Fengjiao Wang

Orcid: 0000-0003-3324-2308

According to our database1, Fengjiao Wang authored at least 30 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Research Design Based on Children's Participative Edutainment Products.
Proceedings of the Human-Computer Interaction, 2023

2022
Identification of the Urban Dry Islands Effect in Beijing: Evidence from Satellite and Ground Observations.
Remote. Sens., 2022

2021
TS-PADM: Anomaly Detection Model of Wireless Sensors Based on Spatial-Temporal Feature Points.
Wirel. Commun. Mob. Comput., 2021

Deep Learning-Based Congestion Detection at Urban Intersections.
Sensors, 2021

2020
Image Generation Via Minimizing Fréchet Distance in Discriminator Feature Space.
CoRR, 2020

Entity Recognition of Chinese Medical Literature Based on BiLSTM-CRF and Fusion Features.
Proceedings of the ICBDT 2020: 3rd International Conference on Big Data Technologies, 2020

Ship Target Detection Algorithm Based on Improved YOLOv3.
Proceedings of the ICBDT 2020: 3rd International Conference on Big Data Technologies, 2020

2018
PER: A Probabilistic Attentional Model for Personalized Text Recommendations.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Collective Geographical Embedding for Geolocating Social Network Users.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Deep and Broad Learning on Content-Aware POI Recommendation.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

2016
基于眼动数据的分类视觉注意模型 (Classification Model of Visual Attention Based on Eye Movement Data).
计算机科学, 2016

Collaborative Co-clustering across Multiple Social Media.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

DistSD: Distance-based social discovery with personalized posterior screening.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Concurrent goal-oriented co-clustering generation in social networks.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

2014
Defending against user identity linkage attack across multiple online social networks.
Proceedings of the 23rd International World Wide Web Conference, 2014

When and Where: Predicting Human Movements Based on Social Spatial-Temporal Events.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Why Checkins: Exploring User Motivation on Location Based Social Networks.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Steering Information Diffusion Dynamically against User Attention Limitation.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

2013
Extracting social events for learning better information diffusion models.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

2010
Social action tracking via noise tolerant time-varying factor graphs.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

2009
An efficient and provable secure identity-based ring signcryption scheme.
Comput. Stand. Interfaces, 2009

A new provably secure authentication and key agreement protocol for SIP using ECC.
Comput. Stand. Interfaces, 2009

Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
An Efficient Identity-based Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of a client-to-client password-authenticated key agreement protocol.
IACR Cryptol. ePrint Arch., 2008

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Comput. Commun., 2008

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008

2007
Security Analysis of WAPI Authentication and Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2007

A New Security Model for Cross-Realm C2C-PAKE Protocol.
IACR Cryptol. ePrint Arch., 2007

A Provable Secure Key Management Program for Wireless Sensor Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...