Chen Wang

Orcid: 0000-0002-3951-3159

Affiliations:
  • Nanjing University of Information Science and Technology, School of Computer and Software, China


According to our database1, Chen Wang authored at least 58 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks.
IEEE Trans. Veh. Technol., August, 2025

Less Traces Are All It Takes: Efficient Side-Channel Analysis on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., June, 2025

Energy-Efficient Federated Learning Through UAV Edge Under Location Uncertainties.
IEEE Trans. Netw. Sci. Eng., 2025

2024
Privacy Preserving Multi-Party Computation With Secret Sharing for Trajectory Prediction in VANETs.
IEEE Trans. Veh. Technol., December, 2024

Latency Minimization for UAV-Assisted MEC Networks With Blockchain.
IEEE Trans. Commun., November, 2024

Joint Association, Trajectory, Offloading, and Resource Optimization in Air and Ground Cooperative MEC Systems.
IEEE Trans. Veh. Technol., September, 2024

ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024

ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024

Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs.
IEEE Trans. Veh. Technol., January, 2024

Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models.
Proceedings of the Machine Learning for Cyber Security - 6th International Conference, 2024

A Decentralized Bitcoin Mixing Scheme Based on Multi-signature.
Proceedings of the Machine Learning for Cyber Security - 6th International Conference, 2024

2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

An effective revocable and traceable public auditing scheme for sensor-based urban cities.
J. King Saud Univ. Comput. Inf. Sci., 2023

Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems.
Future Gener. Comput. Syst., 2023

Energy Consumption Minimization in Dynamic UAV-assisted Mobile Edge Computing Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Joint ABS Deployment and TBS Antenna Downtilt Optimization for Coverage Maximization.
IEEE Wirel. Commun. Lett., 2022

Energy-Saving Deployment Optimization and Resource Management for UAV-Assisted Wireless Sensor Networks With NOMA.
IEEE Trans. Veh. Technol., 2022

Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022

Deep neural network based UAV deployment and dynamic power control for 6G-Envisioned intelligent warehouse logistics system.
Future Gener. Comput. Syst., 2022

Joint optimization for latency minimization in UAV-assisted MEC networks.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

Joint UAVs Position Optimization and Offloading Decision for Blockchain-enabled Intelligent Transportation.
Proceedings of the IEEE INFOCOM 2022, 2022

Dynamic UAV Deployment, Admission Control, and Power Control for Air-and-ground Cooperative Networks.
Proceedings of the IEEE International Conference on Communications, 2022

2021
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021

A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data.
IEEE Trans. Emerg. Top. Comput., 2021

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021

Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021

Trusted data sharing with flexible access control based on blockchain.
Comput. Stand. Interfaces, 2021

A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Position Optimization and Resource Management for UAV-Assisted Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Content-Centric Group User Authentication for Secure Social Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020

Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020

Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020

Anonymous data collection scheme for cloud-aided mobile edge networks.
Digit. Commun. Networks, 2020

2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

Intelligent agent-based region division scheme for mobile sensor networks.
Soft Comput., 2019

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.
Peer-to-Peer Netw. Appl., 2019

Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2019

A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks.
Wirel. Commun. Mob. Comput., 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Secur. Commun. Networks, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018

Secure Emergent Data Protection Scheme for a Space-Terrestrial Integrated Network.
IEEE Netw., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017

An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

A Novel Clustering Solution for Wireless Sensor Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Fibonacci Based Batch Auditing Protocol for Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2014
Performance Comparison of Typical Routing Protocols in Ad-hoc Networks.
Proceedings of the Intelligent Systems and Applications, 2014

2007
A New Approach to Describe Web Services.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007


  Loading...