Geng Wang

Orcid: 0000-0003-1000-7903

According to our database1, Geng Wang authored at least 50 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An efficient cloud-based elastic RDMA protocol for HPC applications.
CCF Trans. High Perform. Comput., February, 2024

SA-Pmnet: Utilizing Close-Range Photogrammetry Combined with Image Enhancement and Self-Attention Mechanisms for 3D Reconstruction of Forests.
Remote. Sens., January, 2024

A Refined Hardness Estimation of LWE in Two-step Mode.
IACR Cryptol. ePrint Arch., 2024

2023
PLI-Assess: A Behavior Profile-Based Approach for Privacy-Preserving Log Assessment.
IEEE Access, 2023

A Novel Semi-Supervised Learning-Based RF Fingerprinting Method Using Masked-Contrastive Training.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.
Proceedings of the Information Security - 26th International Conference, 2023

Tracking Drones with Manual Operation Representation.
Proceedings of the 2023 11th International Conference on Information Technology: IoT and Smart City, 2023

2022
Autonomous Driving Security: State of the Art and Challenges.
IEEE Internet Things J., 2022

Improved Pump and Jump BKZ by Sharp Simulator.
IACR Cryptol. ePrint Arch., 2022

Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2022

Further Cryptanalysis of a Type of RSA Variants.
IACR Cryptol. ePrint Arch., 2022

More Efficient Verifiable Functional Encryption.
Proceedings of the Provable and Practical Security, 2022

An Approach of Digital Twin System Construction for Underground Locomotive Dispatching Management.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2022

VOProof: Efficient zkSNARKs from Vector Oracle Compilers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
A Multiobjective Disassembly Planning for Value Recovery and Energy Conservation From End-of-Life Products.
IEEE Trans Autom. Sci. Eng., 2021

Time-based key management in attribute-based encryption using piecewise key generation.
Int. J. Inf. Comput. Secur., 2021

VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles.
IACR Cryptol. ePrint Arch., 2021

Openness weighted association studies: leveraging personal genome information to prioritize non-coding variants.
Bioinform., 2021

Fast Underdetermined DOA Estimation Based on Generalized MRA via Original Covariance Vector Sparse Reconstruction.
IEEE Access, 2021

Improving Low resource Reading Comprehension via Cross lingual Transposition Rethinking.
Proceedings of the IJCKG'21: The 10th International Joint Conference on Knowledge Graphs, Virtual Event, Thailand, December 6, 2021

Research on the Extraction of Wind Turbine all over the China Based on Domestic Satellite Remote Sensing Data.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

Underdetermined 2D DOA Estimation Based on Bi-directional Parallel Sparse Linear Array with Reduced Mutual Coupling.
Proceedings of the ICDSP 2021: 5th International Conference on Digital Signal Processing, 2021

Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
An Improved Matching Pursuit-Based Temperature and Load Compensation Method for Ultrasonic Guided Wave Signals.
IEEE Access, 2020

A New Sustainable Scheduling Method for Hybrid Flow-Shop Subject to the Characteristics of Parallel Machines.
IEEE Access, 2020

2019
A Reference Matching-Based Temperature Compensation Method for Ultrasonic Guided Wave Signals.
Sensors, 2019

Multi-Objective Optimization and Analysis of Tri-Stable Permanent Magnet Actuators for Valve Application.
IEEE Access, 2019

Simultaneous Human Health Monitoring and Time-Frequency Sparse Representation Using EEG and ECG Signals.
IEEE Access, 2019

Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Lightweight Real-Time Object Detection Based on Deep Learning.
Proceedings of the Genetic and Evolutionary Computing, 2019

An Efficient and Flexible Diagnostic Method for Machinery Fault Detection Based on Convolutional Neural Network.
Proceedings of the Genetic and Evolutionary Computing, 2019

2017
Modeling and tracking control for piezoelectric actuator based on a new asymmetric hysteresis model.
IEEE CAA J. Autom. Sinica, 2017

Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases.
IACR Cryptol. ePrint Arch., 2017

Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes).
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Novel circular interpolation algorithm for high-accuracy positioning systems.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2014
Mechanical resonance suppression and shaft torque limitation of two-mass drive system based on model predictive control.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

Improved predictive current control with static current error elimination for permanent magnet synchronous machine.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

2012
An Argumentation Framework for Non-monotonic Reasoning in Description Logic.
Proceedings of the Rough Sets and Knowledge Technology - 7th International Conference, 2012

A Model-Theoretic Semantics for Two-Sided Argumentation.
Proceedings of the Twenty-Fifth International Florida Artificial Intelligence Research Society Conference, 2012

2011
45-nm silicon-on-insulator CMOS technology integrating embedded DRAM for high-performance server and ASIC applications.
IBM J. Res. Dev., 2011

Method for Forecasting the Logistics Demand of Shenyang Economic Zone Based on BP Neural Network.
Proceedings of the Advances in Computer Science, 2011

Research on Simulation of Logistic Impact on the Environment Based on System Dynamics.
Proceedings of the Advances in Computer Science, 2011

2009
Studying on AADL-Based Architecture Abstraction of Embedded Software.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

A Model-Based Testing for AADL Model of Embedded Software.
Proceedings of the Ninth International Conference on Quality Software, 2009

2007
Development of an autonomous flight control system for small size unmanned helicopter.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

2005
An 800-MHz embedded DRAM with a concurrent refresh mode.
IEEE J. Solid State Circuits, 2005

A Successive Design Method of Rough Controller Using Extra Excitation.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2003
SACST: smart anthropomorphic contact surface technology.
IEEE Robotics Autom. Mag., 2003

2000
Intelligent Soft Contact Surface Technology with MEMS in Robotic and Human Augmented Systems.
Proceedings of the 2000 IEEE International Conference on Robotics and Automation, 2000


  Loading...