science and Technology, Beijing, China (and 2 more)
- Jian Wang 0075 — University of Virginia, Department of Computer Science, Charlottesville, VA, USA (and 2 more)
- Jian Wang 0076 — The Third Research Institute of Ministry of Public Security, Cyber Physical System R&D Center, Shanghai, China (and 3 more)
- Jian Wang 0077 — Huazhong University of Science and Technology, School of Artificial Intelligence and Automation, Wuhan, China
- Jian Wang 0078 — Kunming University of Science and Technology, College of Information Engineering and Automation, Kunming, China
- Jian Wang 0079 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China (and 1 more)
- Jian Wang 0080 — Sun Yat-sen University, School of Electronics and Information Technology, Guangzhou, China
- Jian Wang 0081 — Nanjing University of Aeronautics and Astronautics, College of Economics and Management, Nanjing, China
- Jian Wang 0082 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Jian Wang 0084 — Chongqing University, College of Mechanical Engineering, Chongqing, China
- Jian Wang 0085 — Southeast University, School of Transportation, Nanjing, China (and 1 more)
- Jian Wang 0086 — Wuhan University, School of Geodesy and Geomatics, Wuhan, China
- Jian Wang 0087 — Tianjin University, School of Electrical and Information Engineering, Tianjin, China (and 1 more)
- Jian Wang 0088 — Bohai University, School of Mathematics and Physics, Jinzhou, China
- Jian Wang 0089 — Huazhong University of Science and Technology, State Key Laboratory of Digital Manufacturing Equipment and Technology, Wuhan, China
- Jian Wang 0090 — Northwestern Polytechnical University, Electronic and Information College, Xi'an, China
- Jian Wang 0091 — North China Electric Power University, State Key Laboratory of Alternate Electrical Power System With Renewable Energy Sources, Beijing, China
- Jian Wang 0092 — Taiyuan University of Technology, Department of Mathematics, Taiyuan, China (and 1 more)
- Jian Wang 0093 — Washington University in St. Louis, Department of Electrical and Systems Engineering, St. Louis, MO, USA (and 1 more)
- Jian Wang 0094 — Penn State College of Medicine, Department of Pharmacology, Hershey, PA, USA
- Jian Wang 0095 — Shanghai Jiaotong University, Department of Mathematics, Shanghai, China (and 1 more)
- Jian Wang 0096 — Anhui University of Technology, School of Electrical and Information Engineering, Ma'anshan, China
- Jian Wang 0097 — Jilin University, Institute of Theoretical Chemistry, State Key Laboratory of Theoretical and Computational Chemistry, Changchun, China
- Jian Wang 0098 — National Institute of Standards and Technology (NIST), Wireless Networks Division, Gaithersburg, MD, USA
- Jian Wang 0099 — Shenzhen University, School of Biomedical Engineering, Medical UltraSound Image Computing (MUSIC) Lab, Shenzhen, China (and 1 more)
- Jian Wang 0100 — Carnegie Mellon University, Department of Electrical and Computer Engineering, Pittsburgh, PA, USA
- Jian Wang 0101 — Fuzhou University, College of Physics and Information Engineering, Fuzhou, China (and 1 more)
- Jian Wang 0102 — Tongji University, College of Electronics and Information Engineering, Computer Integrated Manufacturing System Research Center (CIMS), Shanghai, China
- Jian Wang 0103 — National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
- Jian Wang 0104 — Nantong Vocational College, China
- Jian Wang 0105 — National University of Defense Technology, College of Information System and Management, Changsha, China (and 1 more)
- Jian Wang 0106 — University of California Santa Cruz, School of Engineering, Santa Cruz, CA, USA
- Jian Wang 0107 — University of Wollongong, School of Electrical, Computer and Telecommunications Engineering, Wollongong, Australia
- Jian Wang 0108 — Ant Group, Hangzhou, China
- Jian Wang 0109 — University of Leicester, School of Informatics, Leicester, UK
- Jian Wang 0110 — Kunming University of Science and Technology, Faculty of Electric Power Engineering, Kunming, China (and 1 more)
- Jian Wang 0111 — Snapchat, New York, NY, USA
- Jian Wang 0112 — Dalian University of Technology, Faculty of Electronic and Electrical Engineering, School of Biomedical Engineering, Dalian, China (and 1 more)
- Jian Wang 0113 — Xi'an Jiaotong University, School of Information and Communications Engineering, Shaanxi Key Laboratory of Deep Space Exploration Intelligent Information Technology, Xi'an, China
- Jian Wang 0114 — Xidian University, National Laboratory of Radar Signal Processing, Collaborative Innovation Center of Information Sensing and Understanding, Xi'an, China
- Jian Wang 0115 — University of Science and Technology of China, State Key Laboratory of Fire Science, Hefei, China
- Jian Wang 0116 — Henan University of Engineering, School of Computer Science, Zhengzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Xingxin Li, Youwen Zhu, Rui Xu, Jian Wang, Yushu Zhang:
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query. Frontiers Comput. Sci. 18(1): 181803 (2024) - 2023
- [j50]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. Appl. Intell. 53(6): 7298-7309 (2023) - [j49]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-resistant backdoor attack against deep neural networks. Appl. Intell. 53(17): 20402-20417 (2023) - [j48]Yan Jiang, Youwen Zhu, Jian Wang, Xingxin Li:
Fully distributed identity-based threshold signatures with identifiable aborts. Frontiers Comput. Sci. 17(5): 175813 (2023) - [j47]Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - [j46]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. Inf. Sci. 634: 564-577 (2023) - [j45]Mingfu Xue, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - [j44]Qiao Xue, Qingqing Ye, Haibo Hu, Youwen Zhu, Jian Wang:
DDRM: A Continual Frequency Estimation Mechanism With Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 35(7): 6784-6797 (2023) - [j43]Shenqing Wang, Chunpeng Ge, Lu Zhou, Huaqun Wang, Zhe Liu, Jian Wang:
Privacy-Preserving Classification in Multiple Clouds eHealthcare. IEEE Trans. Serv. Comput. 16(1): 493-503 (2023) - [i14]Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir:
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures. IACR Cryptol. ePrint Arch. 2023: 1193 (2023) - 2022
- [j42]Jiamu Li, Ji Zhang, Mohamed Jaward Bah, Jian Wang, Youwen Zhu, Gaoming Yang, Lingling Li, Kexin Zhang:
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection. Algorithms 15(11): 429 (2022) - [j41]Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication. Appl. Intell. 52(14): 16497-16511 (2022) - [j40]Mingfu Xue, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. Comput. Secur. 118: 102726 (2022) - [j39]Qiao Xue, Youwen Zhu, Jian Wang:
Mean estimation over numeric data with personalized local differential privacy. Frontiers Comput. Sci. 16(3): 163806 (2022) - [j38]Xiao-Ying Zhai, Jian Wang:
A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system. Multim. Tools Appl. 81(28): 40159-40179 (2022) - [j37]Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Trans. Artif. Intell. 3(6): 908-923 (2022) - [j36]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. IEEE Trans. Dependable Secur. Comput. 19(3): 1562-1578 (2022) - [i13]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-Resistant Backdoor Attack against Deep Neural Networks. CoRR abs/2201.00672 (2022) - [i12]Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks. CoRR abs/2201.13164 (2022) - 2021
- [j35]Qiao Xue, Youwen Zhu, Jian Wang, Xingxin Li, Ji Zhang:
Locally differentially private distributed algorithms for set intersection and union. Sci. China Inf. Sci. 64(11) (2021) - [j34]Inam ul Haq, Jian Wang, Youwen Zhu, Saad Maqbool:
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digit. Commun. Networks 7(1): 140-150 (2021) - [j33]Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu:
NaturalAE: Natural and robust physical adversarial examples for object detectors. J. Inf. Secur. Appl. 57: 102694 (2021) - [j32]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An adversarial example based privacy-preserving technique for social images. J. Inf. Secur. Appl. 63: 102993 (2021) - [j31]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. Peer-to-Peer Netw. Appl. 14(3): 1458-1474 (2021) - [j30]Xingxin Li, Youwen Zhu, Jian Wang:
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter. IEEE Trans. Emerg. Top. Comput. 9(4): 1803-1814 (2021) - [j29]Qiao Xue, Youwen Zhu, Jian Wang:
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy. IEEE Trans. Emerg. Top. Comput. 9(4): 2053-2063 (2021) - [j28]Bilal Ahmad, Jian Wang, Rabia Noor Enam, Ali Abbas:
Classification of DoS Attacks in Smart Underwater Wireless Sensor Network. Wirel. Pers. Commun. 116(2): 1055-1069 (2021) - [c38]Jiamu Li, Ji Zhang, Jian Wang, Youwen Zhu, Mohamed Jaward Bah, Gaoming Yang, Yuquan Gan:
VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data. IEEE BigData 2021: 5956-5958 - [c37]Mingfu Xue, Jian Wang, Weiqiang Liu:
DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper). ACM Great Lakes Symposium on VLSI 2021: 455-460 - [c36]Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. ISC 2021: 341-357 - [c35]Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. TrustCom 2021: 620-626 - [i11]Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. CoRR abs/2103.01527 (2021) - [i10]Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. CoRR abs/2104.07395 (2021) - [i9]Shichang Sun, Mingfu Xue, Jian Wang, Weiqiang Liu:
Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images. CoRR abs/2104.09203 (2021) - [i8]Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. CoRR abs/2105.13697 (2021) - [i7]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. CoRR abs/2105.14259 (2021) - [i6]Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and remove watermark in deep neural networks via generative adversarial networks. CoRR abs/2106.08104 (2021) - [i5]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Protect the Intellectual Property of Dataset against Unauthorized Use. CoRR abs/2109.07921 (2021) - 2020
- [j27]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system. Comput. Secur. 99: 102046 (2020) - [j26]Inam ul Haq, Jian Wang, Youwen Zhu, Saad Maqbool:
A survey of authenticated key agreement protocols for multi-server architecture. J. Inf. Secur. Appl. 55: 102639 (2020) - [j25]Qiang Zhou, Jingjing Gu, Chao Ling, Wen-Bo Li, Yi Zhuang, Jian Wang:
Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction. J. Comput. Sci. Technol. 35(2): 338-352 (2020) - [j24]Inam ul Haq, Jian Wang, Youwen Zhu:
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 161: 102660 (2020) - [j23]Yan Jiang, Youwen Zhu, Jian Wang, Yong Xiang:
Efficient authentication protocol with anonymity and key protection for mobile Internet users. J. Parallel Distributed Comput. 137: 179-191 (2020) - [j22]Mingfu Xue, Chengxiang Yuan, Jian Wang, Weiqiang Liu:
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Secur. Commun. Networks 2020: 5890820:1-5890820:15 (2020) - [j21]Youwen Zhu, Xingxin Li, Jian Wang, Jing Li:
Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput. 24(8): 5885-5896 (2020) - [c34]Can He, Mingfu Xue, Jian Wang, Weiqiang Liu:
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems. ACM TUR-C 2020: 231-235 - [c33]Lulu Ning, Jian Wang:
A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique. BigDataSE 2020: 49-56 - [c32]Shenqing Wang, Jian Wang, Chunhua Su, Xinshu Ma:
Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack. ICPADS 2020: 382-389 - [c31]Tianyi Zhang, Jian Wang:
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. TrustCom 2020: 576-583 - [c30]Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. TrustCom 2020: 975-982 - [i4]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. CoRR abs/2011.13560 (2020) - [i3]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations. CoRR abs/2011.13564 (2020) - [i2]Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu:
Robust and Natural Physical Adversarial Examples for Object Detectors. CoRR abs/2011.13692 (2020) - [i1]Mingfu Xue, Can He, Zhiyu Wu, Jian Wang, Zhe Liu, Weiqiang Liu:
3D Invisible Cloak. CoRR abs/2011.13705 (2020)
2010 – 2019
- 2019
- [j20]Mingfu Xue, Rongzhen Bian, Weiqiang Liu, Jian Wang:
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method. IEEE Access 7: 5124-5140 (2019) - [j19]Mingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu:
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs. IET Comput. Digit. Tech. 13(4): 348-359 (2019) - [j18]Xingxin Li, Youwen Zhu, Jian Wang, Ji Zhang:
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J. Parallel Distributed Comput. 131: 44-54 (2019) - [j17]Mingfu Xue, Chengxiang Yuan, Zhe Liu, Jian Wang:
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. Secur. Commun. Networks 2019: 9795621:1-9795621:18 (2019) - [j16]Inam ul Haq, Jian Wang, Youwen Zhu:
An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption. IEEE Trans. Consumer Electron. 65(1): 80-89 (2019) - [j15]Bilal Ahmad, Jian Wang, Zain Anwar Ali, Sania Tanvir, M. Sadiq Ali Khan:
Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network. Wirel. Pers. Commun. 106(4): 1841-1853 (2019) - [c29]Kexin Zhou, Jian Wang:
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT. APNOMS 2019: 1-6 - 2018
- [j14]Meijuan Wang, Jian Wang, Kejun Guo:
Extensible markup language keywords search based on security access control. Int. J. Grid Util. Comput. 9(1): 43-50 (2018) - [j13]Bilal Ahmad, Jian Wang, Zain Anwar Ali:
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions. J. Comput. Networks Commun. 2018: 6383145:1-6383145:10 (2018) - [j12]Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang:
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model. Secur. Commun. Networks 2018: 2870475:1-2870475:9 (2018) - [j11]Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang:
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification. IEEE Trans. Dependable Secur. Comput. 15(5): 906-912 (2018) - [c28]Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang:
Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128. Inscrypt 2018: 183-199 - [c27]Jiayu Tan, Jian Wang:
Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine. ICA3PP (4) 2018: 153-165 - [c26]Rongzhen Bian, Mingfu Xue, Jian Wang:
A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis. ICCCS (4) 2018: 634-646 - [c25]Zhengping Zhang, Jian Wang:
MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc Networks. ICNCC 2018: 177-181 - [c24]Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. ISPEC 2018: 424-439 - [c23]Mingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu:
A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models. TrustCom/BigDataSE 2018: 1452-1457 - [c22]Rongzhen Bian, Mingfu Xue, Jian Wang:
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique. TrustCom/BigDataSE 2018: 1458-1463 - 2017
- [j10]Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu:
Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. Int. J. Found. Comput. Sci. 28(6): 683-704 (2017) - [j9]Xingxin Li, Youwen Zhu, Jian Wang:
Efficient Encrypted Data Comparison Through a Hybrid Method. J. Inf. Sci. Eng. 33(4): 953-964 (2017) - [j8]Yang Li, Menting Chen, Jian Wang:
Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices. J. Inf. Sci. Eng. 33(4): 1085-1100 (2017) - [j7]Yueping Yang, Jian Wang, Mingfu Xue:
面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value). 计算机科学 44(9): 156-161 (2017) - [j6]Yang Li, Mengting Chen, Zhe Liu, Jian Wang:
Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers. ACM Trans. Embed. Comput. Syst. 16(2): 55:1-55:20 (2017) - [c21]Shuang Wang, Yang Li, Jian Wang:
A new key rank estimation method to investigate dependent key lists of side channel attacks. AsianHOST 2017: 19-24 - [c20]Yang Li, Shuang Wang, Zhibin Wang, Jian Wang:
A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks. CARDIS 2017: 51-69 - [c19]Qiao Xue, Youwen Zhu, Jian Wang, Xingxin Li:
Distributed Set Intersection and Union with Local Differential Privacy. ICPADS 2017: 198-205 - [c18]Yang Liu, Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu:
Secure Multi-label Classification over Encrypted Data in Cloud. ProvSec 2017: 57-73 - 2016
- [c17]Mingfu Xue, Jian Wang, Aiqun Hu:
An enhanced classification-based golden chips-free hardware Trojan detection technique. AsianHOST 2016: 1-6 - [c16]Junchao Luan, Jian Wang, Mingfu Xue:
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets. ICCCS (2) 2016: 71-82 - [c15]Yanchen Liu, Jian Wang, Zhibin Wang, Qifeng Qu, Shun Yu:
A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty. ICCCS (1) 2016: 178-189 - [c14]Mengting Chen, Yang Li, Jian Wang:
Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion. ICCCS (1) 2016: 322-334 - [c13]Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang:
On efficiently harnessing cloud to securely solve linear regression and other matrix operations. IWQoS 2016: 1-2 - [c12]Youwen Zhu, Zhikuan Wang, Jian Wang:
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. IWQoS 2016: 1-6 - [c11]Xingxin Li, Youwen Zhu, Jian Wang:
Secure Naïve Bayesian Classification over Encrypted Data in Cloud. ProvSec 2016: 130-150 - 2015
- [c10]Youwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian:
Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency. CollaborateCom 2015: 234-242 - [c9]Mingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu:
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme. ICCCS 2015: 14-24 - [c8]Cheng Qian, Jian Wang:
Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud. ICCCS 2015: 25-37 - [c7]Ziying Wang, Jian Wang:
A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption. ICCCS 2015: 38-48 - [c6]Zhidan Wang, Jian Wang, Yanfei Zhao:
The Optimization Model of Trust for White-Washing. ICCCS 2015: 169-180 - 2014
- [j5]Lihong Guo, Jian Wang, He Du:
XML privacy protection model based on cloud storage. Comput. Stand. Interfaces 36(3): 454-464 (2014) - [j4]Lihong Guo, Jian Wang, Haitao Wu, He Du:
eXtensible Markup Language access control model with filtering privacy based on matrix storage. IET Commun. 8(11): 1919-1927 (2014) - [j3]He Du, Jian Wang, Yanan Liu:
Independent verification of proxy multi-signature scheme. Int. J. Comput. Sci. Eng. 9(4): 301-311 (2014) - 2013
- [j2]Yanan Liu, Jian Wang, He Du, Li-jun Sha:
Intra-cluster key sharing in hierarchical sensor networks. IET Wirel. Sens. Syst. 3(3): 172-182 (2013) - [j1]He Du, Jian Wang:
An Anonymous but Accountable Proxy Multi-signature Scheme. J. Softw. 8(8): 1867-1874 (2013) - 2010
- [c5]Yanan Liu, Jian Wang, He Du, Liang Zhang:
Key Sharing in Hierarchical Wireless Sensor Networks. EUC 2010: 743-748
2000 – 2009
- 2006
- [c4]Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 - 2005
- [c3]Jian Wang, Lein Harn, Hideki Imai:
Key Management for Multicast Fingerprinting. ICISS 2005: 191-204 - [c2]Zhengyou Xia, Yichuan Jiang, Jian Wang:
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. ISI 2005: 640-641 - [c1]Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen:
Storage-Optimal Key Sharing with Authentication in Sensor Networks. ISPA Workshops 2005: 466-474
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint