Chen Wang
Orcid: 0000-0002-3951-3159Affiliations:
- Nanjing University of Information Science and Technology, School of Computer and Software, China
According to our database1,
Chen Wang
authored at least 58 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks.
IEEE Trans. Veh. Technol., August, 2025
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., June, 2025
IEEE Trans. Netw. Sci. Eng., 2025
2024
Privacy Preserving Multi-Party Computation With Secret Sharing for Trajectory Prediction in VANETs.
IEEE Trans. Veh. Technol., December, 2024
IEEE Trans. Commun., November, 2024
Joint Association, Trajectory, Offloading, and Resource Optimization in Air and Ground Cooperative MEC Systems.
IEEE Trans. Veh. Technol., September, 2024
ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Veh. Technol., January, 2024
Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models.
Proceedings of the Machine Learning for Cyber Security - 6th International Conference, 2024
Proceedings of the Machine Learning for Cyber Security - 6th International Conference, 2024
2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
An effective revocable and traceable public auditing scheme for sensor-based urban cities.
J. King Saud Univ. Comput. Inf. Sci., 2023
Future Gener. Comput. Syst., 2023
Energy Consumption Minimization in Dynamic UAV-assisted Mobile Edge Computing Networks.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
Joint ABS Deployment and TBS Antenna Downtilt Optimization for Coverage Maximization.
IEEE Wirel. Commun. Lett., 2022
Energy-Saving Deployment Optimization and Resource Management for UAV-Assisted Wireless Sensor Networks With NOMA.
IEEE Trans. Veh. Technol., 2022
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022
Deep neural network based UAV deployment and dynamic power control for 6G-Envisioned intelligent warehouse logistics system.
Future Gener. Comput. Syst., 2022
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022
Joint UAVs Position Optimization and Offloading Decision for Blockchain-enabled Intelligent Transportation.
Proceedings of the IEEE INFOCOM 2022, 2022
Dynamic UAV Deployment, Admission Control, and Power Control for Air-and-ground Cooperative Networks.
Proceedings of the IEEE International Conference on Communications, 2022
2021
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Emerg. Top. Comput., 2021
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Position Optimization and Resource Management for UAV-Assisted Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019
Soft Comput., 2019
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.
Peer-to-Peer Netw. Appl., 2019
Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks.
Wirel. Commun. Mob. Comput., 2018
Secur. Commun. Networks, 2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
IEEE Netw., 2018
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017
An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2014
Proceedings of the Intelligent Systems and Applications, 2014
2007
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007