Guojun Wang

According to our database1, Guojun Wang authored at least 152 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications.
Inf. Sci., 2020

Cloud-based service oriented architecture for social vehicular ad hoc network communications.
Int. J. Commun. Networks Distributed Syst., 2020

CenterNet3D: An Anchor free Object Detector for Autonomous Driving.
CoRR, 2020

Directional and Explainable Serendipity Recommendation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
A channel-aware expected energy consumption minimization strategy in wireless networks.
Soft Comput., 2019

Dimension-by-dimension enhanced cuckoo search algorithm for global optimization.
Soft Comput., 2019

Generic attribute revocation systems for attribute-based encryption in cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019

A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes.
Entropy, 2019

A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking.
Comput. Secur., 2019

Nighthawk: Transparent System Introspection from Ring -3.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box.
Symmetry, 2018

Cyberspace Security for Future Internet.
Secur. Commun. Networks, 2018

Security and Privacy in Wireless and Mobile Networks.
Future Internet, 2018

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps.
Entropy, 2018

Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective.
IEEE Commun. Mag., 2018

Personalized Search with Secure Updates in Educational Resources.
Proceedings of the 2018 IEEE SmartWorld, 2018

Hypergraph Partitioning for Big Data Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in Clouds.
Proceedings of the 2018 IEEE SmartWorld, 2018

Scheduling Algorithm for Area Coverage Problem in Directional Sensor Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
A Load-Balanced Multicast Routing Algorithm Using Diversity Rate in CWMNs.
Wirel. Pers. Commun., 2017

An optimal energy-saving real-time task-scheduling algorithm for mobile terminals.
Int. J. Distributed Sens. Networks, 2017

A cooperation guarantee mechanism based on altruistic punishment for nodes in distributed environments.
Int. J. Auton. Adapt. Commun. Syst., 2017

Foreword.
IEICE Trans. Inf. Syst., 2017

Research and improvement of ECG compression algorithm based on EZW.
Comput. Methods Programs Biomed., 2017

Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications.
Proceedings of the 2017 IEEE SmartWorld, 2017

Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Advances in Mobile Video Networking.
Mobile Information Systems, 2016

A clustering-based improved Grey-Markov target tracking algorithm in wireless sensor networks.
Int. J. Comput. Sci. Eng., 2016

A compact customizable tunable EBG filter.
IEICE Electron. Express, 2016

Decentralized group key management for hierarchical access control using multilinear forms.
Concurr. Comput. Pract. Exp., 2016

IDSPlanet: A Novel Radial Visualization of Intrusion Detection Alerts.
Proceedings of the 9th International Symposium on Visual Information Communication and Interaction, 2016

Aerodynamic roughness retrieval from polarimetric ALOS-2 data in urban areas.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A Distributed Algorithm for Balanced Hypergraph Partitioning.
Proceedings of the Advances in Services Computing, 2016

Maximizing the Spread of Positive Influence Under LT-MLA Model.
Proceedings of the Advances in Services Computing, 2016

2015
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce.
IEEE Trans. Parallel Distrib. Syst., 2015

Recent advances in autonomic provisioning of big data applications on clouds.
IEEE Trans. Cloud Comput., 2015

Trust Description and Propagation System: Semantics and axiomatization.
Knowl. Based Syst., 2015

A square-based coverage and connectivity probability model for WSNs.
Int. J. Sens. Networks, 2015

Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme.
Int. J. Distributed Sens. Networks, 2015

A weighted throttled load balancing approach for virtual machines in cloud environment.
Int. J. Comput. Sci. Eng., 2015

Efficient approximate linear programming for factored MDPs.
Int. J. Approx. Reason., 2015

A compact configurable dual-band bandpass filter.
IEICE Electron. Express, 2015

A compact and customizable operation frequency filter for broadband applications.
IEICE Electron. Express, 2015

Research on Key Management for Multi-privileged Group Communications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Application Streaming: A Mobile Application Distribution Method.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Illegal Indirect Access Prevention Method in Transparent Computing System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Streaming Computing Technology for Android Applications: Design Model and Case Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Design and Implementation of Streaming Application Execution Platform in Android.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming.
Wirel. Commun. Mob. Comput., 2014

Advances in trusted network computing.
Secur. Commun. Networks, 2014

An aggregated signature-based fast RFID batch detection protocol.
Secur. Commun. Networks, 2014

Group formation with neighbor similarity trust in P2P E-commerce.
Peer Peer Netw. Appl., 2014

Message matching-based greedy behavior detection in delay tolerant networks.
J. Comput. Syst. Sci., 2014

Roughness and fuzziness in quantales.
Inf. Sci., 2014

Correction and improvement on several results in quantitative logic.
Inf. Sci., 2014

A distributed resource conservation multicast and spectrum allocation algorithm in cognitive wireless mesh networks.
Int. J. Embed. Syst., 2014

Achieving energy efficient advertisements traffic for smartphones.
Int. J. Embed. Syst., 2014

On robustness of the full implication triple I inference method with respect to finer measurements.
Int. J. Approx. Reason., 2014

A ZigBee-based elderly health monitoring system: design and implementation.
Int. J. Auton. Adapt. Commun. Syst., 2014

Editorial: Special issue on trust in cyber, physical and social computing.
Comput. Secur., 2014

Survey of Integrity Detection Methods in Internet of Things.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Lake Lop Nur evolution analysis based on radar polarimetric decomposition technology.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

2013
Special issue of JCSS on UbiSafe computing and communications.
J. Comput. Syst. Sci., 2013

Practical distributed secret key generation for delay tolerant networks.
Concurr. Comput. Pract. Exp., 2013

Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications.
Proceedings of the 12th IEEE International Conference on Trust, 2013

HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Data Gathering and Processing for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Wireless Multicast for Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Cross Layer Design for Improving Trivial File Transfer Protocol in Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Securing Recommendations in Grouped P2P E-Commerce Trust Model.
IEEE Trans. Netw. Serv. Manag., 2012

Fault tolerance analysis of mesh networks with uniform versus nonuniform node failure probability.
Inf. Process. Lett., 2012

A Clustering K-Anonymity Scheme for Location Privacy Preservation.
IEICE Trans. Inf. Syst., 2012

Special issue of trust, security, and privacy for emerging applications in computer and information systems.
Concurr. Comput. Pract. Exp., 2012

Maximal contractions in Boolean algebras.
Sci. China Inf. Sci., 2012

A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

The Affine Transformation in Quantitative Logic.
Proceedings of the Quantitative Logic and Soft Computing, 2012

An Axiomatic method for Evaluating goodness of closed Predicate Propositions containing no function Letters.
Proceedings of the Quantitative Logic and Soft Computing, 2012

Many-Valued Modal Logic Metric Spaces based on Frames.
Proceedings of the Quantitative Logic and Soft Computing, 2012

Filters in Stone BL Algebras.
Proceedings of the Quantitative Logic and Soft Computing, 2012

S-band backscattering analysis of wheat using tower-based scatterometer.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Rough Truth Degrees of Formulas and Approximate Reasoning in Rough Logic.
Fundam. Informaticae, 2011

The probability theories for IVFSs and IVIFSs.
Comput. Math. Appl., 2011

Borel probabilistic and quantitative logic.
Sci. China Inf. Sci., 2011

Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Distributed Private-Key Generation Scheme with Self-Certified Identity.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Dual-aspect geometric and radiometric terrain correction method for high-resolution SAR data.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Building footprint extraction by fusing dual-aspect SAR images.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Study on rotary impeller refinement of 4004 Al alloy.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks.
J. Supercomput., 2010

Lattice-valued modal propositional logic and its completeness.
Sci. China Inf. Sci., 2010

Left-continuity of t-norms on the n-dimensional Euclidean cube.
Appl. Math. Lett., 2010

Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

Applications of polarimetric decomposition technology in a dried up lake evolution.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

2009
Graph transformation based reduction analysis of PID.
ACM SIGSOFT Softw. Eng. Notes, 2009

Guest Editorial.
J. Comput., 2009

Quantitative logic.
Inf. Sci., 2009

Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks.
IEICE Trans. Inf. Syst., 2009

An axiomatic approach of fuzzy rough sets based on residuated lattices.
Comput. Math. Appl., 2009

Theory of (n) truth degrees of formulas in modal logic and a consistency theorem.
Sci. China Ser. F Inf. Sci., 2009

Modelling of heterogeneous wireless networks under batch arrival traffic with communication locality.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Cross-layer Approach for Energy Efficient Routing in WANETs.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Designing fair flow fuzzy controller using genetic algorithm for computer networks.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

A Fuzzy Mechanism to Avoid Packet Accumulation in Fair Flow Control.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Topology on the set of <i>R</i> <sub>0</sub> semantics for <i>R</i> <sub>0</sub> algebras.
Soft Comput., 2008

Three and two-valued Lukasiewicz theories in the formal deductive system <i>I</i> (NM-logic).
Fuzzy Sets Syst., 2008

A special class of tensor categories initiated by inverse braid monoids.
Discret. Math., 2008

The R<sub>0</sub>-type fuzzy logic metric space and an algorithm for solving fuzzy modus ponens.
Comput. Math. Appl., 2008

Continuity of triple I methods based on several implications.
Comput. Math. Appl., 2008

Triple I method based on pointwise sustaining degrees.
Comput. Math. Appl., 2008

A Time-Related Trust Model Based on Subjective Logic Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Case Study on the RCMD Method and Fuzzy C-Regression Models for Mining Regression Classes.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Unified forms of fully implicational restriction methods for fuzzy reasoning.
Inf. Sci., 2007

Characterizations of maximal consistent theories in the formal deductive system L<sup>*</sup> (NM-logic) and Cantor space.
Fuzzy Sets Syst., 2007

Residuated lattices and lattice effect algebras.
Fuzzy Sets Syst., 2007

Multi-criteria decision-making methods based on intuitionistic fuzzy sets.
Eur. J. Oper. Res., 2007

Efficient group key management for multi-privileged groups.
Comput. Commun., 2007

Randomization of classical inference patterns and its application.
Sci. China Ser. F Inf. Sci., 2007

RARE: An Energy-Efficient Target Tracking Protocol for Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

A Support Method for Improving Learner's Learning Habit Using Behavior Analysis in a Ubiquitous Environment.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications.
Proceedings of the Global Communications Conference, 2007

Graded Reasoning in <i>n</i> -Valued Lukasiewicz Propositional Logic.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

2006
A 16-classification partition of formula set <i>F</i>(<i>S</i>) in revised Kleene system W.
Soft Comput., 2006

A topological characterization of consistency of logic theories in propositional logic.
Math. Log. Q., 2006

Consistency degrees of theories and methods of graded reasoning in <i>n</i>-valued <i>R</i><sub>0</sub>-logic (NM-logic).
Int. J. Approx. Reason., 2006

Generalized consistency degrees of theories w.r.t. formulas in several standard complete logic systems.
Fuzzy Sets Syst., 2006

A new theory consistency index based on deduction theorems in several logic systems.
Fuzzy Sets Syst., 2006

An intrinsic fuzzy set on the universe of discourse of predicate formulas.
Fuzzy Sets Syst., 2006

A note on implicators based on binary aggregation operators in interval-valued fuzzy set theory.
Fuzzy Sets Syst., 2006

A Note on the Unified Forms of Triple I Method.
Comput. Math. Appl., 2006

Theory of truth degrees of propositions in the logic system <i>L</i><sub><i>n</i></sub><sup>*</sup>.
Sci. China Ser. F Inf. Sci., 2006

2005
Consistency degrees of theories in some systems of propositional fuzzy logic.
Fuzzy Sets Syst., 2005

Consistency degrees of finite theories in ukasiewicz propositional fuzzy logic.
Fuzzy Sets Syst., 2005

A unified approximate reasoning theory suitable for both propositional calculus system <i>L</i><sup>*</sup> and predicate calculus system <i>K</i><sup>*</sup>.
Sci. China Ser. F Inf. Sci., 2005

Theory of truth degrees of formulas in Łukasiewicz <i>n</i> -valued propositional logic and a limit theorem.
Sci. China Ser. F Inf. Sci., 2005

Conic functions on metric spaces and their application.
Appl. Math. Lett., 2005

A Scalable and Reliable Multiple Home Regions Based Location Service in Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2005

2004
Formalized theory of general fuzzy reasoning.
Inf. Sci., 2004

2003
Integrated semantics and logic metric spaces.
Fuzzy Sets Syst., 2003

2001
Non-fuzzy versions of fuzzy reasoning in classical logics.
Inf. Sci., 2001

2000
Intuitionistic fuzzy sets and L-fuzzy sets.
Fuzzy Sets Syst., 2000

1999
On the Logic Foundation of Fuzzy Reasoning.
Inf. Sci., 1999

1998
On the structure of value functional bag mappings.
Fuzzy Sets Syst., 1998

Fuzzy continuous input-output controllers are universal approximators.
Fuzzy Sets Syst., 1998

1997
On some gross misunderstandings about the theory of topological molecular lattices.
Fuzzy Sets Syst., 1997


  Loading...