Jian Wang

Orcid: 0000-0002-8376-5898

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
  • University of Tokyo, Japan (2001 - 2003)
  • Nanjing University, China (PhD 1998)


According to our database1, Jian Wang authored at least 96 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024

2023
Fully distributed identity-based threshold signatures with identifiable aborts.
Frontiers Comput. Sci., October, 2023

DDRM: A Continual Frequency Estimation Mechanism With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., July, 2023

Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023

Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023

Privacy-Preserving Classification in Multiple Clouds eHealthcare.
IEEE Trans. Serv. Comput., 2023

AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023

An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures.
IACR Cryptol. ePrint Arch., 2023

2022
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models.
IEEE Trans. Dependable Secur. Comput., 2022

Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022

A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system.
Multim. Tools Appl., 2022

Mean estimation over numeric data with personalized local differential privacy.
Frontiers Comput. Sci., 2022

Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks.
CoRR, 2022

Compression-Resistant Backdoor Attack against Deep Neural Networks.
CoRR, 2022

PTB: Robust physical backdoor attacks against deep neural networks in real world.
Comput. Secur., 2022

Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022

An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection.
Algorithms, 2022

2021
Classification of DoS Attacks in Smart Underwater Wireless Sensor Network.
Wirel. Pers. Commun., 2021

Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy.
IEEE Trans. Emerg. Top. Comput., 2021

Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter.
IEEE Trans. Emerg. Top. Comput., 2021

Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
Peer-to-Peer Netw. Appl., 2021

NaturalAE: Natural and robust physical adversarial examples for object detectors.
J. Inf. Secur. Appl., 2021

SocialGuard: An adversarial example based privacy-preserving technique for social images.
J. Inf. Secur. Appl., 2021

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation.
Digit. Commun. Networks, 2021

Protect the Intellectual Property of Dataset against Unauthorized Use.
CoRR, 2021

Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images.
CoRR, 2021

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples.
CoRR, 2021

Locally differentially private distributed algorithms for set intersection and union.
Sci. China Inf. Sci., 2021

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021

DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper).
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Cloud-assisted secure biometric identification with sub-linear search efficiency.
Soft Comput., 2020

DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots.
Secur. Commun. Networks, 2020

Efficient authentication protocol with anonymity and key protection for mobile Internet users.
J. Parallel Distributed Comput., 2020

Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks.
J. Netw. Comput. Appl., 2020

Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction.
J. Comput. Sci. Technol., 2020

A survey of authenticated key agreement protocols for multi-server architecture.
J. Inf. Secur. Appl., 2020

3D Invisible Cloak.
CoRR, 2020

Robust and Natural Physical Adversarial Examples for Object Detectors.
CoRR, 2020

DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
CoRR, 2020

LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
Comput. Secur., 2020

Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network.
Wirel. Pers. Commun., 2019

An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption.
IEEE Trans. Consumer Electron., 2019

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019

Efficient and secure multi-dimensional geometric range query over encrypted data in cloud.
J. Parallel Distributed Comput., 2019

Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs.
IET Comput. Digit. Tech., 2019

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method.
IEEE Access, 2019

Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018

Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model.
Secur. Commun. Networks, 2018

Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions.
J. Comput. Networks Commun., 2018

Extensible markup language keywords search based on security access control.
Int. J. Grid Util. Comput., 2018

A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Recovering Memory Access Sequence with Differential Flush+Reload Attack.
Proceedings of the Information Security Practice and Experience, 2018

MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc Networks.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers.
ACM Trans. Embed. Comput. Syst., 2017

面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value).
计算机科学, 2017

Efficient Encrypted Data Comparison Through a Hybrid Method.
J. Inf. Sci. Eng., 2017

Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices.
J. Inf. Sci. Eng., 2017

Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud.
Int. J. Found. Comput. Sci., 2017

Secure Multi-label Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2017

Distributed Set Intersection and Union with Local Differential Privacy.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2017

A new key rank estimation method to investigate dependent key lists of side channel attacks.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Secure Naïve Bayesian Classification over Encrypted Data in Cloud.
Proceedings of the Provable Security, 2016

Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

On efficiently harnessing cloud to securely solve linear regression and other matrix operations.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

2015
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

The Optimization Model of Trust for White-Washing.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Independent verification of proxy multi-signature scheme.
Int. J. Comput. Sci. Eng., 2014

eXtensible Markup Language access control model with filtering privacy based on matrix storage.
IET Commun., 2014

XML privacy protection model based on cloud storage.
Comput. Stand. Interfaces, 2014

2013
An Anonymous but Accountable Proxy Multi-signature Scheme.
J. Softw., 2013

Intra-cluster key sharing in hierarchical sensor networks.
IET Wirel. Sens. Syst., 2013

2010
Key Sharing in Hierarchical Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2006
A Hierarchical Key Management Approach for Secure Multicast.
Proceedings of the Architecture of Computing Systems, 2006

2005
Storage-Optimal Key Sharing with Authentication in Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.
Proceedings of the Intelligence and Security Informatics, 2005

Key Management for Multicast Fingerprinting.
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...