Jia Wang

Orcid: 0000-0003-2308-2259

Affiliations:
  • Shenzhen University, College of Computer Science and Software Engineering, China


According to our database1, Jia Wang authored at least 22 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
CSG: Classifier-Aware Defense Strategy Based on Compressive Sensing and Generative Networks for Visual Recognition in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Stroke Risk Prediction With Hybrid Deep Transfer Learning Framework.
IEEE J. Biomed. Health Informatics, 2022

Adversarial attacks and defenses in deep learning for image recognition: A survey.
Neurocomputing, 2022

2021
InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices.
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021

Adversarial Attacks and Defenses in Deep Learning: A Survey.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
Gait Recognition as a Service for Unobtrusive User Identification in Smart Spaces.
ACM Trans. Internet Things, 2020

A novel edge-enabled SLAM solution using projected depth image information.
Neural Comput. Appl., 2020

TagSort: Accurate Relative Localization Exploring RFID Phase Spectrum Matching for Internet of Things.
IEEE Internet Things J., 2020

A survey of decomposition approaches in multiobjective evolutionary algorithms.
Neurocomputing, 2020

Inaudible acoustic signal based key agreement system for IoT devices: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

2019
Compressed Sensing Based Selective Encryption With Data Hiding Capability.
IEEE Trans. Ind. Informatics, 2019

Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019

Modular exponential multivariate sequence and its application to lightweight security design.
Future Gener. Comput. Syst., 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complex., 2019

A Constrained Solution Update Strategy for Multiobjective Evolutionary Algorithm Based on Decomposition.
Complex., 2019

A hybridized angle-encouragement-based decomposition approach for many-objective optimization problems.
Appl. Soft Comput., 2019

Energy Harvesting-Based Smart Transportation Mode Detection System via Attention-Based LSTM.
IEEE Access, 2019

A Novel Multiobjective Particle Swarm Optimization Algorithm with Dynamic Resource Allocation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Fractal Research on the Edge Blur Threshold Recognition in Big Data Classification.
Mob. Networks Appl., 2018

A Novel Many-Objective Optimization Algorithm Based on the Hybrid Angle-Encouragement Decomposition.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

2015
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015


  Loading...