Chen Wang

Orcid: 0000-0001-9460-3221

Affiliations:
  • Northeastern University, Software College, Shenyang, China


According to our database1, Chen Wang authored at least 14 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A verifiable and secure DNN classification model over encrypted data.
Int. J. Comput. Sci. Eng., 2025

2024
Secure decision tree classification with decentralized authorization and access control.
Comput. Stand. Interfaces, 2024

Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems.
Comput. Commun., 2024

2023
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system.
J. Syst. Archit., October, 2023

Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption.
Intell. Autom. Soft Comput., 2023

Deep Neural Network Model over Encrypted Data.
Proceedings of the Emerging Information Security and Applications, 2023

2022
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
A Secure Cloud-Edge Collaborative Logistic Regression Model.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing.
IEEE Trans. Comput. Soc. Syst., 2020

Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020

2019
User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data.
IEEE Access, 2019

Research on K-Means Clustering Algorithm Over Encrypted Data.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A Review of Privacy-Preserving Machine Learning Classification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018


  Loading...