Jian Wang

Orcid: 0000-0002-3737-4175

Affiliations:
  • National University of Defense Technology, College of Electronic Science and Engineering, Changsha, China


According to our database1, Jian Wang authored at least 14 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Automated detection on the security of the linked-list operations.
Frontiers Comput. Sci., 2022

2020
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities.
Sci. Program., 2020

Automated Data-Processing Function Identification Using Deep Neural Network.
IEEE Access, 2020

2018
Formal Method for Security Analysis of Electronic Payment Protocols.
IEICE Trans. Inf. Syst., 2018

Improved Wolf Pack Algorithm Based on Differential Evolution Elite Set.
IEICE Trans. Inf. Syst., 2018

Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin.
IEEE Access, 2018

2017
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs.
Secur. Commun. Networks, 2017

Novel Logical Method for Security Analysis of Electronic Payment Protocols.
CoRR, 2017

A Novel Hybrid Based on Wolf Pack Algorithm and Differential Evolution Algorithm.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
UML Modeling of Cross-Layer Attack in Wireless Sensor Networks.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

2015
Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party.
Quantum Inf. Process., 2015

Protocol Reverse Engineering Using LDA and Association Analysis.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
Differential phase shift quantum private comparison.
Quantum Inf. Process., 2014


  Loading...