Liangmin Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Chu-ko-nu: A Reliable, Efficient, and Anonymously Authentication-Enabled Realization for Multi-Round Secure Aggregation in Federated Learning.
CoRR, 2024

2023
Strong Anonymous Communication System Based on Segment Routing Over SDN.
Comput. J., December, 2023

Few-shot website fingerprinting attack with cluster adaptation.
Comput. Networks, June, 2023

A Source Authentication Scheme for Road Condition Monitoring Using Consortium Blockchain.
IEEE Trans. Veh. Technol., May, 2023

DIVRS: Data integrity verification based on ring signature in cloud storage.
Comput. Secur., 2023

A Survey on Automatic Discover Approach by Using Static Analysis for Smart Contract Vulnerability.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
DCIV: Decentralized cross-chain data integrity verification with blockchain.
J. King Saud Univ. Comput. Inf. Sci., 2022

PBAG: A Privacy-Preserving Blockchain-based Authentication Protocol with Global-updated Commitment in IoV.
CoRR, 2022

A Lightweight Locally Repairable Code-based Storage Architecture for Blockchains.
Proceedings of the IEEE Smartworld, 2022

2020
Using Machine Learning Methods to Provision Virtual Sensors in Sensor-Cloud.
Sensors, 2020

2019
Artificial Noisy MIMO Systems under Correlated Scattering Rayleigh Fading - A Physical Layer Security Approach.
CoRR, 2019

2017
A global and local consistent ranking model for image saliency computation.
J. Vis. Commun. Image Represent., 2017

一种全双工认知中继网络中实现能量高效的安全传输方法 (Design for Improving Energy-efficiency and Ensuring Physical-layer Security in Full-duplex Cognitive Relay Networks).
计算机科学, 2017

ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System.
J. Inf. Hiding Multim. Signal Process., 2017

SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.
Sensors, 2016

An efficient anonymous authentication protocol using batch operations for VANETs.
Multim. Tools Appl., 2016

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
Int. J. Netw. Secur., 2016

An improved least-significant-bit substitution method using the modulo three strategy.
Displays, 2016

Secure Model Based on Multi-cloud for Big Data Storage and Query.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015

A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
J. Inf. Hiding Multim. Signal Process., 2015

Image Data Embedding with Large Payload Based on Reference-Matrix.
Proceedings of the Advances in Image and Graphics Technologies - 10th Chinese Conference, 2015

A Novel User Model Based on Searchable Encryption Scheme.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

A QoS Guarantee Framework for Cloud Services Based on Bayesian Prediction.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2013
EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication.
J. Softw., 2013

Wireless Sensor Networks for the Internet of Things.
Int. J. Distributed Sens. Networks, 2013

Load-Balanced Secure Routing Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Expedite Privacy-Preserving Emergency Communication Scheme for VANETs.
Int. J. Distributed Sens. Networks, 2013

A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection.
J. Networks, 2012

A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Recovering Coverage Holes by Using Mobile Sensors in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
Application Research of WSN in Precise Agriculture Irrigation.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

2008
Node-failure Tolerance of Topology in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008

2007
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
Int. J. Autom. Control., 2007


  Loading...