Jiang Weng

According to our database1, Jiang Weng authored at least 12 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Wireless-Powered NOMA Communications in Multi-UAV Systems.
IEEE Trans. Green Commun. Netw., September, 2023

2022
Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems.
Entropy, 2022

2020
Vulnerabilities and Attacks of UAV Cyber Physical Systems.
Proceedings of the CNIOT 2020: 2020 International Conference on Computing, 2020

Selection of Optimal Strategy for Moving Target Defense Based on Signal Game.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2018
Revisiting the Expansion Length of Triple-base Number System for Elliptic Curve Scalar Multiplication.
J. Inf. Sci. Eng., 2018

2017
Secure and efficient ECC speeding up algorithms for wireless sensor networks.
Soft Comput., 2017

New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs.
Appl. Algebra Eng. Commun. Comput., 2017

2016
The Attack of the RSA Subgroup Assumption.
J. Inf. Sci. Eng., 2016

2015
Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Fault Attack Against Miller's Algorithm for Even Embedding Degree.
Int. J. Netw. Secur., 2014

Improved Fault Attack Against Eta Pairing.
Int. J. Netw. Secur., 2014

2011
Fault Attacks against the Miller Algorithm in Hessian Coordinates.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011


  Loading...