default search action
Juan Wang 0006
Person information
- affiliation: Wuhan University, School of Computer, China
- affiliation: Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan, China
Other persons with the same name
- Juan Wang — disambiguation page
- Juan Wang 0001 — Imperial College London, UK
- Juan Wang 0002 — Delta Micro Technology Inc., Laguna Hills, CA, USA (and 1 more)
- Juan Wang 0003 — Qufu Normal University, School of Information Science and Engineering, Rizhao, Shandong, China
- Juan Wang 0004 — Shenyang Jianzhu University, Faculty of Information and Control Engineering, China (and 1 more)
- Juan Wang 0005 — Jiangsu University, School of Finance and Economics, Zhenjiang, China
- Juan Wang 0007 — Illinois Institute of Technology, Chicago, IL, USA
- Juan Wang 0008 — Nanjing University of Posts and Telecommunications, Nanjing, China
- Juan Wang 0009 — Second Institute of Oceanography, Ministry of Natural Resources, Hangzhou, China
- Juan Wang 0010 — Tianjin University of Technology, Tianjin, China
- Juan Wang 0011 — Inner Mongolia University, School of Computer Science, Hohhot, China
- Juan Wang 0012 — Tsinghua University, Beijing, China
- Juan Wang 0013 — Huzhou University, School of Engineering, Huzhou, China
- Juan Wang 0014 — Shanghai Maritime University, Shanghai, China
- Juan Wang 0015 — Chinese Academy of Sciences, Department of Biomedical and Health Engineering, Shenzhen, China
- Juan Wang 0016 — Queen's University, Kingston, Ontario, Canada
- Juan Wang 0017 — Chengdu University of Information Technology, School of Cybersecurity, Chengdu, China
- Juan Wang 0018 — Peking University, School of Basic Medical Sciences, Beijing, China
- Juan Wang 0019 — Hubei University of Technology, Hubei Key Laboratory for High-efficiency Utilization of Solar Energy and Operation Control of Energy Storage System, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Mengda Yang, Wenzhe Yi, Juan Wang, Hongxin Hu, Xiaoyang Xu, Ziang Li:
Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge. Future Gener. Comput. Syst. 156: 30-41 (2024) - [j15]Linbin Liu, June Li, Jianming Lv, Juan Wang, Siyu Zhao, Qiuyu Lu:
Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework. IEEE Internet Things J. 11(11): 18976-18999 (2024) - [j14]Hassan Jalil Hadi, Yue Cao, Sifan Li, Yulin Hu, Juan Wang, Shoufeng Wang:
Real-Time Collaborative Intrusion Detection System in UAV Networks Using Deep Learning. IEEE Internet Things J. 11(20): 33371-33391 (2024) - [j13]Yujie Song, Yue Cao, Chaklam Cheong, Debiao He, Kim-Kwang Raymond Choo, Juan Wang:
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs. IEEE Trans. Inf. Forensics Secur. 19: 7730-7743 (2024) - [c10]Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao:
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. CCS 2024: 1226-1240 - [c9]Xiaoyang Xu, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang, Hongxin Hu, Yong Zhuang, Yaxin Liu:
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning. CVPR 2024: 12130-12139 - [i4]Xiaoyang Xu, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang, Hongxin Hu, Yong Zhuang, Yaxin Liu:
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning. CoRR abs/2405.04115 (2024) - [i3]Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao:
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. CoRR abs/2409.00426 (2024) - 2023
- [j12]Juan Wang, Wenzhe Yi, Mengda Yang, Jiaci Ma, Shengzhi Zhang, Shirong Hao:
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain. J. Netw. Comput. Appl. 218: 103718 (2023) - [j11]Juan Wang, Jie Wang, Chengyang Fan, Fei Yan, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Mengda Yang, Hongxin Hu:
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2936-2953 (2023) - [c8]Ziang Li, Mengda Yang, Yaxin Liu, Juan Wang, Hongxin Hu, Wenzhe Yi, Xiaoyang Xu:
GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference. NeurIPS 2023 - 2022
- [j10]Juan Wang, Shirong Hao, Hongxin Hu, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [j9]Guoliang He, Xin Xin, Rong Peng, Min Han, Juan Wang, Xiaoqun Wu:
Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data. IEEE Trans. Syst. Man Cybern. Syst. 52(2): 1121-1134 (2022) - [c7]Mengda Yang, Ziang Li, Juan Wang, Hongxin Hu, Ao Ren, Xiaoyang Xu, Wenzhe Yi:
Measuring Data Reconstruction Defenses in Collaborative Inference Systems. NeurIPS 2022 - [c6]Juan Wang, Chenjun Ma, Ziang Li, Huanyu Yuan, Jie Wang:
ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning. TrustCom 2022: 778-785 - 2021
- [j8]Juan Wang, Yang Yu, Yi Li, Chengyang Fan, Shirong Hao:
Design and Implementation of Virtual Security Function Based on Multiple Enclaves. Future Internet 13(1): 12 (2021) - [j7]Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, Rongxing Lu:
IoT-Praetor: Undesired Behaviors Detection for IoT Devices. IEEE Internet Things J. 8(2): 927-940 (2021) - [j6]Juan Wang, Bo Zhao:
Intelligent system for interactive online education based on cloud big data analytics. J. Intell. Fuzzy Syst. 40(2): 2839-2849 (2021)
2010 – 2019
- 2019
- [j5]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [j4]Juan Wang, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, Fajiang Yu:
Detecting and Mitigating Target Link-Flooding Attacks Using SDN. IEEE Trans. Dependable Secur. Comput. 16(6): 944-956 (2019) - [i2]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - 2018
- [j3]Juan Wang, Zhi Hong, Yuhan Zhang, Yier Jin:
Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 88-96 (2018) - [c5]Juan Wang, Shirong Hao, Yi Li, Chengyang Fan, Jie Wang, Lin Han, Zhi Hong, Hongxin Hu:
Challenges Towards Protecting VNF With SGX. SDN-NFV@CODASPY 2018: 39-42 - 2017
- [j2]Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. Secur. Commun. Networks 2017: 3659167:1-3659167:11 (2017) - [c4]Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang:
A Security-Enhanced vTPM 2.0 for Cloud Computing. ICICS 2017: 557-569 - [i1]Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Huanguo Zhang:
CHAOS: an SDN-based Moving Target Defense System. CoRR abs/1704.01482 (2017) - 2016
- [j1]Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan, Zhenlin Chen:
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario. Secur. Commun. Networks 9(15): 2802-2815 (2016) - 2014
- [c3]Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu:
POSTER: An E2E Trusted Cloud Infrastructure. CCS 2014: 1517-1519 - 2013
- [c2]Juan Wang, Xuhui Xie, Qingfei Wang, Fei Yan, Hongxin Hu, Sijun Zhou, Tao Wang:
Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing. CloudComp 2013: 90-101 - [c1]Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng:
Towards a Security-Enhanced Firewall Application for OpenFlow Networks. CSS 2013: 92-103
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-27 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint