default search action
Guojun Wang 0001
Person information
- affiliation: Guangzhou University, School of Computer Science and Technology, China
- affiliation (former): Hong Kong Polytechnic University
- affiliation (PhD 2002): Central South University, Changsha, China
Other persons with the same name
- Guojun Wang (aka: Guo-Jun Wang, GuoJun Wang) — disambiguation page
- Guojun Wang 0002 — Jilin University, State Key Laboratory of Automotive Simulation and Control, Changchun, China
- Guojun Wang 0003 — Jilin University, School of Transportation, Changchun, China
- Guojun Wang 0004 — Shaanxi Normal University, Xi'an, China
- Guojun Wang 0005 — Chinese Academy of Sciences, Institute of Semiconductors, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j248]Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Yuheng Zhang:
EAOS: Exposing attacks in smart contracts through analyzing opcode sequences with operands. Comput. Networks 257: 110959 (2025) - [j247]Wanyi Gu, Guojun Wang, Peiqiang Li, Guangxin Zhai, Xubin Li:
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model. Int. J. Inf. Sec. 24(1): 33 (2025) - 2024
- [j246]Peiqiang Li, Guojun Wang, Guangxin Zhai, Wanyi Gu, Xubin Li, Xiangyong Liu, Yuheng Zhang:
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model. Comput. Electr. Eng. 120: 109682 (2024) - [j245]Zhenshen Ou, Xiaofei Xing, Siqi He, Guojun Wang:
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication. Comput. Commun. 218: 240-252 (2024) - [j244]Peiqiang Li, Guo-Jun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
Detecting abnormal behaviors in smart contracts using opcode sequences. Comput. Commun. 220: 12-22 (2024) - [j243]Peiqiang Li, Guojun Wang, Xiaofei Xing, Xiangbin Li, Jinyao Zhu:
Detecting unknown vulnerabilities in smart contracts using opcode sequences. Connect. Sci. 36(1) (2024) - [j242]Tao Peng, Wentao Zhong, Guojun Wang, Shaobo Zhang, Entao Luo, Tian Wang:
Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing. IEEE Internet Things J. 11(2): 2394-2406 (2024) - [j241]Shaobo Zhang, Qi Liu, Tian Wang, Wei Liang, Kuan-Ching Li, Guojun Wang:
FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing. IEEE Internet Things J. 11(13): 23297-23308 (2024) - [j240]Haroon Elahi, Guojun Wang:
Forward-porting and its limitations in fuzzer evaluation. Inf. Sci. 662: 120142 (2024) - [j239]Tao Peng, Wei You, Kejian Guan, Entao Luo, Shaobo Zhang, Guojun Wang, Tian Wang, Youke Wu:
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing. J. Netw. Comput. Appl. 224: 103836 (2024) - [j238]Shuhong Chen, Jiawei Yang, Guojun Wang, Zijia Wang, Haojie Yin, Yinglin Feng:
CLFLDP: Communication-efficient layer clipping federated learning with local differential privacy. J. Syst. Archit. 148: 103067 (2024) - [j237]Jiawei Yang, Shuhong Chen, Guojun Wang, Zijia Wang, Zhiyong Jie, Muhammad Arif:
GFL-ALDPA: a gradient compression federated learning framework based on adaptive local differential privacy budget allocation. Multim. Tools Appl. 83(9): 26349-26368 (2024) - [j236]Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
A smart contract vulnerability detection method based on deep learning with opcode sequences. Peer Peer Netw. Appl. 17(5): 3222-3238 (2024) - [j235]Mingfeng Su, Guojun Wang, Jianer Chen:
Efficient task offloading with swarm intelligence evolution for edge-cloud collaboration in vehicular edge computing. Softw. Pract. Exp. 54(10): 1888-1915 (2024) - [j234]Haroon Elahi, Guojun Wang, Wenjun Jiang, Alexandre Bartel, Yves Le Traon:
A Qualitative Study of App Acquisition and Management. IEEE Trans. Comput. Soc. Syst. 11(2): 1907-1925 (2024) - [j233]Qin Liu, Yu Peng, Qian Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang, Shaobo Zhang:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. IEEE Trans. Dependable Secur. Comput. 21(4): 1994-2011 (2024) - [j232]Lei Zhou, Fengwei Zhang, Kevin Leach, Xuhua Ding, Zhenyu Ning, Guojun Wang, Jidong Xiao:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [j231]Tao Peng, Wentao Zhong, Guojun Wang, Entao Luo, Shui Yu, Yi-Ning Liu, Yi Yang, Xuyun Zhang:
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing. IEEE Trans. Intell. Transp. Syst. 25(7): 7767-7779 (2024) - [j230]Qin Liu, Yu Peng, Ziyi Tang, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases. IEEE Trans. Knowl. Data Eng. 36(5): 2285-2300 (2024) - [j229]Qin Liu, Yu Peng, Mingzuo Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain. IEEE Trans. Knowl. Data Eng. 36(7): 3297-3311 (2024) - [j228]Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing. IEEE Trans. Mob. Comput. 23(5): 4181-4195 (2024) - [j227]Shulan Wang, Qin Liu, Yang Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning. IEEE Trans. Mob. Comput. 23(6): 6522-6537 (2024) - [j226]Yang Xu, Shihao Xiao, Huiling Wang, Cheng Zhang, Zhifei Ni, Wenjun Zhao, Guojun Wang:
Redactable Blockchain-Based Secure and Accountable Data Management. IEEE Trans. Netw. Serv. Manag. 21(2): 1764-1776 (2024) - [c260]Xuelei Liu, Guojun Wang, Mingfei Chen, Peiqiang Li, Jinyao Zhu:
A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length. ICIC (8) 2024: 369-380 - [e34]Guojun Wang, Haozhe Wang, Geyong Min, Nektarios Georgalas, Weizhi Meng:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1 [contents] - 2023
- [j225]Siqi He, Xiaofei Xing, Guojun Wang, Zeyu Sun:
A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory. IEEE Access 11: 59675-59687 (2023) - [j224]Syed Qasim Afser Rizvi, Guojun Wang, Asif Khan, Mohammad Kamrul Hasan, Taher M. Ghazal, Atta ur Rehman Khan:
Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and UEN-PDNet. IEEE Access 11: 107703-107724 (2023) - [j223]Shuhong Chen, Zhiyong Jie, Guojun Wang, Kuan-Ching Li, Jiawei Yang, Xulang Liu:
A new federated learning-based wireless communication and client scheduling solution for combating COVID-19. Comput. Commun. 206: 101-109 (2023) - [j222]Tao Peng, Kejian Guan, Jierong Liu, Jianer Chen, Guojun Wang, Jiawei Zhu:
A blockchain-based mobile crowdsensing scheme with enhanced privacy. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j221]Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. Future Gener. Comput. Syst. 145: 189-199 (2023) - [j220]Feng Wang, Jinhua She, Guojun Wang, Yasuhiro Ohyama, Min Wu:
Dual-Task Network Embeddings for Influence Prediction in Social Internet of Things. IEEE Internet Things J. 10(8, April 15): 6586-6597 (2023) - [j219]Yinglong Dai, Zheng Yan, Jiangchang Cheng, Xiaojun Duan, Guojun Wang:
Analysis of multimodal data fusion from an information theory perspective. Inf. Sci. 623: 164-183 (2023) - [j218]Yang Xu, Quanlin Li, Cheng Zhang, Yunlin Tan, Ping Zhang, Guojun Wang, Yaoxue Zhang:
A decentralized trust management mechanism for crowdfunding. Inf. Sci. 638: 118969 (2023) - [j217]Wei Liu, Jierong Liu, Tao Peng, Guojun Wang, Valentina Emilia Balas, Oana Geman, Hung-Wen Chiu:
Prediction of Parkinson's disease based on artificial neural networks using speech datasets. J. Ambient Intell. Humaniz. Comput. 14(10): 13571-13584 (2023) - [j216]Shaobo Zhang, Yuechao Wang, Entao Luo, Qin Liu, Ke Gu, Guojun Wang:
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse. J. Syst. Archit. 140: 102899 (2023) - [j215]Yipeng Zou, Tao Peng, Guojun Wang, Entao Luo, Jinbo Xiong:
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing. J. Syst. Archit. 144: 102984 (2023) - [j214]Shazia Riaz, Saqib Ali, Guojun Wang, Muhammad Ahsan Latif, Muhammad Zafar Iqbal:
Membership inference attack on differentially private block coordinate descent. PeerJ Comput. Sci. 9: e1616 (2023) - [j213]Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. IEEE Trans. Dependable Secur. Comput. 20(5): 4359-4371 (2023) - [j212]Md. Zakirul Alam Bhuiyan, Sy-Yen Kuo, Guojun Wang:
Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications. IEEE Trans. Ind. Informatics 19(1): 969-972 (2023) - [c259]Yuting Li, Guojun Wang, Tian Wang, Weijia Jia:
FL-HSDP: Client-Side Defense for Federated Learning via Hessian Optimization and Shuffled Differential Privacy. HPCC/DSS/SmartCity/DependSys 2023: 696-703 - [c258]Zhidong Xie, Tao Peng, Wei You, Guojun Wang:
Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization. ICA3PP (5) 2023: 56-72 - [c257]Zhenkun Luo, Shuhong Chen, Guojun Wang, Hanjun Li:
Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features. TrustCom 2023: 257-264 - [c256]Jinyao Zhu, Xiaofei Xing, Guojun Wang, Peiqiang Li:
Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning. TrustCom 2023: 284-291 - [c255]Jianming Wu, Shuhong Chen, Guojun Wang, Hao Wang, Hanjun Li:
Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text. TrustCom 2023: 1086-1093 - [c254]Kairen Chen, Shuhong Chen, Guojun Wang, Chenchen Wang:
CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network. TrustCom 2023: 1827-1834 - [c253]Zheqi Feng, Tao Peng, Guojun Wang, Kejian Guan:
Bilateral Personalized Information Fusion in Mobile Crowdsensing. UbiSec 2023: 3-16 - [c252]Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. UbiSec 2023: 63-75 - [c251]Faseeh Iftikhar, Muhammad Faizan Khan, Guojun Wang, Fazli Wahid:
Privacy Preserving Elder Fall Detection Using Deep Learning. UbiSec 2023: 335-347 - [e33]Jia Hu, Geyong Min, Guojun Wang, Nektarios Georgalas:
22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023. IEEE 2023, ISBN 979-8-3503-8199-3 [contents] - [e32]Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani:
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1768, Springer 2023, ISBN 978-981-99-0271-2 [contents] - [i7]Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model. CoRR abs/2311.14514 (2023) - 2022
- [j211]Xiaofei Xing, Xiang Jin, Haroon Elahi, Hai Jiang, Guojun Wang:
A Malware Detection Approach Using Autoencoder in Deep Learning. IEEE Access 10: 25696-25706 (2022) - [j210]Qin Liu, Liqiong Chen, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks. Ad Hoc Networks 124: 102727 (2022) - [j209]Xiaoyu Zhu, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo, Fang Qi, Qin Liu, Guojun Wang:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j208]Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Personalised context-aware re-ranking in recommender system. Connect. Sci. 34(1): 319-338 (2022) - [j207]Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Re-ranking with multiple objective optimization in recommender system. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [j206]Qin Liu, Guojun Wang, Jiankun Hu, Jie Wu:
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications. Future Gener. Comput. Syst. 133: 169-170 (2022) - [j205]Fengwei Dai, David Wei Zhang, Yangyang Yan, Guojun Wang, Liqiang Cao:
Research on Ni3Sn4 intermetallic compound for 5μm diameter Cu/Ni/Sn-3.0Ag micro bumps. IEICE Electron. Express 19(2): 20210453 (2022) - [j204]Muhammad Arif, Shermin Shamsudheen, F. Ajesh, Guojun Wang, Jianer Chen:
AI bot to detect fake COVID-19 vaccine certificate. IET Inf. Secur. 16(5): 362-372 (2022) - [j203]Cong Wang, Weicheng Lu, Sancheng Peng, Youyang Qu, Guojun Wang, Shui Yu:
Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating. IEEE Internet Things J. 9(20): 20681-20692 (2022) - [j202]Muhammad Arif, Jianer Chen, Guojun Wang, Hafiz Tayyab Rauf:
Cognitive population initialization for swarm intelligence and evolutionary computing. J. Ambient Intell. Humaniz. Comput. 13(12): 5847-5860 (2022) - [j201]Yinglong Dai, Guojun Wang, Khan Muhammad, Shuai Liu:
A closed-loop healthcare processing approach based on deep reinforcement learning. Multim. Tools Appl. 81(3): 3107-3129 (2022) - [j200]Amir Javadpour, Guojun Wang:
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J. Supercomput. 78(3): 3477-3499 (2022) - [j199]Jingjing Wang, Wenjun Jiang, Kenli Li, Guojun Wang, Keqin Li:
Incremental Group-Level Popularity Prediction in Online Social Networks. ACM Trans. Internet Techn. 22(1): 20:1-20:26 (2022) - [j198]Qin Liu, Yue Tian, Jie Wu, Tao Peng, Guojun Wang:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. IEEE Trans. Serv. Comput. 15(1): 69-82 (2022) - [j197]Qin Liu, Yu Peng, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. IEEE Trans. Serv. Comput. 15(4): 1799-1812 (2022) - [c250]Qin Liu, Jiamin Yang, Hongbo Jiang, Jie Wu, Tao Peng, Tian Wang, Guojun Wang:
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark. INFOCOM 2022: 590-599 - [c249]Guanghui Feng, Guojun Wang, Tao Peng, Xiaofei Xing, Shuhong Chen, Peiqiang Li:
A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2022: 945-952 - [c248]Zheqi Feng, Tao Peng, Guo-Jun Wang, Kejian Guan:
Personalized Privacy-Preserving Information Fusion in Mobile Crowdsensing. ISPA/BDCloud/SocialCom/SustainCom 2022: 953-960 - [c247]Wanyi Gu, Guojun Wang, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen:
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM. UbiSec 2022: 52-63 - [c246]Xiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li, Xiangyong Liu:
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning. UbiSec 2022: 179-192 - [c245]Yuting Li, Guojun Wang, Tao Peng, Guanghui Feng:
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization. UbiSec 2022: 380-391 - [e31]Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - 2021
- [j196]Qiang Zhang, Guojun Wang, Wenjuan Tang, Karim Alinani, Qin Liu, Xin Li:
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176: 81-90 (2021) - [j195]Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia:
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j194]Haroon Elahi, Guojun Wang, Yang Xu, Aniello Castiglione, Qiben Yan, Muhammad Naeem Shehzad:
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications. Comput. Stand. Interfaces 78: 103538 (2021) - [j193]Mehdi Gheisari, Hamid Esmaeili Najafabadi, Jafar Ahmad Abed Alzubi, Jiechao Gao, Guojun Wang, Aaqif Afzaal Abbasi, Aniello Castiglione:
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123: 1-13 (2021) - [j192]Haroon Elahi, Aniello Castiglione, Guojun Wang, Oana Geman:
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities. Neurocomputing 444: 189-202 (2021) - [j191]Tian Wang, Pan Wang, Shaobin Cai, James Xi Zheng, Ying Ma, Weijia Jia, Guojun Wang:
Mobile edge-enabled trust evaluation for the Internet of Things. Inf. Fusion 75: 90-100 (2021) - [j190]Feng Wang, Jinhua She, Yasuhiro Ohyama, Wenjun Jiang, Geyong Min, Guojun Wang, Min Wu:
Maximizing positive influence in competitive social networks: A trust-based solution. Inf. Sci. 546: 559-572 (2021) - [j189]Lei Zhou, Entao Luo, Guojun Wang, Shui Yu:
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks. Inf. Sci. 554: 15-32 (2021) - [j188]Qin Liu, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, Shaobo Zhang:
SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems. J. Syst. Archit. 120: 102300 (2021) - [j187]Hafiz ur Rahman, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jianer Chen:
In-network generalized trustworthy data collection for event detection in cyber-physical systems. PeerJ Comput. Sci. 7: e504 (2021) - [j186]Lei Zhou, Fengwei Zhang, Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding, Guojun Wang:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [j185]Yang Xu, Cheng Zhang, Guojun Wang, Zheng Qin, Quanrun Zeng:
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services. IEEE Trans. Emerg. Top. Comput. 9(3): 1421-1432 (2021) - [j184]Peike Xia, Wenjun Jiang, Jie Wu, Surong Xiao, Guojun Wang:
Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level. ACM Trans. Knowl. Discov. Data 15(4): 68:1-68:29 (2021) - [j183]Yang Xu, Cheng Zhang, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services. IEEE Trans. Netw. Sci. Eng. 8(2): 1202-1213 (2021) - [j182]Qin Liu, Yu Peng, Jie Wu, Tian Wang, Guojun Wang:
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing. IEEE Trans. Netw. Serv. Manag. 18(2): 2046-2062 (2021) - [j181]Jifeng Zhang, Wenjun Jiang, Jinrui Zhang, Jie Wu, Guojun Wang:
Exploring Weather Data to Predict Activity Attendance in Event-based Social Network: From the Organizer's View. ACM Trans. Web 15(2): 10:1-10:25 (2021) - [j180]Wenjun Jiang, Jing Chen, Xiaofei Ding, Jie Wu, Jiawei He, Guojun Wang:
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios. ACM Trans. Web 15(3): 13:1-13:33 (2021) - [j179]Amir Javadpour, Khatereh Saedifar, Guojun Wang, Kuan-Ching Li, Fatemeh Saghafi:
Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing. Wirel. Pers. Commun. 121(4): 2699-2718 (2021) - [c244]Tao Peng, Wentao Zhong, Kejian Guan, Yipeng Zou, Jiawei Zhu, Guojun Wang:
A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks. TrustCom 2021: 413-419 - [c243]Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. TrustCom 2021: 420-427 - [c242]Yipeng Zou, Tao Peng, Wentao Zhong, Kejian Guan, Guojun Wang:
Reliable and Controllable Data Sharing Based on Blockchain. UbiSec 2021: 229-240 - [c241]Shakil, Muhammad Arif, Shahab Saquib Sohail, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang:
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). UbiSec 2021: 268-278 - [e30]Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12382, Springer 2021, ISBN 978-3-030-68850-9 [contents] - [e29]Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12383, Springer 2021, ISBN 978-3-030-68883-7 [contents] - [e28]Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - 2020
- [j178]Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan, Meijing Shan:
Towards Recommendation in Internet of Things: An Uncertainty Perspective. IEEE Access 8: 12232-12252 (2020) - [j177]Lei Zhou, Entao Luo, Guojun Wang:
RAitc: Securely Auditing the Remotely Executed Applications. IEEE Access 8: 163045-163059 (2020) - [j176]Saqib Ali, Guojun Wang, Shazia Riaz:
Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering. IEEE Access 8: 173186-173196 (2020) - [j175]Karim Alinani, Deshun Liu, Dong Zhou, Guojun Wang:
Service Composition and Optimal Selection in Cloud Manufacturing: State-of-the-Art and Research Challenges. IEEE Access 8: 223988-224005 (2020) - [j174]Mehdi Gheisari, Guojun Wang, Shuhong Chen:
An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City. Comput. Electr. Eng. 81: 106504 (2020) - [j173]Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang:
An efficient privacy-enhanced attribute-based access control mechanism. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j172]Yinglong Dai, Guojun Wang, Jianhua Dai, Oana Geman:
A multimodal deep architecture for traditional Chinese medicine diagnosis. Concurr. Comput. Pract. Exp. 32(19) (2020) - [j171]Guojun Wang:
Foreword. IEICE Trans. Inf. Syst. 103-D(2): 186-187 (2020) - [j170]Muhammad Arif, Guojun Wang:
Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Networks Distributed Syst. 24(2): 143-166 (2020) - [j169]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Kun Yang:
Toward Wi-Fi Halow Signal Coverage Modeling in Collapsed Structures. IEEE Internet Things J. 7(3): 2181-2196 (2020) - [j168]Tian Wang, Md. Zakirul Alam Bhuiyan, Guojun Wang, Lianyong Qi, Jie Wu, Thaier Hayajneh:
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things. IEEE Internet Things J. 7(4): 2679-2689 (2020) - [j167]Guojun Wang, Jianhua Ma, Laurence T. Yang:
Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications. Inf. Sci. 522: 317-318 (2020) - [j166]Shaobo Zhang, Xinjun Mao, Kim-Kwang Raymond Choo, Tao Peng, Guojun Wang:
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. Inf. Sci. 527: 406-419 (2020) - [j165]Muhammad Arif, Guojun Wang, Tao Peng, Valentina Emilia Balas, Oana Geman, Jianer Chen:
Optimization of communication in VANETs using fuzzy logic and artificial Bee colony. J. Intell. Fuzzy Syst. 38(5): 6145-6157 (2020) - [j164]Md. Zakirul Alam Bhuiyan, Guojun Wang, Zhong Fan:
Smart world systems, applications, and technologies. J. Netw. Comput. Appl. 156: 102553 (2020) - [j163]Haroon Elahi, Guojun Wang, Jianer Chen:
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones. J. Netw. Comput. Appl. 157: 102578 (2020) - [j162]Tian Wang, Yaxin Mei, Weijia Jia, Xi Zheng, Guojun Wang, Mande Xie:
Edge-based differential privacy computing for sensor-cloud systems. J. Parallel Distributed Comput. 136: 75-85 (2020) - [j161]Yinglong Dai, Guojun Wang:
A deep inference learning framework for healthcare. Pattern Recognit. Lett. 139: 17-25 (2020) - [j160]Muhammad Arif, Guojun Wang:
Fast curvelet transform through genetic algorithm for multimodal medical image fusion. Soft Comput. 24(3): 1815-1836 (2020) - [j159]Tao Peng, Jierong Liu, Guojun Wang, Qin Liu, Jianer Chen, Jiawei Zhu, Chenxi Huang:
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks. Sci. Program. 2020: 7832875:1-7832875:13 (2020) - [j158]Md. Zakirul Alam Bhuiyan, Jie Wu, Gary M. Weiss, Thaier Hayajneh, Tian Wang, Guojun Wang:
Event Detection Through Differential Pattern Mining in Cyber-Physical Systems. IEEE Trans. Big Data 6(4): 652-665 (2020) - [j157]Mohammad Shahriar Rahman, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, Guojun Wang:
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption. IEEE Trans. Engineering Management 67(4): 1476-1486 (2020) - [j156]Md. Zakirul Alam Bhuiyan, Sy-Yen Kuo, Jiannong Cao, Guojun Wang:
Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications. IEEE Trans. Ind. Informatics 16(9): 6079-6082 (2020) - [j155]Chunli Huang, Wenjun Jiang, Jie Wu, Guojun Wang:
Personalized Review Recommendation based on Users' Aspect Sentiment. ACM Trans. Internet Techn. 20(4): 42:1-42:26 (2020) - [j154]Muhammad Arif, Guojun Wang, Valentina Emilia Balas, Oana Geman, Aniello Castiglione, Jianer Chen:
SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26: 100265 (2020) - [j153]Amir Javadpour, Khatereh Saedifar, Guojun Wang, Kuan-Ching Li:
Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations. Wirel. Pers. Commun. 112(1): 123-148 (2020) - [j152]Amir Javadpour, Guojun Wang, Samira Rezaei:
Resource Management in a Peer to Peer Cloud Network for IoT. Wirel. Pers. Commun. 115(3): 2471-2488 (2020) - [c240]Hafiz ur Rahman, Guihua Duan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System. CSE 2020: 58-65 - [c239]Aqsa Younas, Raheela Nasim, Saqib Ali, Guojun Wang, Fang Qi:
Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches. CSE 2020: 66-71 - [c238]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13 - [c237]Guojun Wang, Tian Wang:
Welcome Messages from IEEE EUC 2020 General Chairs. EUC 2020: vii - [c236]Aroma Tariq, Saqib Ali, Xiaofei Xing, Guojun Wang:
Intelligent Surveillance in Smart City Using 3D Road Monitoring. iSCI 2020: 31-36 - [c235]Syed Qasim Afser Rizvi, Pin Liu, Guojun Wang, Muhammad Arif:
Prediction of Parkinson's Disease using Principal Component Analysis and the Markov Chains. iSCI 2020: 44-48 - [c234]Xiang Jin, Xiaofei Xing, Haroon Elahi, Guojun Wang, Hai Jiang:
A Malware Detection Approach Using Malware Images and Autoencoders. MASS 2020: 1-6 - [c233]Muhammad Sohaib Yousaf, Shazia Riaz, Saqib Ali, Shuhong Chen, Guojun Wang:
The Future Prospects of Adversarial Nets. SpaCCS Workshops 2020: 15-26 - [c232]Muhammad Arif, Jianer Chen, Pin Liu, Guojun Wang:
Location Based Communication Privacy in Internet of Vehicles Using Fog Computing. SpaCCS Workshops 2020: 77-90 - [c231]Muhammad Shakeel Faridi, Saqib Ali, Guihua Duan, Guojun Wang:
Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0. SpaCCS 2020: 331-344 - [c230]Taiguo Qu, Wenjun Jiang, Dong Liu, Guojun Wang:
Deep Hierarchical App Recommendation with Dynamic Behaviors. SSCC 2020: 62-76 - [c229]Ang Li, Wenjun Jiang, Xueqi Li, Xinrong Chen, Guojun Wang:
Independent Worker Selection In Crowdsourcing. TrustCom 2020: 1173-1178 - [c228]Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang:
A Function-Centric Risk Assessment Approach for Android Applications. TrustCom 2020: 1187-1193 - [c227]Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang:
A Privacy-Preserving Crowdsensing System with Muti-Blockchain. TrustCom 2020: 1944-1949 - [c226]Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing:
Integration of 5G, VANETs and Blockchain Technology. TrustCom 2020: 2007-2013 - [c225]Xueqi Li, Wenjun Jiang, Weiguang Chen, Jie Wu, Guojun Wang, Kenli Li:
Directional and Explainable Serendipity Recommendation. WWW 2020: 122-132 - [e27]Guojun Wang, Xuemin Lin, James A. Hendler, Wei Song, Zhuoming Xu, Genggeng Liu:
Web Information Systems and Applications - 17th International Conference, WISA 2020, Guangzhou, China, September 23-25, 2020, Proceedings. Lecture Notes in Computer Science 12432, Springer 2020, ISBN 978-3-030-60028-0 [contents] - [e26]Guojun Wang, Carlos Becker Westphall, Arcangelo Castiglione:
14th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-0-7381-1114-8 [contents] - [e25]Guojun Wang, Aniello Castiglione, Alberto Huertas Celdrán:
23rd IEEE International Conference on Computational Science and Engineering, CSE 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0398-6 [contents] - [e24]Guojun Wang, Gregorio Martínez Pérez, Scott Fowler, Kuan-Ching Li:
18th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0400-6 [contents] - [e23]Guojun Wang, Zhong Fan, Md. Zakirul Alam Bhuiyan, Kouichi Sakurai:
8th IEEE International Conference on Smart City and Informatization, iSCI 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0394-8 [contents] - [e22]Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4 [contents] - [i6]Amir Javadpour, Guojun Wang, Samira Rezaei, Kuan-Ching Li:
Detecting Straggler MapReduce Tasks in Big Data Processing Infrastructure by Neural Network. CoRR abs/2004.05868 (2020) - [i5]Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang:
Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms. CoRR abs/2004.07943 (2020) - [i4]Amir Javadpour, Samira Rezaei, Kuan-Ching Li, Guojun Wang:
A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm. CoRR abs/2004.13121 (2020) - [i3]Amir Javadpour, Guojun Wang, Xiaofei Xing:
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network. CoRR abs/2005.07261 (2020) - [i2]Weiguang Chen, Wenjun Jiang, Xueqi Li, Kenli Li, Albert Y. Zomaya, Guojun Wang:
Semi-Disentangled Representation Learning in Recommendation System. CoRR abs/2010.13282 (2020)
2010 – 2019
- 2019
- [j151]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Efficient Authentication of Multi-Dimensional Top-k Queries. IEEE Access 7: 4748-4762 (2019) - [j150]Pengfei Yin, Guojun Wang, Md. Zakirul Alam Bhuiyan, Meijing Shan, Fang Qi:
Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library. IEEE Access 7: 147302-147313 (2019) - [j149]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures. IEEE Access 7: 168075-168090 (2019) - [j148]Tian Wang, Zhen Peng, Sheng Wen, Guojun Wang, Baowei Wang, Anfeng Liu:
A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues. Ad Hoc Sens. Wirel. Networks 44(1-2): 109-130 (2019) - [j147]Mehdi Gheisari, Guojun Wang, Wazir Zada Khan, Christian Fernández-Campusano:
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking. Comput. Secur. 87 (2019) - [j146]Qing Lu, Congxu Zhu, Guojun Wang:
A Novel S-Box Design Algorithm Based on a New Compound Chaotic System. Entropy 21(10): 1004 (2019) - [j145]Yang Xu, Guojun Wang, Ju Ren, Yaoxue Zhang:
An adaptive and configurable protection framework against android privilege escalation threats. Future Gener. Comput. Syst. 92: 210-224 (2019) - [j144]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang, Shuhong Chen:
Multidimensional privacy preservation in location-based services. Future Gener. Comput. Syst. 93: 312-326 (2019) - [j143]Shaobo Zhang, Xiong Li, Zhiyuan Tan, Tao Peng, Guojun Wang:
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Gener. Comput. Syst. 94: 40-50 (2019) - [j142]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Wi-Fi frequency selection concept for effective coverage in collapsed structures. Future Gener. Comput. Syst. 97: 409-424 (2019) - [j141]Hai Tao, Md. Zakirul Alam Bhuiyan, Md. Arafatur Rahman, Guojun Wang, Tian Wang, Md. Manjur Ahmed, Jing Li:
Economic perspective analysis of protecting big data security and privacy. Future Gener. Comput. Syst. 98: 660-671 (2019) - [j140]Yuezhong Wu, Qin Liu, Changyun Li, Guojun Wang:
A hybrid filtering-based network document recommendation system in cloud storage. Int. J. Comput. Sci. Eng. 20(2): 269-279 (2019) - [j139]Tian Wang, Jiyuan Zhou, Anfeng Liu, Md. Zakirul Alam Bhuiyan, Guojun Wang, Weijia Jia:
Fog-Based Computing and Storage Offloading for Data Synchronization in IoT. IEEE Internet Things J. 6(3): 4272-4282 (2019) - [j138]Qiang Zhang, Guojun Wang, Qin Liu:
Enabling Cooperative Privacy-preserving Personalized search in cloud environments. Inf. Sci. 480: 1-13 (2019) - [j137]Feng Wang, Wenjun Jiang, Guojun Wang, Song Guo:
Influence maximization by leveraging the crowdsensing data in information diffusion network. J. Netw. Comput. Appl. 136: 11-21 (2019) - [j136]Qin Liu, Panlin Hou, Guojun Wang, Tao Peng, Shaobo Zhang:
Intelligent route planning on large road networks with efficiency and privacy. J. Parallel Distributed Comput. 133: 93-106 (2019) - [j135]Genlang Chen, Zhiqian Xu, Jiajian Zhang, Guojun Wang, Hai Jiang, Miaoqing Huang:
Generic attribute revocation systems for attribute-based encryption in cloud storage. Frontiers Inf. Technol. Electron. Eng. 20(6): 773-786 (2019) - [j134]Gaocai Wang, Qifei Zhao, Tianxiao Xie, Guojun Wang:
A channel-aware expected energy consumption minimization strategy in wireless networks. Soft Comput. 23(15): 6051-6063 (2019) - [j133]Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. IEEE Trans. Dependable Secur. Comput. 16(6): 984-995 (2019) - [j132]Yang Xu, Ju Ren, Guojun Wang, Cheng Zhang, Jidian Yang, Yaoxue Zhang:
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT. IEEE Trans. Ind. Informatics 15(6): 3632-3641 (2019) - [j131]Yueyue Chen, Deke Guo, Md. Zakirul Alam Bhuiyan, Ming Xu, Guojun Wang, Pin Lv:
Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing. ACM Trans. Sens. Networks 15(4): 38:1-38:29 (2019) - [j130]Tian Wang, Yang Li, Guojun Wang, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Weijia Jia:
Sustainable and Efficient Data Collection from WSNs to Cloud. IEEE Trans. Sustain. Comput. 4(2): 252-262 (2019) - [j129]Muhammad Arif, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tian Wang, Jianer Chen:
A survey on security attacks in VANETs: Communication, applications and challenges. Veh. Commun. 19 (2019) - [c224]Xueqi Li, Wenjun Jiang, Weiguang Chen, Jie Wu, Guojun Wang:
HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity. CIKM 2019: 1503-1512 - [c223]Hafiz ur Rahman, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems. DependSys 2019: 54-66 - [c222]Muhammad Arif, Guojun Wang, Oana Geman, Jianer Chen:
Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition. DependSys 2019: 158-169 - [c221]Karim Alinani, Deshun Liu, Dong Zhou, Guojun Wang:
Recommender System for Decentralized Cloud Manufacturing. DependSys 2019: 170-179 - [c220]Haroon Elahi, Guojun Wang, Tao Peng, Jianer Chen:
AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant. DependSys 2019: 341-355 - [c219]Boya Li, Guojun Wang, Haroon Elahi, Guihua Duan:
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores. DependSys 2019: 356-368 - [c218]Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. ESORICS (2) 2019: 217-238 - [c217]Md. Zakirul Alam Bhuiyan, Tian Wang, Aliuz Zaman, Guojun Wang:
Data Reduction through Decision-Making Based on Event-Sensitivity in IoT-Enabled Event Monitoring. HPCC/SmartCity/DSS 2019: 2039-2044 - [c216]Amir Javadpour, Guojun Wang, Kuan-Ching Li:
A High Throughput MAC Protocol for Wireless Body Area Networks in Intensive Care. iSCI 2019: 23-34 - [c215]Muhammad Arif, Guojun Wang, Valentina Emilia Balas, Shuhong Chen:
Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System. iSCI 2019: 49-59 - [c214]Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Lorenzo Fernández Maimó, Gregorio Martínez Pérez, Guojun Wang:
Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System. iSCI 2019: 73-85 - [c213]Hafiz ur Rahman, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future Directions. iSCI 2019: 152-164 - [c212]Qifan Wang, Lei Zhou, Zhe Tang, Guojun Wang:
A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles. iSCI 2019: 253-267 - [c211]Saqib Ali, Guojun Wang, Komal Fatima, Pin Liu:
Semantic Knowledge Based Graph Model in Smart Cities. iSCI 2019: 268-278 - [c210]Syed Qasim Afser Rizvi, Guojun Wang, Xiaofei Xing:
Early Detection of Parkinson Disease Using Wavelet Transform Along with Fourier Transform. iSCI 2019: 323-333 - [c209]Sorin Curea, Oana Geman, Iuliana Chiuchisan, Valentina Emilia Balas, Guojun Wang, Muhammad Arif:
Superior Prosthetic Member Based on Assistive Technologies. iSCI 2019: 520-530 - [c208]Saqib Ali, Guojun Wang, Bebo White, Komal Fatima:
Libra Critique Towards Global Decentralized Financial System. iSCI 2019: 661-672 - [e21]Guojun Wang, Md. Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren:
Dependability in Sensor, Cloud, and Big Data Systems and Applications - 5th International Conference, DependSys 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1123, Springer 2019, ISBN 978-981-15-1303-9 [contents] - [e20]Guojun Wang, Abdulmotaleb El-Saddik, Xuejia Lai, Gregorio Martínez Pérez, Kim-Kwang Raymond Choo:
Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1122, Springer 2019, ISBN 978-981-15-1300-8 [contents] - [e19]Guojun Wang, Jun Feng, Md. Zakirul Alam Bhuiyan, Rongxing Lu:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings. Lecture Notes in Computer Science 11611, Springer 2019, ISBN 978-3-030-24906-9 [contents] - [e18]Guojun Wang, Jun Feng, Md. Zakirul Alam Bhuiyan, Rongxing Lu:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings. Lecture Notes in Computer Science 11637, Springer 2019, ISBN 978-3-030-24899-4 [contents] - [e17]Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, José M. Alcaraz Calero:
Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers. Communications in Computer and Information Science 969, Springer 2019, ISBN 978-981-13-5825-8 [contents] - 2018
- [j128]Yinglong Dai, Guojun Wang:
Analyzing Tongue Images Using a Conceptual Alignment Deep Autoencoder. IEEE Access 6: 5962-5972 (2018) - [j127]Karim Alinani, Annadil Alinani, Dua Hussain Narejo, Guojun Wang:
Aggregating Author Profiles from Multiple Publisher Networks to Build a List of Potential Collaborators. IEEE Access 6: 20298-20308 (2018) - [j126]Qiang Zhang, Qin Liu, Guojun Wang:
PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data. IEEE Access 6: 31541-31552 (2018) - [j125]Entao Luo, Md. Zakirul Alam Bhuiyan, Guojun Wang, Md. Arafatur Rahman, Jie Wu, Mohammed Atiquzzaman:
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems. IEEE Commun. Mag. 56(2): 163-168 (2018) - [j124]Tian Wang, Md. Zakirul Alam Bhuiyan, Guojun Wang, Md. Arafatur Rahman, Jie Wu, Jiannong Cao:
Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring. IEEE Commun. Mag. 56(3): 128-133 (2018) - [j123]Shui Yu, Guojun Wang, Xiting Liu, Jianwei Niu:
Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective. IEEE Commun. Mag. 56(9): 14-18 (2018) - [j122]Wenyin Yang, Guojun Wang, Kim-Kwang Raymond Choo, Shuhong Chen:
HEPart: A balanced hypergraph partitioning algorithm for big data applications. Future Gener. Comput. Syst. 83: 250-268 (2018) - [j121]Shaobo Zhang, Kim-Kwang Raymond Choo, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. 86: 881-892 (2018) - [j120]Joarder Kamruzzaman, Guojun Wang, Gour C. Karmakar, Iftekhar Ahmad, Md. Zakirul Alam Bhuiyan:
Acoustic sensor networks in the Internet of Things applications. Future Gener. Comput. Syst. 86: 1167-1169 (2018) - [j119]Feng Wang, Wenjun Jiang, Xiaolin Li, Guojun Wang:
Maximizing positive influence spread in online social networks via fluid dynamics. Future Gener. Comput. Syst. 86: 1491-1502 (2018) - [j118]Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang:
An Anonymous Offline RFID Grouping-Proof Protocol. Future Internet 10(1): 2 (2018) - [j117]Zhimin Liu, Weijia Jia, Guojun Wang:
Area coverage estimation model for directional sensor networks. Int. J. Embed. Syst. 10(1): 13-21 (2018) - [j116]Shaobo Zhang, Guojun Wang, Md. Zakirul Alam Bhuiyan, Qin Liu:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. IEEE Internet Things J. 5(5): 4191-4200 (2018) - [j115]Yinglong Dai, Guojun Wang, Kuan-Ching Li:
Conceptual alignment deep neural networks. J. Intell. Fuzzy Syst. 34(3): 1631-1642 (2018) - [j114]Yang Xu, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique. Secur. Commun. Networks 2018: 6476315:1-6476315:11 (2018) - [j113]Shaobo Zhang, Guojun Wang, Qin Liu, Jemal H. Abawajy:
A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18): 6121-6133 (2018) - [j112]Tian Wang, Jiyuan Zhou, Xinlei Chen, Guojun Wang, Anfeng Liu, Yang Liu:
A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1): 3-12 (2018) - [j111]Youyang Qu, Shui Yu, Wanlei Zhou, Sancheng Peng, Guojun Wang, Ke Xiao:
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wirel. Commun. 25(6): 91-97 (2018) - [j110]Yang Xu, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang, Cheng Zhang:
Towards Secure Network Computing Services for Lightweight Clients Using Blockchain. Wirel. Commun. Mob. Comput. 2018: 2051693:1-2051693:12 (2018) - [c207]Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding. CNS 2018: 1-9 - [c206]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tao Peng:
Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures. DASC/PiCom/DataCom/CyberSciTech 2018: 626-633 - [c205]Muhammad Arif, Guojun Wang, Shuhong Chen:
Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction. DASC/PiCom/DataCom/CyberSciTech 2018: 681-688 - [c204]Saqib Ali, Guojun Wang, Xiaofei Xing, Roger Leslie Cottrell:
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors. DASC/PiCom/DataCom/CyberSciTech 2018: 919-926 - [c203]Wei Zhang, Xiaofei Xing, Saqib Ali, Guojun Wang:
Internet Performance Prediction Framework Based on PingER Dataset. ICA3PP (3) 2018: 118-131 - [c202]Mehdi Gheisari, Guojun Wang, Shuhong Chen, Hamidreza Ghorbani:
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking. ICA3PP (4) 2018: 303-312 - [c201]Xu Li, Guojun Wang, Saqib Ali, QiLin He:
Android Malware Detection Using Category-Based Permission Vectors. ICA3PP (4) 2018: 399-414 - [c200]Md. Zakirul Alam Bhuiyan, Aliuz Zaman, Tian Wang, Guojun Wang, Hai Tao, Mohammad Mehedi Hassan:
Blockchain and Big Data to Transform the Healthcare. ICDPA 2018: 62-68 - [c199]Amir Javadpour, Guojun Wang, Xiaofei Xing:
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 316-321 - [c198]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Shuhong Chen:
Wi-Fi Radar Placement for Coverage in Collapsed Structures. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 423-430 - [c197]Mehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi:
A Method for Privacy-Preserving in IoT-SDN Integration Environment. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 895-902 - [c196]Entao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. ISPEC 2018: 495-505 - [c195]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server. IWQoS 2018: 1-6 - [c194]Md. Zakirul Alam Bhuiyan, Mdaliuz Zaman, Guojun Wang, Tian Wang, Md. Arafatur Rahman, Hai Tao:
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid. SGIoT 2018: 78-84 - [c193]Hafiz ur Rahman, Muhammad Arif, Sadam Al-Azani, Emad Y. Ramadan, Guojun Wang, Jianer Chen, Teodora Olariu, Iustin Olariu:
A Survey of Modern Gene Expression Based Techniques for Cancer Detection and Diagnosis. SOFA (2) 2018: 35-50 - [c192]Oana Geman, Iuliana Chiuchisan, Valentina Emilia Balas, Guojun Wang, Muhammad Arif, Haroon Elahi, Tao Peng:
Portable Non-invasive Device for Measuring Saturated Oxygen of the Blood. SOFA (2) 2018: 457-462 - [c191]Iuliana Chiuchisan, Oana Geman, Valentina Emilia Balas, Guojun Wang, Muhammad Arif, Haroon Elahi, Tao Peng:
"Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors. SOFA (2) 2018: 463-468 - [c190]Muhammad Arif, Guojun Wang, Tian Wang, Tao Peng:
SDN-Based Secure VANETs Communication with Fog Computing. SpaCCS 2018: 46-59 - [c189]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Skyline Query over Road Networks. SpaCCS 2018: 72-83 - [c188]Syed Qasim Afser Rizvi, Guojun Wang, Jianer Chen:
A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing. SpaCCS 2018: 84-97 - [c187]Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang:
A Privacy-Preserving Attribute-Based Access Control Scheme. SpaCCS 2018: 361-370 - [c186]Md. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang:
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals. SpaCCS 2018: 511-521 - [c185]Haroon Elahi, Guojun Wang:
A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings. SSCC 2018: 168-182 - [c184]Muhammad Arif, Guojun Wang, Tao Peng:
Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I. TrustCom/BigDataSE 2018: 1091-1096 - [c183]Saqib Ali, Guojun Wang, Bebo White, Roger Leslie Cottrell:
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER. TrustCom/BigDataSE 2018: 1303-1308 - [c182]Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:
Achieving Secure and Effective Search Services in Cloud Computing. TrustCom/BigDataSE 2018: 1386-1391 - [c181]Yinglong Dai, Xiangyong Liu, Guojun Wang:
A Body Simulator with Delayed Health State Transition. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 635-641 - [c180]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Xiaofei Xing:
Towards Wi-Fi Radar in Collapsed Structures. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 664-670 - [c179]Hafiz ur Rahman, Guojun Wang, Jianer Chen, Hai Jiang:
Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 772-779 - [c178]Qiang Zhang, Guihua Duan, Guojun Wang:
Personalized Search with Secure Updates in Educational Resources. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 962-969 - [c177]Feng Wang, Wenjun Jiang, Guojun Wang:
Low-Dimensional Vectors Learning for Influence Maximization. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 970-976 - [c176]Saqib Ali, Guojun Wang, Md. Zakirul Alam Bhuiyan, Hai Jiang:
Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 991-998 - [c175]Mingfeng Su, Pin Liu, Guojun Wang:
Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in Clouds. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1045-1051 - [c174]Amir Javadpour, Guojun Wang, Samira Rezaei, Shuhong Chen:
Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1364-1370 - [c173]Amir Javadpour, Niusha Adelpour, Guojun Wang, Tao Peng:
Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1371-1377 - [c172]Karim Alinani, Guojun Wang, Annadil Alinani, Dua Hussain Narejo, Mumbere Muyisa Forrest:
Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1414-1421 - [c171]Wenyin Yang, Li Ma, Ruchun Cui, Guojun Wang:
Hypergraph Partitioning for Big Data Applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1705-1710 - [c170]Yang Xu, Quanrun Zeng, Guojun Wang, Hao Min, Ju Ren, Yaoxue Zhang:
A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1982-1987 - [e16]Guojun Wang, Jinjun Chen, Laurence T. Yang:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings. Lecture Notes in Computer Science 11342, Springer 2018, ISBN 978-3-030-05344-4 [contents] - [e15]Guojun Wang, Qi Han, Md. Zakirul Alam Bhuiyan, Xiaoxing Ma, Frédéric Loulergue, Peng Li, Manuel Roveri, Lei Chen:
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018. IEEE 2018, ISBN 978-1-5386-9380-3 [contents] - 2017
- [j109]Ke Gu, Weijia Jia, Guojun Wang, Sheng Wen:
Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5): 521-541 (2017) - [j108]Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:
Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59: 153-164 (2017) - [j107]Ziran Peng, Guojun Wang, Huabin Jiang, Shuangwu Meng:
Research and improvement of ECG compression algorithm based on EZW. Comput. Methods Programs Biomed. 145: 157-166 (2017) - [j106]Shuhong Chen, Guojun Wang, Guofeng Yan, Dongqing Xie:
Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j105]Tao Peng, Qin Liu, Guojun Wang:
A Multilevel Access Control Scheme for Data Security in Transparent Computing. Comput. Sci. Eng. 19(1): 46-53 (2017) - [j104]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [j103]Qin Liu, Avinash Srinivasan, Jiankun Hu, Guojun Wang:
Preface: Security and privacy in big data clouds. Future Gener. Comput. Syst. 72: 206-207 (2017) - [j102]Jiaqi Liu, Guojun Wang, Zhigang Chen, Hui Liu:
A cooperation guarantee mechanism based on altruistic punishment for nodes in distributed environments. Int. J. Auton. Adapt. Commun. Syst. 10(1): 23-37 (2017) - [j101]Yinglong Dai, Wang Yang, Guojun Wang:
Package balancing k-means algorithm for physical distribution. Int. J. Comput. Sci. Eng. 14(4): 349-358 (2017) - [j100]Ziran Peng, Guojun Wang:
An optimal energy-saving real-time task-scheduling algorithm for mobile terminals. Int. J. Distributed Sens. Networks 13(5) (2017) - [j99]Pengfei Yin, Guojun Wang, Wenjun Jiang:
U-Search: usage-based search with collective intelligence. Int. J. High Perform. Comput. Netw. 10(4/5): 341-351 (2017) - [j98]Tao Peng, Qin Liu, Dacheng Meng, Guojun Wang:
Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387: 165-179 (2017) - [j97]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Effective Query Grouping Strategy in Clouds. J. Comput. Sci. Technol. 32(6): 1231-1249 (2017) - [j96]Wenyin Yang, Guojun Wang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo:
Hypergraph partitioning for social networks based on information entropy modularity. J. Netw. Comput. Appl. 86: 59-71 (2017) - [j95]Sancheng Peng, Guojun Wang, Dongqing Xie:
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. IEEE Netw. 31(1): 11-17 (2017) - [j94]Tao Peng, Qin Liu, Guojun Wang:
Enhanced Location Privacy Preserving Scheme in Location-Based Services. IEEE Syst. J. 11(1): 219-230 (2017) - [j93]Md. Zakirul Alam Bhuiyan, Jie Wu, Guojun Wang, Tian Wang, Mohammad Mehedi Hassan:
e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems. ACM Trans. Auton. Adapt. Syst. 12(1): 1:1-1:29 (2017) - [j92]Md. Zakirul Alam Bhuiyan, Jie Wu, Guojun Wang, Jiannong Cao, Wenjun Jiang, Mohammed Atiquzzaman:
Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities. ACM Trans. Cyber Phys. Syst. 1(4): 19:1-19:26 (2017) - [j91]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao, Xuefeng Liu, Tian Wang:
Dependable Structural Health Monitoring Using Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 14(4): 363-376 (2017) - [j90]Md. Zakirul Alam Bhuiyan, Jie Wu, Guojun Wang, Zhigang Chen, Jianer Chen, Tian Wang:
Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Trans. Ind. Informatics 13(2): 572-583 (2017) - [j89]Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, Jie Wu:
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Trans. Parallel Distributed Syst. 28(5): 1417-1429 (2017) - [j88]Feng Wang, Jianbin Li, Wenjun Jiang, Guojun Wang:
Temporal Topic-Based Multi-Dimensional Social Influence Evaluation in Online Social Networks. Wirel. Pers. Commun. 95(3): 2143-2171 (2017) - [j87]Zhufang Kuang, Zhigang Chen, Guojun Wang, Hui Liu:
A Load-Balanced Multicast Routing Algorithm Using Diversity Rate in CWMNs. Wirel. Pers. Commun. 96(3): 4399-4425 (2017) - [c169]Mehdi Gheisari, Guojun Wang, Md. Zakirul Alam Bhuiyan:
A Survey on Deep Learning in Big Data. CSE/EUC (2) 2017: 173-180 - [c168]Md. Zakirul Alam Bhuiyan, Guojun Wang, Tian Wang, Md. Arafatur Rahman, Jie Wu:
Content-Centric Event-Insensitive Big Data Reduction in Internet of Things. GLOBECOM 2017: 1-6 - [c167]Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu:
DABKS: Dynamic attribute-based keyword search in cloud computing. ICC 2017: 1-6 - [c166]Tao Peng, Qin Liu, Guojun Wang, Jianer Chen:
A Lightweight Privacy Aware Friend Locator in Mobile Social Networks. ISPA/IUCC 2017: 17-23 - [c165]Lei Zhou, Guojun Wang, Tongshuai Cui, Xiaofei Xing:
Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services. ISPA/IUCC 2017: 101-107 - [c164]Haroon Elahi, Guojun Wang, Wei Zhang:
A Privacy-Aware Conceptual Framework for Coordination. ISPA/IUCC 2017: 190-197 - [c163]Guangxue Zhang, Tian Wang, Md. Zakirul Alam Bhuiyan, Guojun Wang:
A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure. ISPA/IUCC 2017: 481-485 - [c162]Yuezhong Wu, Zhihong Wang, Shuhong Chen, Guojun Wang, Changyun Li:
Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph. ISPA/IUCC 2017: 715-721 - [c161]Yang Xu, Guojun Wang, Ju Ren, Yaoxue Zhang:
An Adaptive Android Security Extension against Privilege Escalation Attacks. ISPA/IUCC 2017: 752-760 - [c160]Mehdi Gheisari, Guojun Wang, Md. Zakirul Alam Bhuiyan, Wei Zhang:
MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT. ISPA/IUCC 2017: 897-903 - [c159]Yinglong Dai, Guojun Wang, Sihong Chen, Dongqing Xie, Shuhong Chen:
Using Deep Neural Networks to Simulate Human Body. ISPA/IUCC 2017: 959-966 - [c158]Entao Luo, Guojun Wang, Shuhong Chen, Xiangdong Yin, Wen Li:
Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks. ISPA/IUCC 2017: 975-981 - [c157]Saqib Ali, Guojun Wang, Roger Les Cottrell, Tayyba Anwar:
Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor. ISPA/IUCC 2017: 982-989 - [c156]Shaobo Zhang, Guojun Wang, Qin Liu, Xi Wen, Junguo Liao:
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services. ISPA/IUCC 2017: 1004-1010 - [c155]Yunhao Mu, Qin Liu, Junhai Zhou, Kang Xie, Guojun Wang:
Achieving Flow-Oriented Reliable Services in Cloud Computing. ISPA/IUCC 2017: 1011-1017 - [c154]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Xu Li:
Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures. ISPA/IUCC 2017: 1066-1073 - [c153]Muhammad Arif, Guojun Wang:
Segmentation of Calcification and Brain Hemorrhage with Midline Detection. ISPA/IUCC 2017: 1082-1090 - [c152]Qiang Zhang, Guojun Wang, Qin Liu, Tao Peng:
Attribute-Based Encryption with Personalized Search. ISPA/IUCC 2017: 1172-1178 - [c151]Feng Wang, Wenjun Jiang, Guojun Wang, Dongqing Xie:
Data-Driven Influence Learning in Social Networks. ISPA/IUCC 2017: 1179-1185 - [c150]Saqib Ali, Guojun Wang, Roger Les Cottrell, Sara Masood:
Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements. ISPA/IUCC 2017: 1319-1326 - [c149]Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang:
Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms. ISPA/IUCC 2017: 1417-1421 - [c148]Karim Alinani, Guojun Wang, Annadil Alinani, Dua Hussain Narejo:
Who Should Be My Co-Author? Recommender System to Suggest a List of Collaborators. ISPA/IUCC 2017: 1427-1433 - [c147]Xiangyong Liu, Pengfei Yin, Md. Zakirul Alam Bhuiyan, Guojun Wang:
The Strength of Dithering in Recommender System. ISPAN-FCST-ISCC 2017: 71-78 - [c146]Md. Zakirul Alam Bhuiyan, Mdaliuz Zaman, Guojun Wang, Tian Wang, Jie Wu:
Privacy-Protected Data Collection in Wireless Medical Sensor Networks. NAS 2017: 1-2 - [c145]Qifan Wang, Guihua Duan, Entao Luo, Guojun Wang:
Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext. SpaCCS 2017: 42-55 - [c144]Haroon Elahi, Guojun Wang, Xu Li:
Smartphone Bloatware: An Overlooked Privacy Problem. SpaCCS 2017: 169-185 - [c143]Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang:
An ECC-Based Off-line Anonymous Grouping-Proof Protocol. SpaCCS 2017: 186-200 - [c142]Yang Xu, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism. SpaCCS 2017: 332-343 - [c141]Marc Capellupo, Jimmy Liranzo, Md. Zakirul Alam Bhuiyan, Thaier Hayajneh, Guojun Wang:
Security and Attack Vector Analysis of IoT Devices. SpaCCS Workshops 2017: 593-606 - [c140]Lian Duan, Fang Qi, Guojun Wang, Zhe Tang:
Module-Level Software Streaming Loading Model Based on Hypervisor. SpaCCS Workshops 2017: 627-636 - [c139]Entao Luo, Guojun Wang, Qin Liu:
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks. TrustCom/BigDataSE/ICESS 2017: 58-64 - [c138]Shaobo Zhang, Guojun Wang, Qin Liu:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. TrustCom/BigDataSE/ICESS 2017: 402-408 - [c137]Yinglong Dai, Guojun Wang, Sihong Chen, Xiaofei Xing:
Building deep architectures for traditional chinese medicine diagnosis. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - [c136]Haroon Elahi, Guojun Wang, Dongqing Xie:
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [c135]Athina Rosales, Md. Zakirul Alam Bhuiyan, Guojun Wang, Tian Wang, Xiaofei Xing, Abdulhameed Alelaiwi:
Naturalistic driving data for a smart cloud-based abnormal driving detector. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [c134]Feng Wang, Wenjun Jiang, Shuhong Chen, Dongqing Xie, Guojun Wang:
Exploring user topic influence for group recommendation on learning resources. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c133]Lei Zhou, Fengwei Zhang, Guojun Wang:
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [e14]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10656, Springer 2017, ISBN 978-3-319-72388-4 [contents] - [e13]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10658, Springer 2017, ISBN 978-3-319-72394-5 [contents] - 2016
- [j86]Wei Zhou, Yang Xu, Guojun Wang:
Decentralized group key management for hierarchical access control using multilinear forms. Concurr. Comput. Pract. Exp. 28(3): 631-645 (2016) - [j85]Wenjun Jiang, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jie Wu:
Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges. ACM Comput. Surv. 49(1): 10:1-10:35 (2016) - [j84]Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. Future Gener. Comput. Syst. 55: 224-226 (2016) - [j83]Shuhong Chen, Guojun Wang, Weijia Jia:
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Future Gener. Comput. Syst. 55: 391-400 (2016) - [j82]Entao Luo, Qin Liu, Guojun Wang:
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks. IEEE Commun. Lett. 20(9): 1772-1775 (2016) - [j81]Karim Alinani, Annadil Alinani, Xiangyong Liu, Guojun Wang:
Heterogeneous educational resource recommender system based on user preferences. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 20-39 (2016) - [j80]Zheng Ma, Jin Zheng, Weijia Jia, Guojun Wang:
An efficient spatial query processing algorithm in multi-sink wireless sensor networks. Int. J. Sens. Networks 22(4): 274-282 (2016) - [j79]Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Guojun Wang, Laurence T. Yang:
Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks. IEEE Internet Things J. 3(3): 428-438 (2016) - [j78]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
Blood typing for families: a novel hybrid human-computer application. Int. J. Parallel Emergent Distributed Syst. 31(4): 354-376 (2016) - [j77]Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, Huanyang Zheng:
Trust Evaluation in Online Social Networks Using Generalized Network Flow. IEEE Trans. Computers 65(3): 952-963 (2016) - [j76]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics. IEEE Trans. Computers 65(4): 1211-1224 (2016) - [j75]Md. Zakirul Alam Bhuiyan, Jie Wu, Guojun Wang, Jiannong Cao:
Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring. IEEE Trans. Ind. Informatics 12(6): 2103-2114 (2016) - [j74]Li Li, Wang Yang, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Unsupervised learning of indoor localization based on received signal strength. Wirel. Commun. Mob. Comput. 16(15): 2225-2237 (2016) - [c132]Yinglong Dai, Yinong Long, Xiaofei Xing, Guojun Wang:
Exploring Body Constitution in Traditional Chinese Medicine with K-Means Clustering. APSCC 2016: 52-64 - [c131]Yang Li, Tian Wang, Guojun Wang, Junbin Liang, Hongyu Chen:
Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks. APSCC 2016: 130-143 - [c130]Feng Wang, Guojun Wang, Dongqing Xie:
Maximizing the Spread of Positive Influence Under LT-MLA Model. APSCC 2016: 450-463 - [c129]Wenyin Yang, Guojun Wang, Li Ma, Shiyang Wu:
A Distributed Algorithm for Balanced Hypergraph Partitioning. APSCC 2016: 477-490 - [c128]Xiangyong Liu, Guojun Wang, Wenjun Jiang, Yinong Long:
DHMRF: A Dynamic Hybrid Movie Recommender Framework. APSCC 2016: 491-503 - [c127]Md. Zakirul Alam Bhuiyan, Guojun Wang, Kim-Kwang Raymond Choo:
Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System. HPCC/SmartCity/DSS 2016: 1226-1231 - [c126]Yinglong Dai, Wenjun Jiang, Guojun Wang:
Building Bayesian Inference Graphs for Healthcare Statistic Evidence. ICPP Workshops 2016: 415-420 - [c125]Dacheng Meng, Entao Luo, Guojun Wang:
A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare. MASS 2016: 299-306 - [c124]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang:
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services. SpaCCS 2016: 26-38 - [c123]Shaobo Zhang, Qin Liu, Guojun Wang:
A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services. SpaCCS Workshops 2016: 73-82 - [c122]Lei Zhou, Yang Shu, Guojun Wang:
A Software Detection Mechanism Based on SMM in Network Computing. SpaCCS Workshops 2016: 134-143 - [c121]Dacheng Meng, Wenbo Wang, Entao Luo, Guojun Wang:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. SpaCCS 2016: 178-189 - [c120]Entao Luo, Wenbo Wang, Dacheng Meng, Guojun Wang:
A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks. SpaCCS 2016: 190-203 - [c119]Qiang Zhang, Qin Liu, Guojun Wang:
A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data. SpaCCS 2016: 265-278 - [c118]Xiaoyu Zhu, Guojun Wang, Dongqing Xie:
Fuzzy and Semantic Search over Encrypted Data in the Cloud. SpaCCS Workshops 2016: 332-341 - [c117]Lei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang:
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation. Trustcom/BigDataSE/ISPA 2016: 451-457 - [c116]Shaobo Zhang, Qin Liu, Guojun Wang:
Enhancing Location Privacy through User-Defined Grid in Location-Based Services. Trustcom/BigDataSE/ISPA 2016: 730-736 - [c115]Xiaoyu Zhu, Qin Liu, Guojun Wang:
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing. Trustcom/BigDataSE/ISPA 2016: 845-851 - [c114]Yang Shi, Yaoxue Zhang, Fangfang Zhou, Ying Zhao, Guojun Wang, Ronghua Shi, Xing Liang:
IDSPlanet: A Novel Radial Visualization of Intrusion Detection Alerts. VINCI 2016: 25-29 - [e12]Guojun Wang, Yanbo Han, Gregorio Martínez Pérez:
Advances in Services Computing - 10th Asia-Pacific Services Computing Conference, APSCC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10065, 2016, ISBN 978-3-319-49177-6 [contents] - [e11]Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [e10]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero, Sabu M. Thampi:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10066, 2016, ISBN 978-3-319-49147-9 [contents] - [e9]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero, Sabu M. Thampi:
Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10067, 2016, ISBN 978-3-319-49144-8 [contents] - 2015
- [j73]Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong:
Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Networks 93: 199-212 (2015) - [j72]Fang Qi, Shaowei Wu, Zhe Tang, Guojun Wang:
Selective partial recovery optimisation strategy for SSL connection migration. Int. J. Auton. Adapt. Commun. Syst. 8(2/3): 213-227 (2015) - [j71]Hussein Walugembe, Tao Peng, Guojun Wang:
A weighted throttled load balancing approach for virtual machines in cloud environment. Int. J. Comput. Sci. Eng. 11(4): 402-408 (2015) - [j70]Xiaofei Xing, Dongqing Xie, Guojun Wang:
Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme. Int. J. Distributed Sens. Networks 11: 585191:1-585191:10 (2015) - [j69]Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring. Int. J. Embed. Syst. 7(1): 43-54 (2015) - [j68]Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Energy-efficient healthcare monitoring with smartphones and IoT technologies. Int. J. High Perform. Comput. Netw. 8(2): 186-194 (2015) - [j67]Xiaofei Xing, Guojun Wang, Jie Li:
A square-based coverage and connectivity probability model for WSNs. Int. J. Sens. Networks 19(3/4): 161-170 (2015) - [j66]Shuhong Chen, Guojun Wang, Weijia Jia:
κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph. Inf. Sci. 318: 123-143 (2015) - [j65]Shui Yu, Guojun Wang, Wanlei Zhou:
Modeling malicious activities in cyber space. IEEE Netw. 29(6): 83-87 (2015) - [j64]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring. IEEE Trans. Computers 64(2): 382-395 (2015) - [j63]Md. Zakirul Alam Bhuiyan, Guojun Wang, Athanasios V. Vasilakos:
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. IEEE Trans. Computers 64(7): 1968-1982 (2015) - [j62]Rajiv Ranjan, Lizhe Wang, Albert Y. Zomaya, Dimitrios Georgakopoulos, Xian-He Sun, Guojun Wang:
Recent advances in autonomic provisioning of big data applications on clouds. IEEE Trans. Cloud Comput. 3(2): 101-104 (2015) - [j61]Wenjun Jiang, Jie Wu, Guojun Wang:
On Selecting Recommenders for Trust Evaluation in Online Social Networks. ACM Trans. Internet Techn. 15(4): 14:1-14:21 (2015) - [j60]Guojun Wang, Felix Musau, Song Guo, Muhammad Bashir Abdullahi:
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce. IEEE Trans. Parallel Distributed Syst. 26(3): 824-833 (2015) - [c113]Binji Mo, Wenjuan Tang, Yang Xu, Guojun Wang:
Design and Implementation of Streaming Application Execution Platform in Android. IEEE WISA 2015: 318-323 - [c112]Qin Liu, Guojun Wang, Jie Wu, Wei Chang:
User-Controlled Security Mechanism in Data-Centric Clouds. HPCC/CSS/ICESS 2015: 647-653 - [c111]Zheng Ma, Jin Zheng, Weijia Jia, Guojun Wang:
An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network. ICA3PP (Workshops and Symposiums) 2015: 13-23 - [c110]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. ICA3PP (3) 2015: 134-147 - [c109]Wenjuan Tang, Yang Xu, Guojun Wang, Yaoxue Zhang:
An Illegal Indirect Access Prevention Method in Transparent Computing System. ICA3PP (Workshops and Symposiums) 2015: 264-275 - [c108]Wang Yang, Lei Jia, Guojun Wang:
Application Streaming: A Mobile Application Distribution Method. ICA3PP (1) 2015: 303-316 - [c107]Binji Mo, Yang Xu, Guojun Wang:
Streaming Computing Technology for Android Applications: Design Model and Case Study. ICA3PP (Workshops and Symposiums) 2015: 370-381 - [c106]Jiaqi Liu, Guojun Wang, Deng Li, Hui Liu:
ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications. ICA3PP (1) 2015: 415-429 - [c105]Shaobo Zhang, Qin Liu, Guojun Wang:
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. ICA3PP (3) 2015: 417-428 - [c104]Entao Luo, Qin Liu, Guojun Wang:
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks. ICA3PP (3) 2015: 463-474 - [c103]Zhen Peng, Tian Wang, Md. Zakirul Alam Bhuiyan, Xiaoqiang Wu, Guojun Wang:
Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks. ICA3PP (Workshops and Symposiums) 2015: 531-540 - [c102]Xiaoyu Zhu, Qin Liu, Guojun Wang:
Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing. ICA3PP (3) 2015: 655-666 - [c101]Wenyin Yang, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy. ICA3PP (2) 2015: 678-690 - [c100]Wei Zhou, Yang Xu, Lijuan Yang, Guojun Wang:
Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications. ICA3PP (Workshops and Symposiums) 2015: 678-690 - [c99]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xiaofei Xing, Xiangyong Liu:
Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring. PRDC 2015: 91-98 - [c98]Wei Zhou, Yang Xu, Guojun Wang:
Research on Key Management for Multi-privileged Group Communications. TrustCom/BigDataSE/ISPA (1) 2015: 151-158 - [e8]Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9528, Springer 2015, ISBN 978-3-319-27118-7 [contents] - [e7]Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9529, Springer 2015, ISBN 978-3-319-27121-7 [contents] - [e6]Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part III. Lecture Notes in Computer Science 9530, Springer 2015, ISBN 978-3-319-27136-1 [contents] - [e5]Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part IV. Lecture Notes in Computer Science 9531, Springer 2015, ISBN 978-3-319-27139-2 [contents] - [e4]Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings. Lecture Notes in Computer Science 9532, Springer 2015, ISBN 978-3-319-27160-6 [contents] - [i1]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao:
Dependable Structural Helath Monitoring Using Wireless Sensor Networks. CoRR abs/1509.06065 (2015) - 2014
- [j59]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu:
Containing smartphone worm propagation with an influence maximization algorithm. Comput. Networks 74: 103-113 (2014) - [j58]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu:
Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Comput. Secur. 44: 92-103 (2014) - [j57]Zheng Yan, Guojun Wang, Valtteri Niemi, Robert H. Deng:
Editorial: Special issue on trust in cyber, physical and social computing. Comput. Secur. 47: 1-2 (2014) - [j56]Wenjun Jiang, Guojun Wang, Jie Wu:
Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. 31: 48-58 (2014) - [j55]Jin Zheng, Md. Zakirul Alam Bhuiyan, Shaohua Liang, Xiaofei Xing, Guojun Wang:
Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Gener. Comput. Syst. 39: 88-99 (2014) - [j54]Zhufang Kuang, Guojun Wang, Zhigang Chen, Hui Liu:
A distributed resource conservation multicast and spectrum allocation algorithm in cognitive wireless mesh networks. Int. J. Embed. Syst. 6(2/3): 198-206 (2014) - [j53]Pinial Khan Butt, Wang Yang, Guojun Wang:
Achieving energy efficient advertisements traffic for smartphones. Int. J. Embed. Syst. 6(2/3): 225-232 (2014) - [j52]Qin Liu, Guojun Wang, Jie Wu:
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258: 355-370 (2014) - [j51]Yongming Xie, Guojun Wang:
Message matching-based greedy behavior detection in delay tolerant networks. J. Comput. Syst. Sci. 80(5): 903-915 (2014) - [j50]Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi:
Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Netw. Appl. 7(4): 295-310 (2014) - [j49]Qin Liu, Guojun Wang, Jie Wu:
Consistency as a Service: Auditing Cloud Consistency. IEEE Trans. Netw. Serv. Manag. 11(1): 25-35 (2014) - [j48]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Sensor Placement with Multiple Objectives for Structural Health Monitoring. ACM Trans. Sens. Networks 10(4): 68:1-68:45 (2014) - [j47]Zhenfu Cao, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - [j46]Guojun Wang, Md. Zakirul Alam Bhuiyan, Jiannong Cao, Jie Wu:
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 25(4): 939-949 (2014) - [j45]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Towards Differential Query Services in Cost-Efficient Clouds. IEEE Trans. Parallel Distributed Syst. 25(6): 1648-1658 (2014) - [j44]Guojun Wang, Wenjun Jiang, Jie Wu, Zhengli Xiong:
Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2286-2296 (2014) - [j43]Xiaofei Xing, Guojun Wang, Jie Li:
Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming. Wirel. Commun. Mob. Comput. 14(14): 1397-1408 (2014) - [c97]Fang Qi, Weijie Zhang, Guojun Wang, Hui Fang:
Unified Security Architecture Research for 5G Wireless System. IEEE WISA 2014: 91-94 - [c96]Guojun Wang, Qin Liu, Yang Xiang, Jianer Chen:
Security from the transparent computing aspect. ICNC 2014: 216-220 - [c95]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. INFOCOM 2014: 1707-1715 - [c94]Md. Zakirul Alam Bhuiyan, Guojun Wang:
Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications. PRDC 2014: 225-233 - 2013
- [j42]Yongming Xie, Guojun Wang:
Practical distributed secret key generation for delay tolerant networks. Concurr. Comput. Pract. Exp. 25(14): 2067-2079 (2013) - [j41]Yueming Deng, Guojun Wang, Jiannong Cao, Xin Xiao:
Practical secure and fast handoff framework for pervasive Wi-Fi access. IET Inf. Secur. 7(1): 22-29 (2013) - [j40]Guojun Wang, Fengshun Yue, Qin Liu:
A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2): 279-290 (2013) - [j39]Guojun Wang, Jianhua Ma, Xiaolin Andy Li, Athanasios V. Vasilakos:
Special issue of JCSS on UbiSafe computing and communications. J. Comput. Syst. Sci. 79(5): 515-517 (2013) - [j38]Sancheng Peng, Guojun Wang, Shui Yu:
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. J. Comput. Syst. Sci. 79(5): 586-595 (2013) - [j37]Guojun Wang, Wanlei Zhou, Laurence T. Yang:
Trust, security and privacy for pervasive applications. J. Supercomput. 64(3): 661-663 (2013) - [j36]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
User requirements-aware security ranking in SSL protocol. J. Supercomput. 64(3): 762-776 (2013) - [j35]Guojun Wang, Qiushuang Du, Wei Zhou, Qin Liu:
A scalable encryption scheme for multi-privileged group communications. J. Supercomput. 64(3): 1075-1091 (2013) - [c93]Tao Peng, Qin Liu, Guojun Wang:
Privacy Preserving for Location-Based Services Using Location Transformation. CSS 2013: 14-28 - [c92]Shuhong Chen, Guojun Wang, Weijia Jia:
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. CSS 2013: 387-402 - [c91]Juan Li, Wang Yang, Guojun Wang:
A Cross Layer Design for Improving Trivial File Transfer Protocol in Mobile Transparent Computing. HPCC/EUC 2013: 1872-1877 - [c90]Shaoming Guo, Wang Yang, Guojun Wang:
NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing. HPCC/EUC 2013: 1878-1883 - [c89]Huanying Yin, Wang Yang, Guojun Wang:
Wireless Multicast for Mobile Transparent Computing. HPCC/EUC 2013: 1884-1889 - [c88]Sancheng Peng, Guojun Wang, Shui Yu:
Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks. HPCC/EUC 2013: 2194-2199 - [c87]Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. INFOCOM 2013: 2886-2894 - [c86]Xiaofei Xing, Dongqing Xie, Guojun Wang:
Data Gathering and Processing for Large-Scale Wireless Sensor Networks. MSN 2013: 354-358 - [c85]Wenjun Jiang, Jie Wu, Guojun Wang:
RATE: Recommendation-aware Trust Evaluation in Online Social Networks. NCA 2013: 149-152 - [c84]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events. SECON 2013: 194-202 - [c83]Sancheng Peng, Guojun Wang, Shui Yu:
Modeling Malware Propagation in Smartphone Social Networks. TrustCom/ISPA/IUCC 2013: 196-201 - [c82]Wei Zhou, Yang Xu, Guojun Wang:
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications. TrustCom/ISPA/IUCC 2013: 644-650 - [c81]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Local Monitoring and Maintenance for Operational Wireless Sensor Networks. TrustCom/ISPA/IUCC 2013: 837-844 - [c80]Li Li, Wang Yang, Guojun Wang:
HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization. TrustCom/ISPA/IUCC 2013: 1747-1753 - [e3]Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3 [contents] - 2012
- [j34]Tian Wang, Weijia Jia, Guojun Wang, Minyi Guo, Jie Li:
Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 16(1-3): 191-138 (2012) - [j33]Gaocai Wang, Guojun Wang, Zhiguang Shan:
Fault tolerance analysis of mesh networks with uniform versus nonuniform node failure probability. Inf. Process. Lett. 112(10): 396-401 (2012) - [j32]Laurence Tianruo Yang, Guojun Wang:
Special issue on trusted computing and communications. J. Netw. Comput. Appl. 35(3): 865-866 (2012) - [j31]Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3): 927-933 (2012) - [j30]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Cooperative private searching in clouds. J. Parallel Distributed Comput. 72(8): 1019-1031 (2012) - [j29]Felix Musau, Guojun Wang, Shui Yu, Muhammad Bashir Abdullahi:
Securing Recommendations in Grouped P2P E-Commerce Trust Model. IEEE Trans. Netw. Serv. Manag. 9(4): 407-420 (2012) - [c79]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Dynamic Grouping Strategy in Cloud Computing. CGC 2012: 59-66 - [c78]Md. Zakirul Alam Bhuiyan, Jiannong Cao, Guojun Wang:
Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring. DCOSS 2012: 194-202 - [c77]Muhammad Bashir Abdullahi, Guojun Wang:
Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks. DCOSS 2012: 297-299 - [c76]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao:
Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs. HPCC-ICESS 2012: 699-706 - [c75]Qin Liu, Guojun Wang, Jie Wu:
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds. ICPP Workshops 2012: 304-305 - [c74]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Efficient information retrieval for ranked queries in cost-effective cloud environments. INFOCOM 2012: 2581-2585 - [c73]Md. Zakirul Alam Bhuiyan, Jiannong Cao, Guojun Wang, Xuefeng Liu:
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks. SRDS 2012: 301-310 - [c72]Zhengli Xiong, Wenjun Jiang, Guojun Wang:
Evaluating User Community Influence in Online Social Networks. TrustCom 2012: 640-647 - [c71]Muhammad Bashir Abdullahi, Guojun Wang:
A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. TrustCom 2012: 978-985 - [c70]Felix Musau, Guojun Wang, Song Guo, Muhammad Bashir Abdullahi:
Neighbor Similarity Trust against Sybil Attack in P2P E-commerce. UIC/ATC 2012: 547-554 - [e2]Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya:
Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I. Lecture Notes in Computer Science 7439, Springer 2012, ISBN 978-3-642-33077-3 [contents] - [e1]Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya:
Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II. Lecture Notes in Computer Science 7440, Springer 2012, ISBN 978-3-642-33064-3 [contents] - 2011
- [j28]Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5): 320-331 (2011) - [j27]Guojun Wang, Qin Liu, Jie Wu:
Achieving fine-grained access control for secure data sharing on cloud servers. Concurr. Comput. Pract. Exp. 23(12): 1443-1464 (2011) - [j26]Guojun Wang, Jie Wu:
FlowTrust: trust inference with network flows. Frontiers Comput. Sci. China 5(2): 181-194 (2011) - [j25]Guojun Wang, Jie Wu:
Multi-dimensional evidence-based trust management with multi-trusted paths. Future Gener. Comput. Syst. 27(5): 529-538 (2011) - [j24]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Guest editorial: Trusted computing and communications. Secur. Commun. Networks 4(1): 1-2 (2011) - [j23]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. Secur. Commun. Networks 4(4): 372-383 (2011) - [c69]Xuefeng Liu, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Steven Lai, Hejun Wu, Guojun Wang:
Fault tolerant WSN-based structural health monitoring. DSN 2011: 37-48 - [c68]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Reliable Re-Encryption in Unreliable Clouds. GLOBECOM 2011: 1-5 - [c67]Sancheng Peng, Guojun Wang:
Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. TrustCom 2011: 282-287 - [c66]Wenjun Jiang, Guojun Wang:
SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks. TrustCom 2011: 320-327 - [c65]Yongming Xie, Guojun Wang:
Distributed Private-Key Generation Scheme with Self-Certified Identity. TrustCom 2011: 501-508 - [c64]Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau:
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. TrustCom 2011: 548-555 - [c63]Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi:
Group Formation with Neighbor Similarity Trust in P2P E-Commerce. TrustCom 2011: 835-840 - [c62]Shaohua Liang, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs. TrustCom 2011: 1217-1223 - [c61]Zheng Ma, Weijia Jia, Guojun Wang:
Routing with Virtual Region Coordinates in Wireless Sensor Networks. TrustCom 2011: 1657-1661 - 2010
- [j22]Guojun Wang, Md. Zakirul Alam Bhuiyan, Li Zhang:
Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks. Concurr. Comput. Pract. Exp. 22(4): 518-537 (2010) - [j21]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 93-D(3): 409-410 (2010) - [j20]Sancheng Peng, Weijia Jia, Guojun Wang, Jie Wu, Minyi Guo:
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 93-D(3): 510-517 (2010) - [j19]Minyi Guo, Elizabeth Olule, Guojun Wang, Song Guo:
Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks. J. Supercomput. 51(2): 131-148 (2010) - [c60]Yongming Xie, Guojun Wang, Jie Wu:
Fuzzy Location Service for Mobile Ad Hoc Networks. CIT 2010: 289-296 - [c59]Qin Liu, Guojun Wang, Jie Wu:
Efficient Sharing of Secure Cloud Storage Services. CIT 2010: 922-929 - [c58]Guojun Wang, Qin Liu, Jie Wu:
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. CCS 2010: 735-737 - [c57]Qiushuang Du, Guojun Wang, Qin Liu:
A Scalable Encryption Scheme for Multi-Privileged Group Communications. EUC 2010: 597-602 - [c56]Fengshun Yue, Guojun Wang, Qin Liu:
A Secure Self-Destructing Scheme for Electronic Data. EUC 2010: 651-658 - [c55]Jin Zheng, Weijia Jia, Guojun Wang, Jie Wu:
Target Trajectory Querying in Wireless Sensor Networks. ICC 2010: 1-6 - [c54]Xiaofei Xing, Jie Li, Guojun Wang:
Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks. MSN 2010: 79-84 - [c53]Yun Ge, Guojun Wang, Jie Wu:
Node-Disjoint Multipath Routing with Group Mobility in MANETs. NAS 2010: 181-189
2000 – 2009
- 2009
- [j18]Yun Ge, Guojun Wang, Qing Zhang, Minyi Guo:
Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 92-D(9): 1675-1682 (2009) - [j17]Jiannong Cao, Lin Liao, Guojun Wang, Hao Ma, Bin Xiao:
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 183-190 (2009) - [j16]Wenfeng Du, Weijia Jia, Guojun Wang, Wenyan Lu:
Analysis of channel allocation scheme for wireless cellular networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 201-209 (2009) - [j15]Jin Zheng, Weijia Jia, Guojun Wang:
Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks. J. Comput. 4(9): 845-852 (2009) - [j14]San-Cheng Peng, Weijia Jia, Guo-Jun Wang:
Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks. J. Comput. Sci. Technol. 24(4): 761-774 (2009) - [j13]Guojun Wang, Tian Wang, Weijia Jia, Minyi Guo, Jie Li:
Adaptive location updates for mobile sinks in wireless sensor networks. J. Supercomput. 47(2): 127-145 (2009) - [c52]Xiaofei Xing, Guojun Wang, Jie Wu, Jie Li:
Square region-based coverage and connectivity probability model in wireless sensor networks. CollaborateCom 2009: 1-8 - [c51]Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. CSE (2) 2009: 715-720 - [c50]Huang Lu, Jie Li, Guojun Wang:
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks. FCST 2009: 565-570 - [c49]Weirong Liu, Min Wu, Jun Peng, Guojun Wang:
A Fuzzy Mechanism to Avoid Packet Accumulation in Fair Flow Control. FSKD (3) 2009: 450-454 - [c48]Weirong Liu, Min Wu, Jun Peng, Guojun Wang:
Designing fair flow fuzzy controller using genetic algorithm for computer networks. GEC Summit 2009: 361-368 - [c47]Peiqiang Li, Guojun Wang, Jie Wu, Hong-Chuan Yang:
Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks. GLOBECOM 2009: 1-6 - [c46]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu:
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks. ICCCN 2009: 1-6 - [c45]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu:
Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks. ICPADS 2009: 174-181 - [c44]Khoriba Ghada, Jie Li, Yusheng Ji, Guojun Wang:
Cross-layer Approach for Energy Efficient Routing in WANETs. MASS 2009: 393-402 - [c43]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. MASS 2009: 842-847 - [c42]Xiaofei Xing, Guojun Wang, Jie Wu:
Herd-Based Target Tracking Protocol in Wireless Sensor Networks. WASA 2009: 135-148 - [c41]Yulei Wu, Geyong Min, Guojun Wang, Jianmin Jiang:
Modelling of heterogeneous wireless networks under batch arrival traffic with communication locality. WCNC 2009: 2798-2803 - 2008
- [j12]Guojun Wang, Lifan Zhang, Jiannong Cao:
Hole-shadowing routing in large-scale MANETs. Int. J. Sens. Networks 4(4): 220-229 (2008) - [c40]Sancheng Peng, Weijia Jia, Guojun Wang:
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. EUC (2) 2008: 3-9 - [c39]Yun Ge, Guojun Wang, Weijia Jia, Yongming Xie:
Node-Disjoint Multipath Routing with Zoning Method in MANETs. HPCC 2008: 456-462 - [c38]Qingjun Mo, Guojun Wang, Weijia Jia, Sancheng Peng:
Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks. ICPADS 2008: 377-382 - [c37]Sancheng Peng, Weijia Jia, Guojun Wang:
Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory. ICYCS 2008: 432-438 - [c36]Yuan Lu, Guojun Wang, Weijia Jia, Sancheng Peng:
Multipath-Based Segment-by-Segment Routing Protocol in MANETs. ICYCS 2008: 527-532 - [c35]Jin Zheng, Weijia Jia, Guojun Wang:
A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks. ICYCS 2008: 545-551 - [c34]Fang Qi, Zhe Tang, Guojun Wang:
Attacks vs. Countermeasures of SSL Protected Trust Model. ICYCS 2008: 1986-1991 - [c33]Yujie Chen, Guojun Wang, Sancheng Peng:
Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs. ISPA 2008: 387-392 - 2007
- [j11]Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo:
Efficient group key management for multi-privileged groups. Comput. Commun. 30(11-12): 2497-2509 (2007) - [j10]Jianer Chen, GaoCai Wang, Chuang Lin, Tao Wang, Guojun Wang:
Probabilistic analysis on mesh network fault tolerance. J. Parallel Distributed Comput. 67(1): 100-110 (2007) - [j9]Jiannong Cao, Guojun Wang, Keith C. C. Chan:
A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks. IEEE Trans. Computers 56(1): 80-94 (2007) - [c32]Guojun Wang, Qiong Wang, Jiannong Cao, Minyi Guo:
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. CIT 2007: 749-754 - [c31]Guojun Wang, Qingjun Mo, Minyi Guo, Weijia Jia:
Designing Piecewise QoS Routing Protocol in Large-Scale MANETs. FCST 2007: 1-6 - [c30]Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo:
ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications. GLOBECOM 2007: 172-176 - [c29]Guojun Wang, Jiannong Cao, Huan Wang, Minyi Guo:
Polynomial Regression for Data Gathering in Environmental Monitoring Applications. GLOBECOM 2007: 1307-1311 - [c28]Jianxin Wang, Liang Rong, Guojun Wang, Weijia Jia, Minyi Guo:
Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks. ICC 2007: 287-292 - [c27]Guojun Wang, Tian Wang, Weijia Jia, Minyi Guo, Hsiao-Hwa Chen, Mohsen Guizani:
Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks. ICC 2007: 3094-3099 - [c26]Mianxiong Dong, Kaoru Ota, Zixue Cheng, Guojun Wang:
A Support Method for Improving Learner's Learning Habit Using Behavior Analysis in a Ubiquitous Environment. ICPP Workshops 2007: 67 - [c25]Elizabeth Olule, Guojun Wang, Minyi Guo, Mianxiong Dong:
RARE: An Energy-Efficient Target Tracking Protocol for Wireless Sensor Networks. ICPP Workshops 2007: 76 - [c24]Guojun Wang, Huan Wang, Jiannong Cao, Minyi Guo:
Energy-Efficient Dual Prediction-Based Data Gathering for Environmental Monitoring Applications. WCNC 2007: 3513-3518 - [c23]Weijia Jia, Tian Wang, Guojun Wang, Minyi Guo:
Hole Avoiding in Advance Routing in Wireless Sensor Networks. WCNC 2007: 3519-3523 - [c22]Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang:
Local Retransmission-Based Gossip Protocol in Mobile Ad Hoc Networks. WCNC 2007: 4244-4249 - 2006
- [j8]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
A self-organizable topology maintenance protocol for mobile group communications in mobile next-generation networks. Comput. Commun. 29(10): 1730-1743 (2006) - [j7]Jiannong Cao, Lin Liao, Guojun Wang:
Scalable key management for secure multicast communication in the mobile environment. Pervasive Mob. Comput. 2(2): 187-203 (2006) - [c21]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
A Proxy-based Mobile Group Membership Protocol for Large Scale and Highly Dynamic Groups. ICC 2006: 1897-1902 - [c20]Guojun Wang, Lifan Zhang, Jiannong Cao:
Logical Location-based Routing with Hole-shadowing in Large-scale MANETs. ICC 2006: 3560-3565 - [c19]Jiannong Cao, Lifan Zhang, Guojun Wang, Hui Cheng:
SSR: Segment-by-Segment Routing in Large-Scale Mobile Ad Hoc Networks. MASS 2006: 216-225 - 2005
- [j6]Jianer Chen, Iyad A. Kanj, Guojun Wang:
Hypercube Network Fault Tolerance: A Probabilistic Approach. J. Interconnect. Networks 6(1): 17-34 (2005) - [j5]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
A novel group communication protocol using the RingNet hierarchy in mobile Internet. Parallel Algorithms Appl. 20(3-4): 253-280 (2005) - [j4]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
A protocol for partitionable group membership service in mobile Internet. Wirel. Commun. Mob. Comput. 5: 773-792 (2005) - [c18]Guojun Wang, Yingjun Lin, Minyi Guo:
A Scalable and Reliable Multiple Home Regions Based Location Service in Mobile Ad Hoc Networks. EUC 2005: 550-559 - [c17]Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang:
Modeling and Performance Evaluation of Handover Service in Wireless Networks. ICCNMC 2005: 229-238 - [c16]Guojun Wang, Lifan Zhang, Jiannong Cao:
A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs. ICCNMC 2005: 364-374 - [c15]Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao:
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. ICCNMC 2005: 560-569 - [c14]Fang Qi, Jin Zheng, Weijia Jia, Guojun Wang:
Available Bandwidth Measurement Schemes over Networks. ICCNMC 2005: 931-940 - [c13]Guojun Wang, Jiannong Cao, Lifan Zhang, Keith C. C. Chan, Jie Wu:
A Novel QoS Multicast Model in Mobile Ad Hoc Networks. IPDPS 2005 - [c12]Guojun Wang, Zhongshan Gao, Lifan Zhang, Jiannong Cao:
Prediction-Based Multicast Mobility Management in Mobile Internet. ISPA 2005: 1024-1035 - [c11]Guojun Wang, Dingzhu Lu, Weijia Jia, Jiannong Cao:
Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks. MSN 2005: 207-218 - 2004
- [j3]Gao-Cai Wang, Jianer Chen, Guo-Jun Wang:
On Fault Tolerance of 3-Dimensional Mesh Networks. J. Comput. Sci. Technol. 19(2): 183-190 (2004) - [c10]Guojun Wang, Lin Liao, Jiannong Cao, Keith C. C. Chan:
Key Management for Secure Multicast Using the RingNet Hierarchy. CIS 2004: 77-84 - [c9]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
RGB: A Scalable and Reliable Group Membership Protocol in Mobile Internet. ICPP 2004: 326-333 - [c8]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet. ICPP Workshops 2004: 108-115 - [c7]Guojun Wang, Jun Luo, Jiannong Cao, Keith C. C. Chan:
QoSRHMM: A QoS-Aware Ring-Based Hierarchical Multi-path Multicast Routing Protocol. ISPA 2004: 568-577 - [c6]Xiaolin Xiao, Guojun Wang, Jianer Chen:
Fault Tolerant Routing Algorithm in Hypercube Networks with Load Balancing Support. ISPA 2004: 698-704 - [c5]GaoCai Wang, Jianer Chen, Guojun Wang:
On Fault Tolerance of 3-Dimensional Mesh Networks. ISPAN 2004: 149-154 - 2003
- [c4]Gaocai Wang, Jianer Chen, Guojun Wang, Songqiao Chen:
Probability Model for Faults in Large-Scale Multicomputer Systems. Asian Test Symposium 2003: 452-457 - [c3]GaoCai Wang, Jianer Chen, Guojun Wang:
A Probabilistic Approach to Fault Tolerant Broadcast Routing Algorithms on Mesh Networks. IPDPS 2003: 216 - [c2]GaoCai Wang, Jianer Chen, Guojun Wang:
Probabilistic Analysis of Connectivity on Mesh Networks. ITCC 2003: 362-366 - 2002
- [j2]Jianer Chen, Guojun Wang, Songqiao Chen:
Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results. IEEE Trans. Computers 51(5): 530-540 (2002) - [c1]Jianer Chen, Iyad A. Kanj, Guojun Wang:
Hypercube Network Fault Tolerance: A Probabilistic Approach. ICPP 2002: 65-72 - 2001
- [j1]Jianer Chen, Guojun Wang, Songqiao Chen:
Routing in Hypercube Networks with a Constant Fraction of Faulty Nodes. J. Interconnect. Networks 2(3): 283-294 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint